Cyber Warfare: The Invisible Battlefield in the Iran Conflict

Alex Turner, Technology Editor
6 Min Read
⏱️ 4 min read

As the conflict between the US, Israel, and Iran intensifies, the role of cyber warfare is emerging as a crucial but often understated element of modern military strategy. While the world witnesses the impressive displays of conventional weaponry through slick videos and press releases, the cyber realm remains shrouded in secrecy. Recent statements from US Central Command highlight that cyber operations are not just auxiliary tactics but integral to the overall war strategy.

The Pre-emptive Strike: Cyber-Operations Unveiled

Before any missile was launched, a comprehensive digital landscape was meticulously prepared. General Dan Caine, the chairman of the joint chiefs of staff, revealed that extensive planning went into selecting targets for strikes, with cyber-espionage and hacking forming the backbone of these operations. This groundwork likely involved infiltrating critical Iranian networks long before any physical confrontations began.

The Financial Times reports that Israeli hackers successfully compromised CCTV and traffic cameras, creating a vast surveillance network designed to monitor key figures like Ayatollah Ali Khamenei. This allowed for a thorough understanding of their “patterns of life,” which proved invaluable when planning military strikes. Sergey Shykevich, a threat intelligence expert at Check Point, emphasised that internet-connected cameras provide real-time insights at a fraction of the cost, making them prime targets in cyber warfare.

Cyber capabilities do not act in isolation; rather, they complement traditional intelligence-gathering methods, including human espionage. Tal Kollender, a former Israeli military cyber-defence specialist, summarised this dynamic effectively: “Cyber isn’t usually the decisive weapon on its own; it’s a force multiplier that helps shape the information environment and supports operations happening on the ground.”

Disruption Tactics: Blinding the Enemy

Following the initial strikes, US officials painted a vivid picture of the digital disruption inflicted on Iran. General Caine described operatives from US Cyber Command as the “first movers” who aimed to incapacitate Iran’s communication capabilities. This included efforts to jam mobile phone towers, preventing the Iranian military from receiving timely warnings about incoming attacks—a tactic reminiscent of strategies employed in other conflicts, such as the ongoing war in Ukraine.

US Defence Secretary Pete Hegseth boasted that Iranian military personnel were left unable to communicate or coordinate a response. His remarks echoed past statements from former President Trump, who lauded the effectiveness of cyber operations in military engagements. The interplay between physical and cyber domains in warfare is becoming increasingly intricate, as demonstrated by the recent targeting of a popular Iranian prayer-timing app, BadeSaba. Users received a push notification proclaiming “help has arrived,” timed to coincide with the commencement of airstrikes.

The Secrets of Cyber Warfare

Despite its growing significance, the US and Israel remain tight-lipped about their cyber operations. The infamous Stuxnet attack on Iran’s nuclear facilities in 2010 is a prime example of the secrecy surrounding such missions. Israel has also been accused of executing cyber-attacks disguised as hacktivism, such as the 2022 incident targeting Iranian steel plants.

Kollender noted that revealing specific operational details could compromise future capabilities, as the element of surprise is vital in cyber engagements. Nevertheless, Dr Louise Marie Hurel from the Royal United Services Institute has expressed optimism over the transparency being offered by the US. She argues for a broader discussion about the role of cyber warfare in military operations, advocating that it should be treated with the same seriousness as conventional warfare.

Where is Iran in the Cyber Domain?

Interestingly, Iran’s response in the cyber realm has been conspicuously quiet. Known for its cyber prowess, the nation has yet to launch significant retaliatory attacks amidst this conflict. While the Western cybersecurity community remains vigilant for potential Iranian cyber strikes, the absence of visible activity raises questions. Are they incapacitated by the ongoing assaults, or have their capabilities been overestimated?

Recent reports indicate that an Iranian-linked hacking group, Handala, executed a wiper malware attack on medical technology firm Stryker. While Iran’s capabilities should not be underestimated, Hurel warns against dismissing their potential for retaliation. The landscape of cyber warfare is ever-evolving, and hacktivist groups may serve as a front for state-sponsored cyber operations.

Why it Matters

As the boundaries between traditional warfare and the digital domain continue to blur, understanding the implications of cyber operations is essential. The ongoing conflict between the US, Israel, and Iran serves as a stark reminder that modern warfare is fought on multiple fronts—physical and digital. The outcomes of these cyber engagements can shape the battlefield, influencing military strategies and geopolitical dynamics for years to come. As nations grapple with the evolving landscape of cyber warfare, the need for robust cyber defences and strategic discourse becomes increasingly paramount.

Share This Article
Alex Turner has covered the technology industry for over a decade, specializing in artificial intelligence, cybersecurity, and Big Tech regulation. A former software engineer turned journalist, he brings technical depth to his reporting and has broken major stories on data privacy and platform accountability. His work has been cited by parliamentary committees and featured in documentaries on digital rights.
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

© 2026 The Update Desk. All rights reserved.
Terms of Service Privacy Policy