Prince of Persia Hackers Resurface: Thunderous Comeback or Stormy Forecast?

The Iranian hacking group Prince of Persia is back in action. SafeBreach Labs discovered they’ve upped their game, now using Telegram to control their malware. These cyber ninjas, notorious for targeting diplomats and activists, are still active, relevant, and dangerous—even if they’re not stealing your lunch money.

Pro Dashboard

Hot Take:

Just when you thought it was safe to check your Telegram messages, the Prince of Persia hacking group comes storming back onto the scene like a cyber ninja with a penchant for spreadsheets. They’ve traded in their magic carpets for malware and are on a mission to prove that they’re still the kings of the digital desert. Watch out, because these guys have more comebacks than a 90’s boy band!

Key Points:

  • Prince of Persia, an Iranian APT group, resurfaces with expanded operations.
  • The group uses advanced tools, including Foudre and Tonnerre malware families.
  • Their operations now leverage Telegram for command and control activities.
  • Hackers globally target political figures, activists, and critical systems.
  • SafeBreach’s investigation reveals the group’s ongoing and evolving tactics.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?