×
Sunday, May 5, 2024

JPost targeted by pro-Iranian hackers on day of Soleimani assassination - The Jerusalem Post

Last updated Sunday, January 2, 2022 21:12 ET , Source: NewsService

The Twitter account of Maariv and The Jerusalem Post website were targeted by pro-Iranian hackers in the early hours of Monday morning, with a photo of a model Dimona nuclear facility being blown up and the text "we are close to you where you do not think about it" in English and Hebrew placed on the Twitter and website.

The photo also showed a ballistic missile falling from what appears to be a representation of the hand of Islamic Revolutionary Guards Corps (IRGC) Quds Force commander Qasem Soleimani. Sunday night marked the second anniversary of the US assassination of Soleimani in Baghdad in 2020.

The tweet with the photo on Maariv's Twitter account has since been removed, as well as a retweet of an account with the handle @ShiaEagle including an illustration of Soleimani and Popular Mobilization Forces (PMF) commander Abu Mahdi al-Muhandis (who was assassinated alongside Soleimani). The @ShiaEagle account, created in the summer of 2021, has since been suspended as well.

From the inspect tool on Google Chrome, it appears the hackers managed to edit the SEO keywords of the Jerusalem Post site to be "Israel, JPost, maariv, il, attack, hack [and] ransomware," during the attack.

It is unclear if the hackers were from Iran or supporters from outside the country or if they were state-sponsored.

This isn't the first time The Post has been targeted by pro-Iranian hackers.

In May 2020, pro-Iranian hackers replaced the site's homepage with an illustration of Tel Aviv burning as...



Read Full Story: https://www.jpost.com/israel-news/article-691342

Your content is great. However, if any of the content contained herein violates any rights of yours, including those of copyright, please contact us immediately by e-mail at media[@]kissrpr.com.