I was reading the terse IRGC statement when my phone buzzed—an all-staff alarm from a tech office in Tel Aviv. By the time I looked up, the timeline had already been set: April 1 at 8 p.m. Iran time. The threat felt immediate in a way the headlines hadn’t prepared you for.
I’ll walk you through what Iran says it will do, which companies are named, and what that could mean for offices, cloud services, and civilian safety across the region. You should know which signals to watch and why this matters beyond headlines.
A military statement named companies and set an exact hour for strikes.
The Islamic Revolution Guards Corps told state media it will treat certain U.S. tech firms as “espionage entities” and strike targets connected to what it called the “warmongering government of the United States.” The list: Apple, Google, Meta, Microsoft, HP, Intel, IBM, and Cisco, among others. The IRGC also flagged Palantir and Oracle by name in prior warnings.
Will Iran attack U.S. tech companies on April 1?
Iran gave a date and a time: April 1 at 8 p.m. local Iranian time (that’s 12:30 p.m. Eastern Time). The threat is operationally specific and accompanied by an evacuation advisory: employees and residents within one kilometer of named companies were told to leave immediately. Specific timing and explicit evacuation orders raise the event above rhetorical posturing and into the realm of planned kinetic action.
You should treat this as a credible threat until proven otherwise. The IRGC has already struck infrastructure outside Iran—Amazon data centers in the UAE and Bahrain were hit—and named targets plus a timeline change the intelligence calculus for firms and governments in the region.
Two data centers were burning while executives were making statements.
Amazon facilities in the United Arab Emirates and Bahrain reported damage from strikes in the conflict’s opening week. Firefighters reported water damage while trying to fight flames at one Amazon Web Services site, and CNBC tracked outages tied to those assaults.
Could strikes on data centers disrupt U.S. military operations?
Yes. AWS is used by U.S. defense and intelligence systems; damage to cloud nodes can ripple through logistics, communications, and targeting feeds. That’s why firms like Oracle and Palantir—used for mapping and targeting—were named by Iran. Damage to data centers isn’t just a corporate incident; it can create operational friction for militaries and allies in real time.
An ex-IRGC commander told state TV they’ve held capabilities in reserve.
Hossein Kanani Moghaddam said Iran has capabilities it hasn’t fully employed, including what he called electromagnetic weapons able to black out cities without killing civilians. He framed Iran as still holding cards for future rounds, and he warned of surprises Americans and Israelis haven’t yet faced.
That’s a clear psychological play: mix a hint of taboo technology with the promise of escalation to shape adversaries’ choices. The suggestion of disabling a city’s power is both a technical threat and a pressure point for civilian authorities, emergency services, and global markets.
The imagery here is stark—like a shadow over a chessboard—and the implicit question is whether critical infrastructure will be insulated or become bargaining chips.
Field reports and casualty figures are building a grim ledger of the conflict.
Al Jazeera and other outlets put Iranian deaths at about 1,937 with 24,800 injured since the war began; U.S. forces have reported 13 killed and at least 200 injured. Lebanon and Israel have also seen hundreds to thousands of casualties in parallel fights. Those numbers are messy and will shift, but they anchor the conflict’s human cost and the stakes for escalation.
Politically, the scene has shifted: the Iranian supreme leader has been killed, his son is reported to hold more radical positions, and President Donald Trump and Defense Secretary Pete Hegseth have publicly framed the strategy as regime elimination. Trump has also spoken about “keeping the oil,” and Tehran’s control over the Strait of Hormuz has already tightened global energy nerves and pushed prices higher.
Which companies are targeted by Iran’s military?
Named firms include Apple, Google, Meta, Microsoft, HP, Intel, IBM, Cisco, Palantir, and Oracle. The IRGC called them complicit in U.S.-Israeli operations. Many of these companies have offices or infrastructure in Tel Aviv, Jerusalem, Abu Dhabi, and across the Gulf—locations the IRGC specifically implied could be targeted with drones and missiles.
Executives, employees, and governments must make rapid decisions today.
Companies with regional staff and cloud dependencies must treat evacuation advisories seriously. If you run operations in the region or manage sensitive workloads on Amazon Web Services, Azure, or Google Cloud, contingency routing and hardened failovers are non-negotiable right now. Palantir CEO Alex Karp has publicly boasted about the platform’s role in targeting; that visibility makes his customers and his firm a political target.
Corporate security teams will be under pressure from three directions: protecting personnel, preserving services, and responding to state-level messaging. The next hours and days will test both technical resilience and crisis temperament.
Correction: An earlier version of this article misidentified Hossein Kanani Moghaddam as foreign minister of Iran. He’s a former high-ranking IRGC commander. Gizmodo regrets the error.
The conflict already feels like a fuse lit under a crowded theater; who will decide to lower the flame, and at what cost?