ISLAMABAD: Users of the popular Pakistani streaming platform Tamasha were startled today after screenshots began circulating online showing the app displaying a message referencing the “Mossad Agency” and urging people in Iran to share photos and videos to make their voices heard.
The content appeared within the app interface and custom ad units and quickly spread on social media and community forums.
A developer familiar with programmatic advertising systems told TechJuice that platforms like Tamasha do not manually approve every ad displayed. There is also a possibility, though unconfirmed that ad inventory could be compromised at the backend. Otherwise, most apps rely on automated third-party ad networks such as Google Ads, where placements are algorithm-driven. While publishers can block certain categories or advertisers, they cannot control every ad impression in real time. The appearance of a controversial ad, therefore, does not necessarily imply deliberate approval by the platform.
The unexpected message led many users to fear that Tamasha, known for free live TV, sports and entertainment streaming, had been hacked.
Similar messages were sent on the Iranian prayer app BadeSaba Calendar, reminiscent of those distributed on the Pakistani Tamasha app. This suggests the hackers may share a common origin, potentially linked to Israel’s Mossad.
Remember yesterday, shortly after the initial explosions in Iran, users received notifications urging military personnel to surrender weapons in exchange for amnesty and to join “the forces of liberation.” These messages, which began with “Help has arrived,” were sent within 30 minutes of the explosions, but no group has claimed responsibility for the hacking.
At the time of reporting, Tamasha has not issued an official statement on the incident, and there is no independent confirmation of a system hack, but the displayed messages represent a lack in such a big app’s infrastructure. Users are advised to remain cautious and report any suspicious content directly to the platform.