top of page
wallpaper-cc-azul_png_edited.jpg

Cyber War: Iranian apps and websites are hacked following joint U.S.-Israel offensive

  • Writer: Security Team
    Security Team
  • 23 hours ago
  • 3 min read


In the context of the recent ongoing military developments in the Middle East, ICS Labs' CTI has identified that a wave of cyber operations hit Iran in the early hours of Saturday (1st), in parallel with the military attacks carried out by the United States and Israel against targets on Iranian territory. Experts warn that the episode may mark the beginning of a digital escalation with possible retaliation against American and Israeli interests.

Among the main reported incidents is the breach of the religious application BadeSaba, an Islamic calendar with more than 5 million downloads. Users reported that the platform began displaying messages such as “It’s time for reckoning” and calls for members of the armed forces to lay down their weapons and join the civilian population.

In addition to the application, several Iranian news websites were compromised to display political messages. Reuters reported that it was unable to reach the CEO of BadeSaba for clarification, and the U.S. Cyber Command has not officially commented on the case so far.


Connectivity drop and possible internal containment

Data from Doug Madory, Director of Internet Analysis at Kentik, indicates that connectivity in Iran experienced abrupt drops at 07:06 GMT and again at 11:47 GMT, leaving only minimal connectivity at certain moments. The measure may indicate internal attempts at containment or mitigation of cyber impacts.

According to Hamid Kashfi, security researcher and founder of DarkCell, the choice of BadeSaba as a target was strategic, considering that the application is widely used by government supporters and religious audiences.


Risk of retaliation and digital escalation

Experts suggest that groups aligned with Iran and hacktivists may launch retaliatory attacks against military, commercial, and civilian targets linked to the U.S. and Israel. Rafe Pilling, Director of Threat Intelligence at Sophos, highlighted that potential actions include simple attempts against industrial systems exposed to the internet, DDoS (denial‑of‑service) attacks to take online services offline, and direct offensive operations.

Security company CrowdStrike stated that it is already observing activity consistent with Iran‑aligned groups conducting target reconnaissance and initiating DDoS attacks.

Meanwhile, Anomali reported signs of “wiper” attacks designed to permanently erase data targeting Israeli entities even before the military offensive.


History of moderate cyber responses

Although Iran is frequently cited by U.S. authorities alongside Russia and China as a significant threat in cyberspace, previous responses from Tehran to direct attacks on its territory have been considered limited. After a U.S. attack on Iranian nuclear facilities in June, for example, there were no records of major digital offensives, only a temporary service disruption in Tirana, the capital of Albania.


Recommendations for security teams

Given this scenario, organizations should strengthen monitoring of anomalous traffic and DDoS attempts, especially in environments dependent on major Western virtualization and cloud providers. Additionally, it is essential to update and validate incident response plans involving destructive attacks and other techniques commonly used by malicious actors with ideological or geopolitical motivations.

 

 Sources:



 
 
 

Comments


wallpaper-cc-azul_png_edited.jpg

CONTATO

ICS Labs

Sua melhor estratégia de defesa

© 2026 ICS - Inorpel CyberSecurity

wallpaper-cc-azul_png_edited.jpg

CONTACT

JOÃO PESSOA

 

Rua Jose Soares de Medeiros, 1620

Bloco E Módulos 2, 3 e 4, Térreo.

Cabedelo - PB - CEP: 58105-015

ICS Labs

Your best defense strategy

© 2025 ICS - Inorpel CyberSecurity

bottom of page