Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations

Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations

Posted on December 19, 2025December 19, 2025 By CWS

Iranian state-sponsored risk actors, generally tracked as “Prince of Persia,” have resurfaced with a classy cyberespionage marketing campaign concentrating on international crucial infrastructure and personal networks.

Lively because the early 2000s, this group lately deployed up to date malware variants to infiltrate organizational programs and exfiltrate delicate intelligence.

Their newest operations reveal a major evolution in technical proficiency, using novel evasion strategies and decentralized command-and-control (C2) infrastructures to bypass trendy safety defenses.

The attackers primarily provoke infections by malicious Microsoft Excel recordsdata containing embedded executables, marking a tactical shift from their earlier reliance on macro-enabled paperwork.

These recordsdata, usually disguised as benign administrative updates or regional information gadgets, are engineered to evade commonplace antivirus detection engines.

As soon as a sufferer engages with the file, the malware drops a self-extracting archive that silently installs the Foudre backdoor, establishing an preliminary foothold inside the compromised community.

SafeBreach analysts recognized this renewed exercise after a three-year dormant interval, noting the group’s transition to extra resilient operational safety practices.

Their analysis highlighted the group’s use of distinct malware households, Foudre and Tonnerre, which now function superior capabilities for persistence and knowledge theft.

The investigation additionally linked the operation to a selected persona, “Ehsan,” suggesting a centralized and human-operated administration of the marketing campaign’s infrastructure.

Technical Evaluation of An infection and C2 Communication

The technical sophistication of this marketing campaign is most evident within the deployment of Foudre v34 and Tonnerre v50.

Foudre v34 employs a posh multi-stage loading course of the place a loader DLL, recognized as Conf8830.dll, executes a selected exported perform named f8qb1355.

This perform calls a disguised DLL file, d232, which masquerades as an MP4 video file to deceive each customers and automatic safety instruments.

Telegram person profile (Supply – SafeBreach)

Upon profitable execution, the malware establishes persistence and initiates communication with C2 servers utilizing a generated area identify.

The Area Technology Algorithm (DGA) logic is especially distinct, dividing the method into two phases. The primary part calculates a CRC32 checksum based mostly on a date-formatted string, reminiscent of LOS1{}{}{}.format(date.12 months, date.month, weeknumber).

The second part transforms this output into a singular eight-character hostname. Moreover, the Tonnerre v50 variant introduces a singular redirection mechanism involving Telegram.

As an alternative of conventional FTP protocols, the malware communicates with a Telegram bot to obtain instructions.

C2 Servers (Supply – SafeBreach)

The C2 communication depends on particular HTTP GET requests to validate sufferer machines. Foudre v34 sends a singular identifier to the server utilizing the next construction:

This granular management permits the attackers to selectively improve or take away infections, guaranteeing their operations stay undetected whereas sustaining long-term entry to high-value targets.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:APT, Critical, Infrastructure, Iranian, NationState, Networks, Organizations, Targeting

Post navigation

Previous Post: Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments
Next Post: Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility

Related Posts

New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads Cyber Security News
Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Cyber Security News
Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild Cyber Security News
Cloud Security Essentials – Protecting Multi-Cloud Environments Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
Microsoft Confirms August 2025 Update Causes Severe Lag in Windows 11 24H2, Windows 10 Versions Microsoft Confirms August 2025 Update Causes Severe Lag in Windows 11 24H2, Windows 10 Versions Cyber Security News
Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark