On February 28, the United States and Israel launched coordinated strikes across Iran under Operation Epic Fury (also referenced in reporting as Operation Lion’s Roar). The opening phase focused on decapitating senior Iranian leadership while degrading missile infrastructure, launch systems, and air defenses. In the hours that followed, Iran initiated large-scale retaliation — expanding the conflict beyond Iranian territory and into a region-wide exchange that touched multiple Gulf states and allied military assets.
Since those initial strikes, the conflict has rapidly widened and accelerated. What began as a concentrated campaign against leadership and missile capabilities has developed into a sustained regional war with an expanding set of targets, including economic and logistical infrastructure. Simultaneously, cyber operations and psychological messaging have been used alongside kinetic action, creating a hybrid operating environment in which disruption is shaped as much by information control and infrastructure compromise as it is by missiles and airstrikes.
Flashpoint analysts are tracking the conflict across physical, cyber, and geopolitical domains. The timeline and sections below summarize key developments and risk indicators observed from February 28 through March 18.
Operation Epic Fury Timeline: March 2026 Conflict Updates
February 28, 2026 — Initial Strikes and Regional Retaliation
In parallel to these events, Flashpoint observed immediate system-level disruption: flight suspensions at Dubai airports following nearby strikes, and Iran’s move to blockade the Strait of Hormuz, elevating global energy and logistics risk.
March 1, 2026 — Air War Over Tehran, Soft Targets, and Hybrid Expansion
By March 1, the conflict had shifted from stand-off strikes to direct air operations over Tehran, signaling degradation of Iran’s integrated air defenses over the capital. Iranian state media described a transition to “offensive defense,” and retaliatory activity expanded across the region.
Notable developments included the reported strike on the Crowne Plaza Hotel in Manama, Bahrain, signaling increased risk to soft targets and commercial environments. Flashpoint also observed indicators of command-and-control friction on the Iranian side, including a reported friendly-fire incident involving the sanctioned “shadow fleet” tanker Skylight.
March 2, 2026 — Infrastructure and Economic Warfare Escalation
March 3, 2026 — Expansion of Infrastructure Warfare and Regional Combat
March 5, 2026 — Offensive Defense and Geographic Expansion
March 6, 2026 — Regime Fragmentation and Strategic Targeting
March 8–9, 2026 — Leadership Consolidation and Hybrid Warfare Expansion
March 10, 2026 — Decentralized Retaliation and Economic Pressure
March 11–12, 2026 — Economic and Technological Warfare Expansion
March 12–13, 2026 — Expanded Kinetic Theater and Coordinated Cyber Offensive
March 1–13, 2026 — Infrastructure Targeting and Internationalization
Since March 1, Flashpoint analysis indicates the conflict has evolved from broad regional exchanges into systematic targeting of energy, data, logistics, and command-and-control infrastructure with global downstream impact. The targeting of Saudi Aramco’s Ras Tanura facility, disruption affecting an AWS data center in the UAE, continued strikes on Gulf military and transport infrastructure, and threats directed at commercial districts and Western firms all point to a widening campaign against the systems that support both state and private-sector operations.
Over this time period, the conflict expanded geographically and economically. NATO-aligned assets came under pressure, strategic communications and military infrastructure were degraded, and commercial coercion intensified through attacks and warnings affecting banks, refineries, desalination systems, shipping lanes, and named corporate locations in Jordan and the UAE. Taken together, these developments indicate that economic warfare is now an overt operational objective rather than a secondary effect of the conflict.
The Escalating Cyber and Information Front
From the opening hours, Flashpoint assessed that cyber activity in this conflict is not ancillary — it is being used as a synchronized force multiplier.
One of the most consequential developments has been the use of infrastructure compromise for psychological operations at national scale. Flashpoint observed the compromise of the BadeSaba prayer app ecosystem, enabling push notifications to be delivered to large user populations. Messaging included calls for mobilization and later content aimed at regime security forces and protest coordination. This reflects a shift from influence on social platforms toward platform-layer manipulation, where trusted everyday applications become vectors for narrative control during kinetic shock.
Flashpoint also observed disruption and interference affecting state-run Iranian outlets (including IRNA and ISNA), contributing to an information vacuum and driving users toward unverified channels for situational awareness.
As kinetic pressure increased, Flashpoint tracking indicated fluctuations in cyber tempo. Some updates suggested a temporary lull in broader Iranian cyber activity — potentially due to operational disruption from physical strikes — while other indicators pointed to a risk of renewed disruptive campaigns, including activity linked to personas associated with state-aligned hacktivist ecosystems.
Coordinated Disruption Campaigns
Beginning on March 2, Flashpoint observed reporting around a coordinated campaign branded #OpIsrael, involving pro-Iranian and pro-Russian-aligned actors. Reported activity included DDoS attacks against Israeli defense and municipal entities, claimed breaches affecting health and government systems, and attacks targeting Gulf-state infrastructure and public-facing services. Over the following days, these campaigns expanded to include regional councils, telecommunications companies, transportation systems, and media outlets.
Shift Toward Enterprise and Financial Targeting
As the conflict progressed, cyber activity increasingly focused on private-sector organizations and commercial infrastructure. Reported and claimed incidents included targeting of banks, payment systems, medical technology companies, and cloud-connected environments. The most significant example was the Handala-linked campaign against Stryker, which was framed as a destructive operation involving data wiping and exfiltration. Flashpoint also tracked claims involving Verifone and continued pressure on financial institutions and commercial platforms in the Gulf and beyond.
Espionage, LOTL Tradecraft, and Psychological Operations
Flashpoint also observed a widening mix of tradecraft and objectives. Verified activity linked to MuddyWater targeted US aerospace, defense, aviation, and financial organizations, while Telegram-based recruitment networks and public warning operations suggested a growing emphasis on espionage, intimidation, and distributed proxy activity. At the same time, reporting around the Stryker incident indicated a shift toward “Living-off-the-Land” techniques that abuse legitimate cloud administrative tools, reducing the usefulness of traditional signature-based detection. Across the conflict, cyber operations have spanned espionage, disruption, psychological operations, financial coercion, and destructive attacks against both regional and international private-sector targets.
Strategic Chokepoints and Systemic Risk
Two chokepoints have consistently driven systemic risk throughout the conflict: maritime energy transit and regional air mobility. Iran’s blockade of the Strait of Hormuz, attacks on commercial vessels, pressure on Gulf refineries, and warnings directed at energy-linked infrastructure have all increased volatility in energy markets and maritime logistics. In parallel, attacks on desalination systems and refineries have expanded the threat from energy disruption to wider civilian and economic stability.
Airspace disruption and pressure on major transit hubs have compounded these risks. Flight interruptions, threats to major Gulf airports, and the broader degradation of maritime and aviation routes mean organizations should plan for sustained disruption to commercial mobility, logistics, and regional service availability.
Business and Security Implications
As the conflict expands into commercial infrastructure, civilian logistics, and private-sector economic targets, enterprise exposure now extends well beyond traditional “high-risk” sectors. The targeting patterns observed throughout this conflict indicate that energy infrastructure, cloud assets, maritime corridors, and civilian-facing systems are all within scope.
Organizations should plan for volatility across personnel security, supply chains, cyber disruption, and regional service availability.
1. Personnel and Physical Security
Recent incidents involving Gulf transit hubs, diplomatic facilities, and named commercial districts indicate that exposure is no longer confined to military installations.
- On March 3 the US State Department issued expanded “DEPART NOW” guidance across multiple Middle Eastern countries, while embassies and diplomatic compounds in the region have already experienced elevated threat conditions.
- Drone attacks and warnings affecting diplomatic facilities in Dubai, Riyadh, Amman, and other regional locations indicate expanding risk to government and Western-linked sites.
- Iranian-aligned warning lists now identify specific commercial districts and office locations in Jordan and the UAE tied to Western defense, technology, finance, aviation, and energy firms.
Organizations with personnel in the Gulf region and surrounding areas should:
- Reassess travel posture to the UAE, Qatar, Bahrain, Kuwait, and Saudi Arabia.
- Elevate security protocols at commercial offices, hotels, and logistics facilities.
- Reinforce operational security practices (routine variation, avoidance of identifiable clothing tied to government or defense sectors).
- Coordinate closely with local authorities and diplomatic advisories regarding movement restrictions and emerging threat indicators.
- Reevaluate occupancy and travel policies for personnel located in named commercial districts, banking hubs, aviation corridors, and technology parks in the Gulf and Jordan.
2. Supply Chain, Energy, and Commercial Operations
The conflict is increasingly affecting the systems that support trade, finance, and daily commercial activity. The blockade of the Strait of Hormuz, pressure on refineries and shipping lanes, branch closures by major financial institutions, and public designation of Western banking and cloud firms as targets all indicate that organizations should plan for both physical disruption and business continuity challenges across the Gulf.
Organizations should:
- Model extended disruption to Gulf maritime routes rather than short-term interruption.
- Identify alternative shipping corridors and overland routing options.
- Stress-test supplier dependencies tied to Gulf ports, energy inputs, and payment infrastructure.
- Prepare for price volatility, delivery delays, and possible closure of regional business operations.
- Assess dependencies on Gulf-based financial services, banking access, and payment processing in addition to physical logistics routes.
3. Cloud and Technology Infrastructure
The reported physical impact to an AWS data center in the UAE reflects a significant escalation: commercial cloud infrastructure is no longer insulated from kinetic spillover. More recent reporting also indicates Iranian strikes targeting Microsoft Azure data infrastructure in the Gulf, expanding the threat profile to additional Western cloud platforms.
Iranian strikes against early-warning radars and satellite communication terminals across Gulf bases indicate a coordinated effort to degrade regional missile defense networks.
Enterprises should:
- Confirm geographic redundancy for critical workloads.
- Validate disaster recovery timelines (RTO/RPO) for Middle East–hosted environments.
- Review third-party dependencies tied to regional data centers.
- Ensure executive teams understand potential cascading impacts from localized physical disruption.
- Organizations operating near or dependent on US or allied military infrastructure in the region should monitor potential disruptions to air defense coverage and communications networks.
- Review physical and operational exposure tied to named technology campuses, cloud offices, and regional data infrastructure in Jordan and the UAE.
4. ICS / OT Environments
Claims involving industrial control systems and related logistics infrastructure indicate elevated risk to operational technology environments, especially where cyber disruption and physical attacks may combine to produce cascading outages.
Organizations operating ICS/SCADA systems, particularly in energy, logistics, water, and manufacturing sectors, should:
- Audit all remote access pathways and eliminate unnecessary external exposure.
- Enforce phishing-resistant MFA for privileged and engineering accounts.
- Segment industrial networks from corporate IT and public internet access.
- Validate incident response plans for destructive malware or system manipulation scenarios.
- Conduct tabletop exercises assuming loss of visibility or control in critical systems.
What to Expect Next (48–72 Hours)
Flashpoint analysis indicates the conflict is entering a more entrenched and decentralized phase. The activation of Iran’s “Mosaic Defense” framework means retaliatory strike authority is increasingly distributed across provincial and local commands, reducing the likelihood of any rapid operational off-switch even if diplomatic pressure increases.
At the same time, the conflict is continuing to expand beyond direct military exchanges. The use of public target lists naming commercial districts, financial institutions, cloud providers, and defense-related firms suggests private-sector entities will remain exposed to both kinetic and sabotage risk across the Gulf and neighboring states.
Cyber activity is also expected to remain elevated. Reporting around recent incidents indicates that Iranian-aligned actors are increasingly relying on hybrid tradecraft that blends espionage, psychological operations, destructive attacks, and abuse of legitimate administrative tools. This means organizations should not assume that traditional malware-based detection alone will be sufficient to identify emerging threats.
Finally, the conflict is likely to remain geographically fluid. Maritime disruption in the Strait of Hormuz, continued pressure on Gulf energy infrastructure, and the possibility of new fronts involving regional actors and proxy mobilization suggest that the next phase will be shaped less by a single decisive escalation and more by persistent, distributed instability across multiple domains.
Ongoing Updates
Flashpoint will continue monitoring developments across physical, cyber, and geopolitical domains. Bookmark this page for updates as the situation evolves.
For organizations seeking deeper visibility into emerging threats, proxy activity, infrastructure targeting, and cross-domain escalation indicators, schedule a demo to see Flashpoint’s intelligence platform deliver timely, decision-ready intelligence.

