Why Irans digital walls are crumbling after the US Israel strikes

Why Irans digital walls are crumbling after the US Israel strikes

The missiles weren't the only things hitting Tehran this weekend. While physical strikes targeted IRGC command centers and air defense batteries, a massive digital offensive essentially flicked the "off" switch on Iran’s internet. If you think cyber warfare is just about stealing emails, look at what happened to BadeSaba. This isn't just an app; it's a religious calendar used by over five million people, mostly government supporters. On Saturday, it didn't tell them prayer times. It told them "It’s time for reckoning" and urged the military to drop their guns.

This wasn't a random prank by a bored teenager. It was a coordinated effort to paralyze a nation's ability to even talk to itself while being bombed. When the joint US-Israeli "Operation Roar of the Lion" began, the digital front didn't just support the kinetic one—it blinded the defenders.

The day the internet died in Iran

Most people don't realize how fragile a nation's connectivity is until it hits zero. According to NetBlocks and Doug Madory from Kentik, internet traffic in Iran plummeted to a staggering 4% of its normal levels. That’s not a "slowdown." That’s a total blackout.

The timing was surgical. The first drop hit at 0706 GMT, followed by another at 1147 GMT. By cutting the cord, the attackers didn't just stop people from tweeting. They effectively severed the nervous system of the Islamic Revolutionary Guard Corps (IRGC). Without reliable data flow, coordinating a counter-response to incoming stealth fighters becomes a nightmare.

Psychological warfare via push notification

The hack on BadeSaba is the part that should keep security experts awake at night. In the past, we saw "defacement"—changing a website's homepage to a flag or a manifesto. This was different. By hijacking a trusted, high-engagement religious app, the hackers bypassed state media filters and went straight to the pockets of the regime's core demographic.

It’s a brutal psychological play. When your most trusted app starts telling you the government is falling, the sense of panic is immediate. Other platforms didn't escape either. Official mouthpieces like IRNA and the IRGC-linked Tasnim news agency were knocked offline or manipulated to show anti-regime messages. For a few hours, the only narrative available was the one the attackers wanted Iranians to see.

Why this hack was smarter than usual

  • Targeting loyalty: Most hackers go for government sites. Targeting a religious calendar app hits the people who actually support the status quo.
  • Timing with kinetic strikes: Doing this while bombs are falling creates a "fog of war" that makes it impossible for the population to know what’s real.
  • Communication blackout: By hitting Tosan—a major digital service provider—the attackers likely crippled banking and official services simultaneously.

The banking system is the soft underbelly

Let's talk about the money. Iran’s banking sector has been a punching bag for years, but this latest wave shows they haven't learned much. Back in September 2024, a group called IRLeaks reportedly squeezed a $3 million ransom out of the regime after hitting 20 different banks. Fast forward to this weekend, and we're seeing similar patterns of systemic failure.

When services like Snapp (ride-hailing) or Tapsi go down, it’s an inconvenience. When the national payment network, Shaparak, glitches out during a military strike, it’s a catastrophe. People can't buy food, fuel, or medicine. You don't need to drop a bomb on a grocery store if you can just make sure nobody's credit card works.

Retaliation is coming and it wont be pretty

Don't expect Iran to just sit there. Historically, their response to being embarrassed digitally is to strike back at "soft" targets in the West. We've already seen warnings from firms like Sophos and CrowdStrike. They’re tracking groups like MuddyWater and APT42, which are likely retooling as you read this.

What does an Iranian counter-offensive look like? Usually, it's not a direct hit on the Pentagon. It’s more likely to be:

  1. Wiper attacks: Malware designed to simply erase data on Israeli or US commercial servers.
  2. DDoS storms: Flooding websites with so much traffic they collapse.
  3. Leak operations: Re-releasing old data breaches as "new" to create a sense of ongoing vulnerability.

The "Cyber Islamic Resistance" and other state-aligned groups have already started poking at Israeli industrial control systems. If you're running a business in the energy or water sectors anywhere in the Middle East, you're officially in the crosshairs.

What you should do right now

If you’re a business owner or a tech lead, the "Iran-Israel" conflict isn't just a headline—it's a threat to your uptime. The spillover from these digital skirmishes is real.

  • Isolate your ICS: If you manage industrial systems, get them off the public internet. This is how the "Handala" group makes its name.
  • Audit your service providers: The hack on Tosan proves that you’re only as secure as the person providing your software.
  • Update your disaster recovery: If your primary and backup sites are on the same network, a "wiper" attack will kill both. Keep an offline, air-gapped backup of your most critical data.

The war for Iran is being fought on two fronts. One uses F-35s, and the other uses lines of code. Right now, the code is doing just as much damage. If your defense strategy doesn't account for both, you're already behind.

EM

Eli Martinez

Eli Martinez approaches each story with intellectual curiosity and a commitment to fairness, earning the trust of readers and sources alike.