Breaking 17:00 Verdun court fines organizer of memorial mass for Pétain over Holocaust denial remarks 16:45 Ubisoft flags further losses after record annual hit 16:30 Amazon.com wins appeal in tariff evasion case 16:20 Three supertankers move six million barrels through Hormuz 16:15 James Murdoch expands media footprint with Vox Media acquisitions 16:01 U.S and Israel planned postwar iran leadership shift with ahmadinejad 16:00 Two French children found alone by roadside in Portugal 15:46 Samsung labor union suspends strike after last-minute deal 15:45 Pressure mounts on Patrick Bruel as concerts are cancelled and new complaints emerge 15:36 Binance suspends ethereum transfers for scheduled wallet maintenance 15:30 Southwest Airlines plans major expansion of India innovation hub to 1,000 employees 15:27 Sumud flotilla interception sparks diplomatic tensions after Israel operation 15:15 Court rules wife of former northern Ireland politician unfit to stand trial 15:07 Casablanca club honors top chefs and restaurants 2026 awards 15:00 Italian unions report strong participation in strike against Kering restructuring plan 14:54 France and Morocco prepare historic state visit of HM King Mohammed VI 14:51 Morocco tax expert urges broader fiscal base reform 14:45 European Union says Ebola infection risk remains very low 14:35 UN and France praise Morocco’s role in peacekeeping diplomacy in Rabat 14:30 Marco Rubio calls for a “New Path” for Cuba amid rising tensions with Havana 14:24 Morocco approves 3,000 MW of renewable energy projects in early 2026 14:15 Elon Musk could become the first trillionaire following SpaceX stock market debut 14:00 Intuit announces major workforce reduction to strengthen AI strategy 13:59 Morocco calls for more flexible UN peacekeeping mandates 13:45 Hungary seeks Poland’s experience in rule of law and anti-corruption reforms 13:35 Morocco’s poultry sector defends safety standards amid online health concerns 13:30 France appoints Philippe Lalliot as new ambassador to Morocco 13:17 Morocco opens $2 billion in extra budget spending amid rising tax revenues 13:15 Nykaa seeks Meta’s inclusion in copyright dispute with Zee 13:06 GitHub internal repositories breached through malicious VS Code extension 13:00 Fujimori takes slim lead over Sanchez ahead of Peru presidential runoff 12:45 Sovereign cloud partnership between Thales and Google cloud expands into Germany 12:30 A first vote brings the Knesset closer to dissolution 12:15 Volvo cars faces Thai legal threat after fresh EX30 fires 12:00 Lowe’s maintains annual forecast despite weak U.S. housing demand 11:50 Alibaba launches powerful AI chip to challenge Nvidia dominance in China 11:45 AI financing drives record surge in U.S. convertible bond issuance 11:30 French pediatrician Aldo Naouri dies at the age of 88 11:15 Samvardhana Motherson reports strong profit growth driven by rising automotive demand in India 11:00 European Union to release €3.2 billion in first budget aid to Ukraine in mid-June 10:52 Starlink expansion across Africa triggers sovereignty debate as governments set conditions 10:45 Colombia: Senator’s vehicle riddled with bullets amid rising election violence 10:30 Venezuela releases three political prisoners after more than 20 years in detention 10:28 Morocco approves banking reform law to strengthen financial stability 10:22 Casablanca Timeless festival delivers immersive three day music experience 10:15 Tragic incident in Toulon involving a mother and her children 10:14 Turkey to urge NATO unity ahead of Ankara summit in July 10:00 This company automatically increases its employees’ salaries by 10% every year 09:56 Qatar says Strait of Hormuz remains closed to normal shipping traffic 09:45 Uzbekistan’s first London IPO success expected to boost future listings, fund chief says 09:38 Cegid inaugurates Cegid Atlas in Casablanca strengthening Morocco role 09:30 Bulgaria requests US visa-free travel for its citizens, says prime minister 09:15 Hyundai recalls over 54,000 vehicles in the US due to fire risk 09:07 OIM study highlights territorial migration governance progress in Morocco 09:00 Google unveils new connected glasses featuring AI assistant Gemini 08:45 Lithuania issues drone alert as Vilnius airport suspends flights 08:44 HSBC chief warns 200,000 staff to adopt AI or risk falling behind 08:30 Solar set to become world’s top energy source by 2032, BNEF says 08:30 Bodies of the last two Italian divers recovered in the Maldives 08:19 Oil market faces panic risk if Hormuz closure extends into June 08:15 China defends rare earth export controls and signals cooperation with the United States 08:00 Indonesia’s central bank increases interest rates beyond expectations 07:58 Jensen Huang says he would not build Nvidia again today 07:45 Stellantis Rennes plant to produce Dongfeng electric vehicle 07:39 Taiwan vows to defend sovereignty amid uncertainty over US support 07:30 Commerzbank employees rally against UniCredit takeover bid 07:20 Skoda unveils affordable Epiq electric SUV with compact urban focus 07:15 Xi and Putin reaffirm ‘unshakable’ ties amid global tensions 07:02 Samsung workers prepare historic strike after wage talks collapse 07:00 South Korea: Samsung strike could disrupt economy and global tech supply chains

Iran’s decentralized cyber offensive heightens risk for U.S. firms

Monday 02 March 2026 - 15:30
Iran’s decentralized cyber offensive heightens risk for U.S. firms

As joint U.S. and Israeli airstrikes hit targets across Iran, security experts say a parallel and less predictable battle is unfolding in cyberspace, with potential long-term consequences for companies and critical infrastructure far beyond the region. Analysts warn that Iranian-aligned hackers and loosely affiliated sympathizers are turning to more decentralized and chaotic tactics, increasing the chance of disruptive attacks that are harder to anticipate or deter.

The evolving campaign has been galvanized by the formation of what militants call the “Great Epic” cyber offensive, a loose framework bringing together pro-Iranian hacktivist groups and cyber units that share tools, targets, and propaganda but operate with significant autonomy. Rather than relying solely on traditional state-directed operations, these actors are increasingly leveraging online forums, encrypted messaging platforms, and public code repositories to coordinate attacks and recruit volunteers with varying levels of technical skill. This shift, specialists say, blurs the line between state operations and crowd‑sourced digital retaliation, complicating efforts to attribute incidents and respond in a targeted way.

One of the most visible signs of this change has been a marked push toward public recruitment. The hacker collective Islamic Cyber Resistance has issued open calls for what it describes as “general mobilization,” inviting security researchers, developers, and other technology professionals to join a “great circle of war” in defense of Iran and its allies. Recruitment messages shared in Arabic and English urge prospective volunteers to contact coordinators directly, promising integration into a wider digital “resistance” network aimed at attacking infrastructure and information systems in the United States, Israel, and regional partners. Cyber analysts say this model resembles a crowdsourcing approach to offensive capabilities, dramatically expanding the pool of potential operators and amplifying both the scale and unpredictability of operations.

The air and cyber offensive launched by the United States and Israel at the end of February, under the operational names Epic Fury and Roaring Lion, has further destabilized Iran’s traditional command structures and appears to be accelerating this decentralization. Military and policy assessments describe the operation as a combined kinetic and digital strike designed to paralyze key regime institutions, including elements of the Revolutionary Guard, intelligence services, and critical communications systems. Analysts argue that by degrading central control, the campaign may unintentionally push more responsibility and initiative to loosely managed cyber affiliates and ideologically motivated hacktivists, who are less constrained by state policy or diplomatic considerations.

Threat intelligence firms report that pro-Iranian operators operating under the broader “Cyber Islamic Resistance” label have claimed responsibility for attacks on gas stations in Jordan as well as against U.S. and Israeli defense and technology contractors. These operations have ranged from data‑wiping attempts and website defacements to psychological warfare, where hackers publish screenshots and boast of their exploits in Telegram channels and other social platforms to amplify perceived impact. Verification of these claims often lags behind the propaganda, which can fuel confusion for targeted organizations and complicate incident response.

The hacking of the BadeSaba Calendar prayer app has become a defining example of how cyber tools are being used for psychological operations rather than purely technical disruption. With more than 5 million downloads, BadeSaba is widely used in Iran to track prayer times and religious observances, and is seen by many users as a trusted, apolitical utility. Over the weekend, the app sent push notifications reading “Help has arrived!” and calling for the formation of a “People’s Army” to support “Iranian brothers,” followed by messages directing lower‑ranking members of the Revolutionary Guard to surrender and pointing protesters toward alleged safe gathering points. Cybersecurity researchers say this incident illustrates how compromising a familiar consumer app can be used to seed disinformation, erode trust in digital services, and inflame tensions at moments of maximum uncertainty.

Researchers at firms such as CloudSEK and Flashpoint have documented a sharp escalation in hacktivist activity since the launch of Operation Epic Fury and Roaring Lion, counting more than a hundred claimed incidents in the space of just a few days. The attacks have targeted a wide range of sectors, including energy, finance, government services, and information technology, often through low‑cost methods such as website defacement, denial‑of‑service attacks, and data leaks. While many incidents cause only temporary disruption, experts warn that the volume of activity increases the likelihood that a more sophisticated intrusion could compromise sensitive systems or trigger cascading failures in connected networks.

For U.S. companies, the primary risk is no longer limited to traditional data theft or espionage campaigns tied to identifiable Iranian advanced persistent threat (APT) groups. Instead, executives and security leaders must prepare for a more diffuse threat landscape in which semi‑independent actors, inspired or encouraged by Tehran, seek to undermine public trust, disrupt operations, or damage reputations through targeted leaks and false information. That could mean attacks designed to manipulate internal communication tools, alter content on corporate websites, or flood customer‑facing channels with forged messages that appear to come from trusted sources.

Security practitioners say this environment demands a stronger emphasis on resilience and detection rather than reliance on traditional deterrence or diplomatic pressure. Companies are being urged to test incident response plans, harden access to cloud and identity systems, and train employees to treat unexpected messages and alerts with skepticism, even when they appear to originate from familiar apps or internal services. Critical infrastructure providers, including in the energy, transportation, and financial sectors, are under particular pressure to improve segmentation between operational and administrative networks, as well as to share real‑time intelligence about suspicious activity with industry peers and government partners.

Analysts caution that the decentralization of Iran‑aligned cyber activity is likely to persist as long as the broader confrontation continues, and may even outlast any ceasefire or reduction in direct military hostilities. In practical terms, that means organizations with U.S., Israeli, or allied ties could remain on target lists long after the latest round of strikes fades from headlines, especially if they are seen as symbolically important or vulnerable. For many security teams, the challenge will be to sustain higher levels of vigilance over months or years, adjusting to a threat model in which small, loosely coordinated groups can still inflict outsized damage on public confidence and digital infrastructure.

 


  • Fajr
  • Sunrise
  • Dhuhr
  • Asr
  • Maghrib
  • Isha

Read more

This website, walaw.press, uses cookies to provide you with a good browsing experience and to continuously improve our services. By continuing to browse this site, you agree to the use of these cookies.