Hackers Take Over The Jerusalem Post, Show Former General Killed By Trump Admin On Website

Anwar Amro/AFP via Getty Images

Daily Caller News Foundation logo
Ailan Evans Deputy Editor
Font Size:

Hackers took over the website of Israeli newspaper The Jerusalem Post on Monday, replacing the site’s front page with an image referencing an Iranian military leader.

The hack occurred early Monday, according to The Jerusalem Post, on the two-year anniversary of the Trump administration’s drone strike that killed Islamic Revolutionary Guards Corps (IRGC) Quds Force commander Qasem Soleimani. Hackers posted an image appearing to show a missile firing from a red ring reminiscent of the ring Soleimani frequently wore, the outlet reported.

The image also included an exploding building intended to look like the Shimon Peres Negev Nuclear Research Center near the city of Dimona, Israel, the target of a recent Iranian military drill, according to the Associated Press. (RELATED: Chinese-Backed Hackers Are Exploiting One Of The ‘Most Pervasive’ Cybersecurity Flaws)

The Jerusalem Post tweeted early Monday that it was aware of the hack and considered the image a “direct threat of Israel.”

“We are working to resolve the issue & thank readers for your patience and understanding,” the outlet posted on Twitter.

Former Israel Defense Forces (IDF) cyber chief Yaron Rosen told the Post that the attack was most likely part of a larger influence operation by pro-Iranian groups to affect nuclear negotiations.

“We are in the midst of nuclear discussions,” Rosen said. “Both sides are probably doing the best they can with whoever they can to influence things – this is part of influence operations.”

All content created by the Daily Caller News Foundation, an independent and nonpartisan newswire service, is available without charge to any legitimate news publisher that can provide a large audience. All republished articles must include our logo, our reporter’s byline and their DCNF affiliation. For any questions about our guidelines or partnering with us, please contact