A December 2025 report from SafeBreach has detailed the resurgence of the Iranian state-sponsored advanced persistent threat (APT) group known as "Prince of Persia." After a period of apparent dormancy, the group is now conducting multiple campaigns using new and updated versions of its signature malware families, Foudre and Tonnerre. The research reveals a significant evolution in the group's tactics, techniques, and procedures (TTPs), most notably the use of the Telegram messaging platform for command and control (C2) communications. This, combined with the use of multiple Domain Generation Algorithms (DGAs), indicates a sophisticated and patient adversary that has re-tooled for a new wave of attacks, likely targeting critical infrastructure.
The re-emergence of Prince of Persia showcases a clear evolution in their toolset, designed to improve stealth and operational security.
SafeBreach identified at least three active variants of the Tonnerre malware:
The use of Telegram for C2 (T1102.001 - Dead Drop Resolver) is a significant tactical shift. By leveraging a legitimate, popular, and encrypted service, the attackers make their C2 traffic much harder to detect and block. The traffic blends in with normal user activity, and security teams cannot simply block Telegram's domains or IPs without causing collateral damage. The malware likely uses a Telegram bot and the Telegram API to receive commands and exfiltrate stolen data, a far stealthier method than the previously used FTP protocol.
The use of multiple, parallel DGAs (T1568.002 - DGA) demonstrates the group's focus on maintaining persistent access. If one C2 channel or DGA pattern is discovered and blocked, the malware can fall back to another, ensuring the attackers do not lose control of their compromised assets.
The impact of a successful compromise by Prince of Persia is high. As a state-sponsored APT, their goals are typically espionage, intellectual property theft, and potentially positioning for future disruptive or destructive attacks against critical infrastructure. The re-tooling and patient approach suggest a long-term strategic objective. Organizations in the energy, government, and telecommunications sectors should consider themselves at high risk.
Detection Strategies:
api.telegram.org) from servers or workstations that have no business reason to use it. This is a high-fidelity indicator of this type of C2.Response:
Strategic Recommendations:
Block access to services like Telegram from servers and other critical assets that have no legitimate need to connect to them.
Mapped D3FEND Techniques:
Implement DNS filtering and network intrusion prevention systems to detect and block traffic associated with DGAs.
Mapped D3FEND Techniques:
Use application control to prevent unauthorized executables like the Tonnerre backdoor from running on endpoints.
Mapped D3FEND Techniques:
To counter Prince of Persia's use of Telegram for C2, organizations must implement strict outbound traffic filtering. A default-deny egress policy should be applied to all servers, especially those in critical infrastructure environments. Any required outbound communication should be explicitly allowed to known, legitimate destinations. For workstations, a web proxy should be configured to block the 'Chat' and 'Social Networking' categories, which would include Telegram. Since Telegram traffic is encrypted, blocking it at the network layer is more effective than trying to inspect its content. This prevents the Tonnerre malware from establishing its C2 channel.
To combat the group's use of DGAs, a proactive DNS defense is required. Organizations should subscribe to high-quality threat intelligence feeds that provide lists of known DGA domains associated with Prince of Persia and other threat actors. These feeds should be integrated into a DNS firewall or sinkhole solution. This will block any endpoint from resolving the malicious C2 domains generated by the Tonnerre malware. Additionally, using DNS analytics to detect algorithmically generated domain patterns can help identify and block zero-day DGA domains before they are added to intelligence feeds.
In high-security environments like critical infrastructure, application allowlisting is a powerful defense. Instead of trying to block a near-infinite list of malicious files, allowlisting only permits known, authorized executables to run. This would prevent the Tonnerre and Foudre backdoors from executing, even if an attacker manages to drop them onto a system. Implementing allowlisting on critical servers and operator workstations creates a hardened environment that is highly resilient to novel malware.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats