Prayer Apps Hacked, News Sites Hijacked: Cyber Warfare in the Iranian War

Representational image of Iranian protests

This post is also available in: עברית (Hebrew)

Modern conflicts no longer unfold solely on physical battlefields. Alongside kinetic strikes, digital infrastructure has become both a target and a weapon. The opening hours of “Operation Epic Fury” illustrated this dynamic, as coordinated military strikes were accompanied by widespread cyber disruption and information control measures.

Within hours of the reported attacks, internet connectivity inside Iran dropped to roughly 1% of normal levels, according to monitoring data cited in the reports. The sharp decline occurred in two major waves, leaving only minimal traffic visible. The blackout was described as regime-imposed, with limited connectivity potentially maintained through a government whitelisting system that allows selected groups to remain online.

According to Cyber News, at the same time, several prominent digital platforms were compromised; the BadeSaba Calendar prayer application, downloaded more than five million times via Google Play alone, was reportedly hacked. Users received push notifications in Persian encouraging members of the armed forces to defect, including messages stating that “help has arrived” and calling for a reckoning. In parallel, state-affiliated news websites, including the IRNA news agency, were said to have been hijacked to display anti-government messages referencing the strikes.

Cybersecurity firms have warned that the digital dimension of the conflict may intensify. Analysts flagged the possibility of retaliatory activity from Iran-aligned groups, potentially targeting military, commercial or civilian organizations linked to perceived adversaries. Tactics could include distributed denial-of-service (DDoS) attacks, ransomware, destructive “wiper” malware, phishing campaigns and website defacements. Past campaigns attributed to such actors have involved credential theft, lateral network movement and public release of stolen data.

Regional governments have also moved to contain the information environment. The United Arab Emirates issued a warning that sharing unverified war-related information could trigger penalties under its cybercrime legislation. Fines may range from $27,000 to $272,000, with imprisonment possible in serious cases.

For defense and homeland security agencies, the events underscore how cyber operations, information control and infrastructure resilience are now integral to modern warfare. Connectivity, digital platforms and public communication channels have become strategic assets — and strategic vulnerabilities — in parallel with conventional military capabilities.