Infy stands as one of the longest-running advanced persistent threat groups in the cybersecurity landscape, with its initial operations documented as far back as 2004. Unlike more prominent Iranian hacking collectives that frequently make headlines, this group has specialized in staying under the radar to maintain long-term access to its targets. Recent technical analysis reveals that the group is far from dormant, having evolved its tactics to remain a relevant and persistent threat to international security.
The current campaign utilizes updated versions of specialized malware strains known as Foudre and Tonnerre. These tools are designed to profile victims and exfiltrate sensitive data from compromised machines, often gaining initial entry through phishing emails. A significant shift in their methodology involves moving away from traditional macro-based documents toward embedding executable files directly within Microsoft Excel files to trigger the infection process.
GET 50% Discount for VPN/ANTIVIRUS SOFTWARE AT 911Cyber - CODE: bit5025
To ensure the longevity of their operations, the actors have implemented a domain generation algorithm that makes their command-and-control infrastructure much harder for defenders to dismantle. The malware also performs a rigorous validation process, using RSA digital signatures to verify that it is communicating with an authentic server before proceeding with data theft. This level of operational security demonstrates a high degree of technical sophistication and a desire to avoid detection by automated security systems.
Newer iterations of the Tonnerre malware have integrated modern communication platforms like Telegram into their command-and-control hierarchy. Researchers found evidence of a specific Telegram group and bot used to issue commands and collect stolen information, though access to these instructions is restricted to specific victim identifiers. This integration of popular messaging apps allows the group to blend its malicious traffic with legitimate web activity, further complicating the task for threat hunters.
Beyond current activities, investigations into historical files have uncovered various other malware variants used by the group to spy on messaging content and disguise their footprints. While some observers believed the group had gone dark in recent years, the evidence suggests they have instead been refining their toolkit and expanding their reach. This ongoing activity highlights the persistent nature of state-sponsored espionage and the continuous evolution of veteran hacking groups.
Source: Iranian Infy APT Resurfaces With New Malware Activity After Silence



