In partnership with

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.

The Future of Shopping? AI + Actual Humans.

AI has changed how consumers shop by speeding up research. But one thing hasn’t changed: shoppers still trust people more than AI.

Levanta’s new Affiliate 3.0 Consumer Report reveals a major shift in how shoppers blend AI tools with human influence. Consumers use AI to explore options, but when it comes time to buy, they still turn to creators, communities, and real experiences to validate their decisions.

The data shows:

  • Only 10% of shoppers buy through AI-recommended links

  • 87% discover products through creators, blogs, or communities they trust

  • Human sources like reviews and creators rank higher in trust than AI recommendations

The most effective brands are combining AI discovery with authentic human influence to drive measurable conversions.

Affiliate marketing isn’t being replaced by AI, it’s being amplified by it.

Infy APT Resurfaces After Years of Silence, Expands Covert Espionage Operations

Security researchers have confirmed renewed activity from Infy, an Iranian-linked advanced persistent threat (APT) group also known as Prince of Persia, marking a significant resurgence after several years of relative silence. New findings indicate that the group has not only remained active but has refined its tooling, infrastructure, and operational security.

The campaign demonstrates long-term persistence, stealth-focused command-and-control (C2) validation mechanisms, and expanded geographic targeting. These developments reinforce Infy’s role as a durable cyber-espionage actor rather than a dormant or disbanded group.

Context

Infy is among the longest-running APT groups on record, with documented activity dating back to at least 2004. Despite its longevity, it has historically drawn less attention than other Iran-aligned groups such as Charming Kitten, MuddyWater, or OilRig.

Earlier campaigns primarily relied on phishing-delivered malware designed for profiling and selective follow-on exploitation. SafeBreach’s latest research shows that these foundational tactics remain intact, but the group’s operational maturity has advanced considerably.

What Happened

SafeBreach identified an active and previously undisclosed campaign using updated versions of Infy’s malware toolset. Victims span Iran, Iraq, Turkey, India, Canada, and multiple European countries.

The activity includes refreshed variants of the Foudre downloader and the Tonnerre second-stage implant. The most recent Tonnerre samples were observed as late as September 2025, contradicting assumptions that the group had gone inactive after 2022.

Technical Breakdown

Infy’s infection chain begins with phishing emails that now embed executables inside Microsoft Excel documents, replacing earlier macro-based delivery.

Once executed, Foudre profiles the victim system and selectively deploys Tonnerre to high-value targets. The group uses a domain generation algorithm (DGA) to rotate C2 infrastructure and reduce takedown risk.

A notable defense-evasion feature is Infy’s domain authentication process. Malware verifies C2 legitimacy by downloading a daily RSA-signed file, decrypting it with an embedded public key, and validating it locally before communicating.

Recent Tonnerre versions also introduce Telegram-based C2 support, with configuration files selectively served only to specific victim identifiers, further limiting exposure.

Impact Analysis

The campaign is firmly aligned with cyber-espionage objectives rather than financial crime or disruption. Data exfiltration, long-term access, and stealthy persistence are clear priorities.

The selective deployment model suggests intelligence-driven targeting, where only systems of strategic interest receive advanced implants or interactive control.

Why It Matters

Infy’s resurgence highlights a broader trend among state-aligned threat actors: low-noise operations optimized for endurance rather than visibility.

The use of cryptographic validation, DGAs, and restricted secondary payload delivery demonstrates a high level of operational discipline designed to frustrate detection and infrastructure mapping.

Expert Commentary

“Despite the appearance of having gone dark, Prince of Persia has remained active, adaptive, and dangerous,” said Tomer Bar, VP of Security Research at SafeBreach.

“The group’s emphasis on C2 validation and selective victim handling shows a mature espionage operation that prioritizes resilience over scale.”

Key Takeaways

  • Infy has been active continuously, despite limited public reporting since 2022

  • Updated malware shows improved stealth and infrastructure validation

  • Targeting spans the Middle East, Europe, South Asia, and North America

  • Telegram-based C2 adds flexibility while limiting exposure

  • The campaign underscores the persistence of long-lived APT actors

Keep Reading

No posts found