Morning Overview

Hackers cripple Iranian apps after US-Israeli strikes rock region

Hackers seized control of a widely used Iranian prayer-timing app on February 28, 2026, pushing messages that urged security forces to surrender and defect amid airstrikes on Iran that were widely reported at the time. The breach of the BadeSaba Calendar app lasted roughly 30 minutes and reached users at a moment when Iran’s internet connectivity had already collapsed to a fraction of normal levels. The incident is a stark example of how civilian technology can be used to carry propaganda-style messaging during an active military conflict.

Prayer App Turned Into a Propaganda Channel

The coordinated messages began appearing on BadeSaba Calendar at approximately 9:52 a.m. Tehran time, according to translated screenshots reviewed by reporters. For about 30 minutes, the app displayed text calling on Iranian security forces to lay down their arms and defect, a direct appeal timed to coincide with kinetic strikes already underway. The messages were not subtle or ambiguous. They addressed military and security personnel by role, framing surrender as a path to personal survival and suggesting that continued resistance would be futile in the face of superior firepower.

No group has publicly claimed responsibility for the hack, and no Iranian government statement on the breach’s scope or the number of users who received the messages has surfaced in available reporting. The absence of attribution matters because it leaves open whether the operation was state-backed, linked to intelligence services involved in the broader military campaign, or carried out by independent actors exploiting the chaos of an active conflict. What is clear is that the attackers chose a civilian tool embedded in daily religious practice, a decision that maximized reach while blurring the line between warfare and everyday life. By subverting a trusted religious utility rather than a news app or social platform, the hackers targeted both information flows and spiritual routines.

Internet Blackout Left Iranians in the Dark

The app hack landed during a period when most Iranians had almost no access to the open internet. Network monitoring data cited in contemporaneous reporting indicated that Iran’s national connectivity fell to roughly 4 percent of ordinary levels on February 28, around the time the strikes began. That near-total blackout meant most citizens could not verify news, contact family, or access international platforms. Domestic apps like BadeSaba Calendar, however, could still function for some users on Iran’s domestic network, which helped make the prayer app an effective delivery vehicle for the hackers’ messages amid the surrounding information void.

The February blackout followed a pattern established weeks earlier. Iran imposed a nationwide internet shutdown starting January 8, 2026, when traffic measurements recorded connectivity dropping to near zero around 20:00 local time. That cutoff severed almost all access to the global internet and left only tightly controlled domestic infrastructure operating. A phased rollback began in mid-January, with SMS restored first, then domestic apps and the national network, and finally limited international access, according to regional reporting on the restoration sequence. NetBlocks reported connectivity at around 2 percent of normal during that early rollback phase, underscoring how little external information could reach ordinary users even as some services flickered back to life.

Selective Connectivity as a Control Strategy

Iran’s approach to internet access is not a simple on-off switch. Data from Cloudflare and Kentik, cited by international coverage, showed uneven restoration patterns with clear throttling and whitelisting behavior after the January shutdown. Domestic services were brought back online while international platforms remained blocked or severely restricted. Filterwatch, an independent monitoring group, tracked these restrictions and confirmed that Iranian authorities were actively managing which parts of the internet citizens could reach. The system allowed the government to maintain an information advantage: Iranians could use approved local apps but could not access outside news sources or encrypted messaging platforms that might coordinate dissent or spread unfiltered accounts of the conflict.

That whitelisting strategy, however, created the exact vulnerability the prayer app hackers exploited. By keeping domestic apps alive while cutting off international connectivity, Iranian authorities ensured that tools like BadeSaba Calendar had a captive audience. When attackers compromised the app, they reached users who had few alternative information sources and little ability to cross-check what appeared on their screens. The irony is sharp: a control mechanism designed to limit outside influence became the channel through which hostile messaging entered Iranian homes. Prior analysis of Iran’s selective restoration had already flagged the risks of a system where only government-approved apps function, but the BadeSaba breach turned that theoretical concern into a concrete security failure that played out in real time under the pressure of airstrikes.

Cyber Operations as a Second Front

The prayer app incident fits into a broader pattern where digital operations run parallel to military strikes, each amplifying the other’s effect. Physical attacks force governments to restrict communications in an effort to control the narrative and prevent coordination among opponents. But those same restrictions concentrate civilian attention on a smaller number of approved digital tools, making each one a higher-value target for adversaries. The BadeSaba hack demonstrates that this cycle can be exploited during active hostilities: as bombs fell and connectivity collapsed, a single compromised app became a megaphone for messages aimed at undermining morale inside Iran’s security apparatus.

Most coverage of the U.S.-Israeli strikes has focused on military targets, air defense systems, and diplomatic fallout, with comparatively little attention to the information operations that unfolded alongside them. Yet the effects of the cyber dimension on Iranian society may prove more durable. A population that cannot trust its prayer app to deliver accurate information, that wonders whether the next push notification will be a call to prayer or a call to defect, faces a kind of instability that outlasts any single airstrike. The hack did not destroy infrastructure or cause casualties. It did something different: it injected doubt into a routine act of faith, and it did so at the precise moment when Iranians had almost no way to verify what was real or to access independent reporting from abroad.

Attribution, Trust, and the Next Phase of the Conflict

No public evidence ties the BadeSaba breach to any government or military entity, and real-time observations from network-monitoring accounts did not identify a responsible party. That ambiguity is itself a feature of modern information warfare, where deniability matters almost as much as impact. If the operation was conducted by state actors, the lack of a signature allows them to test new tactics without inviting immediate retaliation. If non-state hackers were responsible, the incident shows how readily civilian infrastructure can be turned into a psychological weapon when basic security practices fail. Either way, attribution gaps complicate any effort to deter similar operations in the future, since potential perpetrators can assume they will be difficult to name and shame.

The breach also raises questions about how ordinary Iranians will navigate their digital lives as the conflict and its information battles continue. Religious and calendar apps occupy a uniquely intimate space on many phones, sitting alongside messaging tools, banking services, and health trackers. Once that space is compromised, users may become more cautious about installing updates, granting permissions, or trusting notifications, even from long-standing developers. That erosion of trust could push some toward offline religious practice and analog information sources, while others seek out tools and guides from international outlets, including technology-focused publications and digital security resources that explain how to harden devices against manipulation. Whatever choices individuals make, the BadeSaba incident has ensured that the next phase of the conflict will not be fought only in the skies over Iran but also in the fragile, contested terrain of everyday apps and the faith people place in them.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.