BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /Iranian Prayer App Compromised for US/Israeli Propaganda Campaign

Iranian Prayer App Compromised for US/Israeli Propaganda Campaign

March 5, 2026Nation-State & APT2 min readmedium

Originally reported by Schneier on Security

#nation-state#mobile-apps#propaganda#iran#supply-chain
Share

TL;DR

A popular Iranian prayer app with over 5 million downloads was allegedly compromised by US and/or Israeli intelligence services to broadcast propaganda messages to users immediately following explosions in Iran. The rapid deployment suggests pre-existing access to the application infrastructure.

Why medium?

State-sponsored compromise of popular mobile app for psychological operations represents significant nation-state activity, but no technical exploitation details or broader security implications disclosed.

Mobile App Weaponized for Information Operations

A popular Iranian prayer application has been compromised and used as a vehicle for what appears to be a coordinated US/Israeli propaganda campaign, according to security researcher Bruce Schneier's analysis of a Wired investigation.

The BadeSaba Calendar app, downloaded over 5 million times from the Google Play Store, began sending unauthorized push notifications to Iranian users shortly after explosions occurred in Iran. The messages started at 9:52 AM Tehran time with the phrase "Help has arrived," followed by additional notifications over a 30-minute period.

Indicators of State-Level Operation

Schneier notes the operational tempo suggests government-level capabilities rather than opportunistic hackers. The coordinated timing of the messaging campaign immediately following the explosions indicates pre-positioned access to the application's notification infrastructure.

"It happened so fast that this is most likely a government operation," Schneier observed. "I can easily envision both the US and Israel having hacked the app previously, and then deciding that this is a good use of that access."

No group has claimed responsibility for the compromise. The technical details of how the app's notification system was accessed remain undisclosed.

Supply Chain Implications

The incident demonstrates how widely-distributed mobile applications can serve as platforms for information warfare operations. Prayer and calendar applications typically maintain persistent connections and notification permissions, making them attractive targets for psychological operations campaigns.

The compromise of BadeSaba Calendar represents a significant supply chain attack affecting millions of Iranian users, highlighting the dual-use potential of legitimate mobile applications in nation-state operations.

Sources

  • https://www.schneier.com/blog/archives/2026/03/hacked-app-part-of-us-israeli-propaganda-campaign-against-iran.html

Originally reported by Schneier on Security

Tags

#nation-state#mobile-apps#propaganda#iran#supply-chain

Threat Actors

🏴Play

Tracked Companies

πŸ‡ΊπŸ‡ΈGoogle

Related Intelligence

  • Nation-State Roundup: Iran-Nexus APT Targets Iraq Officials, Phobos Admin Pleads Guilty, Multi-Year Campaign Exposed

    highMar 6, 2026
  • Iran Conflict Escalation Raises Critical Infrastructure Cyber Threat Concerns

    highMar 2, 2026
  • Iranian APT Groups Intensify Cyber Operations Against U.S. and Middle East Infrastructure

    highMar 7, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Israeli Intelligence Compromised Tehran Traffic Camera Network for High-Value Target Surveillance

Next Article

Active Exploitation Surge: Cisco SD-WAN Flaws, iOS Exploit Kit, and Law Enforcement Disruptions β†’