BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Iranian Prayer App BadeSaba Compromised to Broadcast Anti-Government Messages

Iranian Prayer App BadeSaba Compromised to Broadcast Anti-Government Messages

March 3, 2026Data Breaches & Incidents2 min readmedium

Originally reported by Hackread

#iran#mobile-app#hacktivism#supply-chain#social-engineering
Share

TL;DR

Hackers breached BadeSaba, a widely-used Iranian prayer and calendar application, using the platform to distribute anti-government messages and calls for military defection. The incident highlights the vulnerability of mobile applications as vectors for politically motivated attacks.

Why medium?

While the compromise of a popular mobile application represents a significant security incident affecting potentially millions of users, the primary impact appears to be propaganda dissemination rather than data theft or system disruption.

Incident Overview

Attackers successfully compromised BadeSaba, a popular Iranian prayer and calendar application, transforming the religious platform into a vehicle for anti-government messaging. According to Hackread's reporting, the breach enabled unauthorized parties to send push notifications containing "Help Is on the Way" alerts alongside messages specifically targeting Iranian military personnel with calls to "lay down weapons."

Technical Details

The compromise appears to have granted attackers control over the application's notification system, allowing them to bypass normal content moderation and push politically charged messages directly to users' devices. BadeSaba serves as both a prayer time calculator and Islamic calendar application, making it a high-value target due to its widespread adoption among Iranian users.

The specific attack vector remains unclear, though the ability to send arbitrary push notifications suggests either:

  • Compromise of the application's backend infrastructure
  • Unauthorized access to administrative controls
  • Supply chain attack affecting the notification delivery system

Impact Assessment

The incident represents a significant breach of user trust and highlights the vulnerability of mobile applications to politically motivated attacks. Prayer applications typically maintain high user engagement and trust levels, making them effective platforms for message dissemination when compromised.

The targeting of military personnel through the compromised application suggests the attack may be part of broader information operations aimed at undermining Iranian government stability.

Implications for Mobile Security

This incident underscores several critical mobile application security concerns:

  • Administrative Access Controls: Insufficient protection of notification broadcast capabilities
  • Content Validation: Lack of automated filtering for unauthorized or malicious content
  • Infrastructure Hardening: Potential weaknesses in backend systems protecting user-facing services

Sources

  • https://hackread.com/popular-iranian-app-badesaba-hacked-alerts/

Originally reported by Hackread

Tags

#iran#mobile-app#hacktivism#supply-chain#social-engineering

Related Intelligence

  • Weekly Security Roundup: Teramind Phishing Campaign Targets Remote Workers

    mediumMar 2, 2026
  • Security Affairs Weekly: Canadian Tire Breach Hits 38M Users, Iran Internet Blackout Continues

    mediumMar 1, 2026
  • Iranian Prayer App Compromised for US/Israeli Propaganda Campaign

    mediumMar 5, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Wiz Details Visibility Gaps in Modern AI Application Security

Next Article

Digital Frontlines: AI Deception Networks, Iranian Internet Blackouts, and GPS Warfare →