IE 11 is not supported. For an optimal experience visit our site on another browser.

Israeli newspaper hacked on anniversary of Iranian general's killing by U.S.

Tehran-backed Houthi rebels also seized an Emirati-flagged ship in the Red Sea in the latest sign of Mideast tensions.
Get more newsLiveon

DUBAI, United Arab Emirates — Yemen’s Houthi rebels seized an Emirati-flagged ship in the Red Sea, officials said Monday, the latest sign of Mideast tensions as hackers targeted a major Israeli newspaper’s website to mark America’s 2020 killing of an Iranian general.

The seizure of the Rwabee marks the latest assault in the Red Sea, a crucial route for international trade and energy shipments. The Iranian-backed Houthis later acknowledged the incident off the coast of Hodeida, a long-contested prize of the grinding war in Yemen.

Meanwhile, no group immediately claimed responsibility for the hacking of the Jerusalem Post. The hackers replaced the Post’s homepage with an image depicting a missile coming down from a fist bearing a ring long associated with Qassem Soleimani, the Iranian general killed by a U.S. drone strike in Iraq two years ago.

First word of the Rwabee’s seizure came from the British military’s United Kingdom Maritime Trade Operations, which only said an attack targeted an unnamed vessel around midnight. The coordinates it offered corresponded to the Emirati-flagged landing craft Rwabee, which hadn’t given its location via satellite-tracking data for hours, according to the website MarineTraffic.com.

A statement from the Saudi-led coalition, carried by state media in the kingdom, acknowledged the attack hours later, saying the Houthis had committed an act of “armed piracy” involving the vessel. The coalition asserted the ship carried medical equipment from a dismantled Saudi field hospital in the distant island of Socotra, without offering evidence.

Image: Qasem Soleimani
Members of the Iraqi Hashed al-Shaabi take part in a commemoration ceremony held to mark the upcoming second anniversary of the killing of Iranian general Qasem Soleimani on Sunday.Ahmad Al-Rubaye / AFP - Getty Images

“The Houthi militia must immediately release the ship, otherwise the coalition forces shall take all necessary measures and procedures to deal with this violation, including the use of force,” Brig. Gen. Turki al-Malki said in a statement.

A similar incident happened in 2016 involving the Emirati vessel SWIFT-1, which had been sailing back and forth in the Red Sea between an Emirati troop base in Eritrea and Yemen. The vessel came under attack by Houthi forces in 2016. The Emirati government asserted the SWIFT-1 had carried humanitarian aid; U.N. experts later said of the claim that they were “unconvinced of its veracity.”

A Houthi military spokesman, Yahia Sarei, announced that rebel forces had seized what he described as an Emirati “military cargo ship” carrying equipment into Yemen’s territorial waters “without any license” to engage in “hostile acts” against Yemen’s stability. He said the rebels would offer more details on the seizure later.

An employee at the vessel’s owners, Abu Dhabi-based Liwa Marine Services, told The Associated Press that the Rwabee appeared to have been the target but said they had no other information and declined to comment further. The employee did not give her name and hung up.

In the attack targeting the Jerusalem Post’s website, the image posted by the hackers depicts an exploding target from a recent Iranian military drill designed to look like the Shimon Peres Negev Nuclear Research Center near the city of Dimona. The facility is already home to decades-old underground laboratories that reprocess the reactor’s spent rods to obtain weapons-grade plutonium for Israel’s nuclear bomb program.

Under its policy of nuclear ambiguity, Israel neither confirms nor denies having atomic weapons.

In a tweet, the Post acknowledged being the target of hackers.

“We are aware of the apparent hacking of our website, alongside a direct threat to Israel,” the English-language newspaper wrote.

The newspaper later restored its website. It noted Iran-supporting hackers previously targeted its homepage in 2020 “with an illustration of Tel Aviv burning as then-Prime Minister Benjamin Netanyahu swam” with a life preserver.

There was no immediate response from the Israeli government. The hack comes after Israel’s former military intelligence chief in late December publicly acknowledged his country was involved in Soleimani’s killing.

Iran also did not immediately acknowledge the hack. However, the country has in recent days stepped up its commemorations of the slain Revolutionary Guard general. Memorial services were scheduled to be held Monday marking his death.

As the head of the Quds, or Jerusalem, Force of the Revolutionary Guard, Soleimani led all of its expeditionary forces and frequently shuttled between Iraq, Lebanon and Syria. Quds Force members have deployed into Syria’s long war to support President Bashar Assad, as well as into Iraq in the wake of the 2003 U.S.-led invasion that toppled dictator Saddam Hussein, a longtime foe of Tehran.

Soleimani rose to prominence by advising forces fighting the Islamic State group in Iraq and in Syria on behalf of the embattled Assad.

U.S. officials say the Guard under Soleimani taught Iraqi militants how to manufacture and use especially deadly roadside bombs against U.S. troops after the invasion of Iraq. Iran has denied that. Many Iranians to this day see Soleimani as a hero who fought Iran’s enemies abroad.