Prince of Persia Hackers Resurface: Thunderous Comeback or Stormy Forecast?
The Iranian hacking group Prince of Persia is back in action. SafeBreach Labs discovered they’ve upped their game, now using Telegram to control their malware. These cyber ninjas, notorious for targeting diplomats and activists, are still active, relevant, and dangerous—even if they’re not stealing your lunch money.

Hot Take:
Just when you thought it was safe to check your Telegram messages, the Prince of Persia hacking group comes storming back onto the scene like a cyber ninja with a penchant for spreadsheets. They’ve traded in their magic carpets for malware and are on a mission to prove that they’re still the kings of the digital desert. Watch out, because these guys have more comebacks than a 90’s boy band!
Key Points:
- Prince of Persia, an Iranian APT group, resurfaces with expanded operations.
- The group uses advanced tools, including Foudre and Tonnerre malware families.
- Their operations now leverage Telegram for command and control activities.
- Hackers globally target political figures, activists, and critical systems.
- SafeBreach’s investigation reveals the group’s ongoing and evolving tactics.
Already a member? Log in here
