Israeli newspaper hacked on anniversary of murder of Iranian general

“The Houthi militia must immediately release the ship, otherwise coalition forces will take all necessary measures and procedures to deal with this violation, including the use of force,” the brigadier said. General Turki al-Malki said in a statement.

A similar incident occurred in 2016 involving the UAE ship SWIFT-1, which was making round trips in the Red Sea between an Emirati troop base in Eritrea and Yemen. The ship was attacked by Houthi forces in 2016. The UAE government claimed that SWIFT-1 carried humanitarian aid; UN experts later said of the claim that they were “not convinced of its truth”.

A spokesman for the Houthi army, Yahia Sarei, announced that rebel forces had seized what he described as an Emirati “military cargo ship” transporting equipment in Yemen’s territorial waters “without any authorization” to go. engage in “hostile acts” against the stability of Yemen. He said the rebels would offer more details of the seizure later.

An employee of the ship’s owners, Abu Dhabi-based Liwa Marine Services, told The Associated Press the Rwabee appeared to have been the target, but said he had no further information and declined to comment further. . The employee did not give her name and hung up.

In the attack on the Jerusalem Post website, the image posted by the hackers shows an exploding target from a recent Iranian military exercise designed to resemble the Shimon Peres Negev nuclear research center near the town of Dimona. The facility already houses decades-old underground laboratories that reprocess spent reactor rods to obtain military-grade plutonium for Israel’s nuclear bomb program.

As part of its policy of nuclear ambiguity, Israel neither confirms nor denies having atomic weapons.

In a tweet, the Post admitted to being the target of hackers.

“We are aware of the apparent hacking of our website alongside a direct threat to Israel,” the English-language newspaper wrote.

The newspaper then restored its website. He noted that hackers backing Iran had previously targeted its homepage in 2020 “with an illustration of Tel Aviv burning as then Prime Minister Benjamin Netanyahu swam” with a life jacket. rescue.

There was no immediate response from the Israeli government. The hack comes after Israel’s former military intelligence chief publicly admitted in late December that his country was involved in Soleimani’s murder.

Iran also did not immediately recognize the hack. However, the country has stepped up in recent days its commemoration of the general of the Revolutionary Guards killed. Memorial services were due to take place on Monday marking his death.

As the head of the Revolutionary Guard Force Quds, or Jerusalem, Soleimani led all of his expeditionary forces and frequently shuttled between Iraq, Lebanon and Syria. Members of the Quds Force were deployed in the long war in Syria in support of President Bashar Assad, as well as in Iraq following the 2003 American invasion that toppled dictator Saddam Hussein, a longtime enemy from Tehran.

Soleimani rose to prominence by advising forces fighting ISIS in Iraq and Syria on behalf of the besieged Assad.

US officials say the Guard led by Soleimani taught Iraqi militants how to make and use particularly deadly roadside bombs against US troops after the invasion of Iraq. Iran has denied this. Many Iranians to this day regard Soleimani as a hero who fought Iran’s enemies abroad.

Previous Jerusalem Post hacked on anniversary of murder of Iranian general
Next Ontario court awards families over $ 107 million in deadly Flight 752 shooting - Burns Lake Lakes District News