Infy is an Iran-aligned espionage actor that quietly maintained and expanded operations over nearly two decades, resurfacing with refreshed malware, resilient infrastructure, and broader geographic reach through late 2025. The group favors disciplined, low-noise campaigns, using targeted document-based lures, staged victim profiling, and frequent infrastructure rotation, to secure long-term access to government, diplomatic, civil society, and critical-infrastructure–adjacent targets aligned with Iranian intelligence priorities.
Overview
Infy, also tracked as “Prince of Persia,” is a long-running Iran-aligned espionage threat actor that has targeted government entities, critical infrastructure-adjacent organizations, and individuals of intelligence interest for nearly two decades. Public reporting first brought wider attention to the group in the mid-2010s; however, newer research indicates the actor continued operating during periods where it appeared quiet, suggesting deliberate operational security and disciplined campaign management. The actor’s activity is notable for its persistence, selective targeting, and willingness to iterate on tooling and infrastructure to sustain access over time. Recent observations confirm continued operations through at least December 2025, reinforcing that this is not a historical threat but a current one with active tradecraft evolution. The group’s campaigns have demonstrated a broad geographic reach spanning Iran and multiple countries in Europe, as well as parts of the Middle East, South Asia, and North America. The key takeaway is continuity: the actor did not disappear but adapted and maintained momentum while reducing external visibility. Recent campaign observations signal renewed confidence and expand operational scale compared to what was previously understood.
Key Findings:
- Infy’s operational footprint over the last several years appears materially larger than earlier reporting suggested, including multiple overlapping campaigns rather than isolated activity bursts.
- The actor maintains a structured, multi-component malware ecosystem that supports victim profiling, selective follow-on activity against higher-value targets, and long-term collection priorities aligned with intelligence gathering.
- Infrastructure observations indicate frequent rotation and parallelization, consistent with an actor that plans for disruption and prioritizes survivability of operations across time and geography.
- The group has incorporated modern, low-friction communication channels into its operations, indicating an intent to improve reliability and responsiveness while blending into common enterprise traffic patterns.
- Immediate Actions: Prioritize internal scoping for potential exposure by identifying business units, roles, and geographies that align with the actor’s historic targeting patterns and ensure incident response pathways are ready for rapid triage if related activity is discovered.
1.0 Threat Overview
Infy, publicly tracked as Prince of Persia, was first widely documented in the mid-2010s, though retrospective analysis later established activity dating back to at least 2004–2007. Early campaigns demonstrated a clear emphasis on espionage objectives, with targets primarily consisting of Iranian dissidents, media organizations, government entities, and diplomatic personnel. Unlike financially motivated actors, Infy showed little interest in monetization, instead focusing on long-term access, surveillance, and intelligence collection. This targeting profile, combined with infrastructure and operational characteristics, strongly aligned the group with Iranian state interests from its earliest observed operations.
In 2016, public exposure and subsequent infrastructure disruption significantly impacted Infy’s active campaigns, temporarily reducing visibility into its operations. However, follow-on research in subsequent years showed the group resurfaced with reworked malware families and improved operational discipline, suggesting an ability to absorb setbacks and adapt rather than abandon activity. The period between 2017 and 2021 was marked by steady technical iteration, expanded tooling, and experimentation with multiple infection vectors, reinforcing the assessment of a well-resourced and strategically guided actor. After 2022, Infy appeared to go quiet from a public reporting perspective, leading to assumptions that the group had either deprioritized operations or dissolved. Recent longitudinal research contradicts this view, showing that the actor continued operating under reduced visibility while refining infrastructure and tooling. By 2024–2025, observable activity again increased, revealing a threat actor that had used the intervening years to mature its tradecraft and prepare for sustained future operations rather than disengaging entirely.
2.0 Threat Actor Breakdown
Infy, widely known as the “Prince of Persia,” is one of the longest-running Iranian-aligned cyber espionage operations observed to date. The actor’s operational history spans nearly two decades, during which it has consistently aligned with Iranian intelligence priorities, preferred targeted access over scale, and demonstrated a disciplined approach to campaign management. Unlike opportunistic or financially motivated groups, Infy’s activity reflects strategic patience, with tooling and infrastructure built to support surveillance, profiling, and selective exploitation of high-interest targets.
The group’s campaigns clearly emphasize continuity. Even after periods of public exposure and infrastructure disruption, Infy has repeatedly re-emerged with refined tradecraft rather than abandoning operations. This pattern suggests centralized direction, institutional knowledge retention, and resourcing sufficient to sustain long-term development cycles. Observed behaviors, including careful victim vetting, active removal of low-value infections, and parallel testing infrastructure, further indicate an actor that prioritizes operational security and intelligence value.
Recent activity through late 2025 reinforces assessments that Infy remains an active and evolving threat. New campaign waves, updated malware families, and expanded communication mechanisms point to renewed confidence and operational scale. The group’s ability to operate quietly for extended periods while continuing to modernize its capabilities places it among the more persistent and strategically relevant Iranian cyber espionage actors currently tracked.
3.0 Tradecraft Overview and Targeting Strategy
Operational Philosophy: Infy follows a disciplined, intelligence-driven operational model focused on discretion and long-term access rather than speed or volume. The actor uses a staged intrusion approach, first establishing limited footholds to assess victim relevance before committing additional resources. Only systems deemed strategically valuable receive follow-on tooling, indicating consistent human oversight and selective escalation. This model reduces operational noise, limits exposure, and enables sustained espionage campaigns over extended periods.
4.0 Historical Exploit Timeline
5.0 Risk and Impact
Infy poses a sustained intelligence risk to organizations and individuals aligned with governmental, diplomatic, and politically sensitive functions. The actor’s focus on long-term access and selective targeting increases the likelihood of prolonged, undetected compromise rather than immediate, disruptive outcomes. Successful operations enable the quiet collection of sensitive communications, strategic intent, and contextual insight that can inform broader state objectives over time. The cumulative impact is not limited to individual victims but extends to institutional trust, policy confidentiality, and the strategic advantage gained through persistent visibility into decision-making environments. Over time, this access can influence negotiation positions, policy formulation, and strategic planning without overt signals of compromise.
6.0 Recommendations for Mitigation
- Targeted Document-Based Initial Access: Watch for spearphishing campaigns using contextually relevant Microsoft Office documents, particularly Excel files, that rely on user interaction rather than exploits to gain an initial foothold.
- Staged Victim Profiling Behavior: Look for early-stage activity that gathers system, user, and environment details without immediate follow-on actions, indicating assessment of a system’s intelligence value.
- Execution-to-Communication Correlation: Correlate user-initiated document execution with delayed external communications occurring days or weeks later to surface selective escalation and human-driven targeting.
- DGA Pattern Analytics: Detect recurring, structured domain access patterns across hosts and time, even when individual DNS events appear isolated or low risk.
- Operational Cleanup Indicators: Identify deliberate malware removal, access withdrawal, or process termination on low-value systems, which often signals an espionage actor attempting to minimize exposure rather than an unsuccessful intrusion.
7.0 Hunter Insights
Infy is poised to remain a persistent Iranian espionage fixture over the next several years, with recent reporting indicating not a revival but a maturation of a nearly two‑decade campaign that now operates at a greater scale and geographic reach than previously understood. Continuous tooling upgrades, Telegram-enabled command-and-control, and aggressive infrastructure rotation suggest that future operations will emphasize quiet, long-dwell access to government, diplomatic, civil society, and critical‑infrastructure–adjacent networks, with selective targeting and deliberate cleanup of low‑value hosts, keeping detection opportunities narrow.
Looking forward, Infy will likely deepen its focus on document-driven spearphishing, staged victim profiling, and DGA-backed domain infrastructure to evade static controls while expanding beyond dissident communities into higher-value government and policy environments in Europe, the Middle East, South Asia, and North America. Organizations fitting this profile should expect more low-noise campaigns in which the primary indicators are subtle: carefully crafted lures in local languages, delayed C2 after user execution, and periodic malware withdrawals that mask long-term intelligence collection, making high-fidelity spearphish detection, execution-to-network correlation, and DGA analytics critical to disrupting future Infy activity.