Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout

Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout

Posted on February 5, 2026 By CWS

The Iranian cyber threat group Infy, also known as the Prince of Persia, has taken steps to conceal their operations by modifying their command-and-control (C2) infrastructure. This move comes on the heels of the Iranian government’s decision to end a significant internet blackout, which began earlier in the month.

Strategic Changes in Cyber Operations

According to Tomer Bar, vice president of security research at SafeBreach, Infy ceased maintaining their C2 servers on January 8, coinciding with Iran’s nationwide internet shutdown. This action suggests that even state-aligned cyber units were temporarily inactive during the blackout.

However, activity resumed on January 26, as new C2 servers were established just before the Iranian authorities lifted the internet restrictions. This timing indicates a strong likelihood of state sponsorship for the group, aligning with Iran’s strategic interests.

Infy’s Evolving Tactics

Infy is among the numerous state-sponsored hacker groups in Iran, known for espionage and influence campaigns. Despite being active since 2004, Infy has remained less visible compared to its counterparts. Their operations have been described as ‘laser-focused’ on intelligence gathering from targeted individuals.

Recent findings by SafeBreach reveal that the group has adopted updated versions of their tools, namely Foudre and Tonnerre. Notably, Tonnerre’s latest iteration, dubbed Tornado, utilizes both HTTP and Telegram for C2 communication, incorporating a unique domain generation algorithm and blockchain data techniques for enhanced flexibility.

Exploiting Security Vulnerabilities

In a strategic shift, Infy has leveraged a one-day security flaw in WinRAR, identified as either CVE-2025-8088 or CVE‑2025‑6218, to deploy the Tornado payload. This tactic aims to increase the success rate of their cyber campaigns. The RAR files containing the payload were detected on the VirusTotal platform in December 2025.

Within these files, a self-extracting archive includes two components: the main Tornado DLL and an installer that ensures persistence by checking for Avast antivirus presence before executing the malware. Tornado communicates with its C2 server through HTTP to gather system data and execute commands.

Future Implications and Correlations

Infy’s use of Telegram for C2 purposes continues, with changes in user handles and group configurations noted in the latest version. SafeBreach’s analysis of messages extracted from private Telegram groups unveiled crucial insights into Infy’s operations, including the deployment of ZZ Stealer malware.

This malware is linked to a broader campaign targeting the Python Package Index repository. The data also suggests potential ties between Infy and other Iranian groups like Charming Kitten, based on shared techniques and tools.

As Infy adapts its strategies, cybersecurity experts remain vigilant in monitoring their activities, emphasizing the need for robust defenses against state-sponsored cyber threats.

The Hacker News Tags:C2 servers, Cybersecurity, Infy hackers, internet blackout, Iran cyber espionage, Malware, SafeBreach, Telegram bot, WinRAR flaw, ZZ Stealer

Post navigation

Previous Post: Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials
Next Post: AI Scam Unveils 150 Fake Law Firm Websites

Related Posts

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale The Hacker News
Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign The Hacker News
Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel The Hacker News
Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch The Hacker News
Scattered Spider Hacker Gets 10 Years, M Restitution for SIM Swapping Crypto Theft Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft The Hacker News
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News