Nuclear site threat in Jerusalem Post hack

January 3, 2022 Agencies
Read on for article

Pro-Iranian hackers have temporarily paralysed the website of the Israeli newspaper the Jerusalem Post and the Twitter account of the newspaper Maariv.

Iranian Quds Force Commander Maj. Gen. Qasem Soleimani. Credit: Wikimedia Commons.

Instead of news content, a model image of Israel’s nuclear reactor in the desert city of Dimona being detonated by a missile was displayed.

The missile is fired from a hand clenched into a fist, with a distinctive ring like the one worn by Iranian General Qassem Soleimani, who was killed in a US drone attack exactly one year ago.

Next to it, in English and Hebrew, it reads, “We are close to you where you don’t think about it.”

The website and Twitter account have since returned to their normal state. It was unclear whether the hackers were in Iran or operating from another country, the Jerusalem Post wrote. It was also not clear whether they were acting on behalf of the Iranian state.

The newspaper has been the target of pro-Iranian hackers in the past.

In May 2020, a picture of a burning Tel Aviv appeared on the website. It depicted the then Israeli prime minister Benjamin Netanyahu reaching for a life jacket in the sea, with the headline “Be ready for a surprise.”

Tehran sees Israel as an arch enemy. The destruction of the Jewish state and the “liberation of Palestine” have been part of the country’s foreign policy doctrine for four decades.

Source: DPA/AAP

Speak Your Mind

Comments received without a full name will not be considered
Email addresses are NEVER published! All comments are moderated. J-Wire will publish considered comments by people who provide a real name and email address. Comments that are abusive, rude, defamatory or which contain offensive language will not be published

Got something to say about this?

This site uses Akismet to reduce spam. Learn how your comment data is processed.