As U.S. and Israeli forces launched coordinated strikes on Iran during Operation Epic Fury, a separate battle unfolded in the digital space. Cyber operations targeted Iranian infrastructure while false warnings circulated among U.S. military personnel, creating confusion amid genuine security threats.
On March 1, 2026, a viral message claiming to be from U.S. Cyber Command spread through military channels, falsely warning service members that Uber, Snapchat, and Talabat were compromised. Pentagon officials quickly denied issuing the warning. Meanwhile, hackers breached BadeSaba, a prayer app used by over 5 million Iranians, sending messages urging military defections as strikes commenced.
The cyber landscape grew more complex as Iran’s internet connectivity collapsed and decentralized hacker groups launched retaliatory operations. With Iranian leadership decimated by the strikes, cyber operations shifted from centralized command to autonomous actors coordinating through platforms like Telegram and Reddit.
Timeline of Cyber Operations
Key events during Operation Epic Fury and cyber response
Decentralized Cyber Operations Create Unpredictability
The cyber threat landscape shifted dramatically following the strikes on Iranian leadership. With Tehran’s central command structure decimated, cyber operations transitioned from organized state-directed campaigns to decentralized actions by autonomous groups.
Kathryn Raines, a former NSA expert now serving as threat intel team lead at Flashpoint, explained the implications: “The Iranian leadership vacuum is likely going to lead to more unpredictable, decentralized proxy attacks. It’s in the hands of a 19-year-old hacker in a Telegram room with really no oversight or direction.”
This shift means aligned hacktivists and proxy groups make their own targeting decisions without approval from central authorities. If an aggressive group decides to target a mid-sized logistics firm, the risk cascades beyond major capitals like Tehran, Washington, or New York.
Active Cyber Threat Categories
Understanding the multifaceted cyber risks facing organizations
Decentralized Proxy Attacks
With Iranian leadership gone, cyber operations have become unpredictable. Autonomous hackers in coordination channels can strike targets without central oversight, making traditional threat modeling based on state behavior less reliable.
Psychological Operations
Attacks designed to target employee mental state and trust rather than steal data. The BadeSaba hack demonstrated how trusted apps can deliver misinformation directly to personal devices, creating panic and confusion.
Misinformation Campaigns
False warnings attributed to official sources spread rapidly on social media. The fake Cybercom message reached hundreds of thousands of views before Pentagon officials debunked it, showing how quickly false information propagates.
Infrastructure Targeting
The NSA, CISA, FBI, and Pentagon’s Cyber Crime Center warned that Iranian-affiliated actors routinely target poorly secured U.S. critical infrastructure in retaliation for military operations.
Deepfake Communications
Experts warn of potential deepfake audio attributed to regional leaders or CEOs. When local news is offline and employees have limited fact-checking ability, distinguishing legitimate from false communications becomes nearly impossible.
Supply Chain Disruption
Previous Iranian operations included shutting down gas stations in Jordan and attacks against U.S. and Israeli military providers to destroy data and conduct psychological operations.
Understanding the Threat Landscape
Key questions about cybersecurity during military operations
Corporate Security Recommendations
Essential measures for organizations during heightened cyber threats
Verify Communications
Establish out-of-band verification protocols for critical communications, especially from leadership. Use multiple channels to confirm instructions during crises when primary systems may be compromised.
Assess Recovery Time
Determine the maximum offline time for business functions before revenue and reputation impact. Focus on recovery capabilities over prevention alone, as Raines notes: “We’re less interested in the block rate, and more interested in recovery time.”
Evaluate Risk Exposure
Assess whether your business faces elevated risk based on geographic presence, industry sector, or operational dependencies in affected regions. Avoid assumptions that only major corporations are targets.
Partner Intelligence Sharing
Engage with partners and security communities to understand how they detect attacks and what AI tools are being deployed for threat detection. Collaborative intelligence improves collective defense.
Monitor Employee Apps
Be aware of consumer applications employees use for work purposes. The BadeSaba hack demonstrates how trusted apps can become attack vectors, delivering false information or malicious content.
Plan for Communication Disruption
Develop protocols for when normal communication channels are compromised or unreliable. Establish alternative methods for employee verification, coordination, and fact-checking during information blackouts.
Coverage Summary
The events during Operation Epic Fury were discussed, including the false U.S. Cyber Command warning that spread through military channels on March 1, 2026. The BadeSaba Calendar app breach was covered, showing how over 5 million users received defection messages during the strikes. Iran’s internet blackout was documented, with connectivity dropping to 4% of normal levels before reaching 1% after 36 hours.
The shift from centralized to decentralized cyber operations was examined, with quotes from former NSA expert Kathryn Raines and former CIA Special Activities Center director Brian Carbaugh explaining the implications. The “Great Epic” campaign and coordination through Telegram and Reddit were detailed. Corporate security gaps regarding psychological operations were addressed, along with recommendations for organizations.
Information was presented from official sources including DefenseScoop, the National Security Agency, NetBlocks, and cybersecurity firm Flashpoint. The material covered demonstrates how cyber warfare operates alongside conventional military operations and how misinformation spreads during conflicts.
Official Sources and First-Hand Reporting
Verified information from authoritative sources






