FreeTheDotYE Profile picture
Sep 22 5 tweets 1 min read Read on X
🚨 We found a phishing time bomb in Yemen’s hijacked .YE ccTLD

Domain: twitter[.com.ye]
RDAP: “reserved/restricted”
DNS + MX: point straight to Houthi-run servers in Sana’a.
Infra designed to impersonate @X / Twitter. 🧵Image
The proof:

• A Record → 82.114.162.66 (TeleYemen, Houthis controlled)
• MX → mail1/2.yemen.net.ye mail.twitter[.com.ye] (active, live mail routing)
• Web → geoblocked, but mail infra alive.
We found a purpose built phishing machine waiting for a target. Image
This lets Houthis send @ twitter[.com.ye] emails to phish, steal logins, or deliver malware.

Digital deception becomes physical repression; targeting journalists, NGOs, activists inside & outside Yemen.
This isn't a bug; it's a feature of a hijacked TLD.

@ICANN has stayed silent since 2015, enabling a militia to weaponize a ccTLD. This is a catastrophic failure of internet trust with global implications.

Internet trust is collapsing.

We demand @EFF @AccessNow and others push for redelegation now.
@ICANN @EFF @accessnow unroll @threadreaderapp

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with FreeTheDotYE

FreeTheDotYE Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @FreeTheDotYE

Sep 19
لأكثر من عشر سنوات هيمن نموذج فاشل على أزمة اليمن: حكومة "شرعية" في المنفى، وقطاع إغاثي ومناصرة يركز على استمرارية التمويل بدلاً من تحقيق نتائج ملموسة.

هذا الفراغ الهائل في المساءلة سمح لمشاكل قابلة للحل، مثل سيطرة الحوثيين على قطاع الإتصالات ونطاق اليمن .YE، بأن تتفاقم. 🧵
#FreeDotYE
عندما غادرت الحكومة الشرعية البلاد، استمر قياداتها وموظفيها في استلام رواتبهم نهاية كل شهر بالخارج، بينما انهارت منظومة المساءلة.

دفع اليمنيون في الداخل الثمن، وتُركت أصول الدولة الرقمية الأساسية للإهمال حتى ضاعت ودمرت واستغلت.
في الوقت نفسه، وقع جزء كبير من قطاع المناصرة والإغاثة بقصد او بدون قصد في فخ "كتابة التقارير"؛ لإرضاء المانحين، لكنها لم تغير شيئاً يذكر على الأرض.

تم تجاهل قضايا البنية التحتية المصيرية مثل الاستيلاء الرقمي على الدولة، إما لأنها "تقنية" أو لا تناسب "قوالب التمويل".
Read 9 tweets
Sep 19
For nearly a decade, Yemen’s crisis has been shaped by a failed model: a government in exile and a humanitarian and advocacy industry focused on funding cycles, not outcomes.

This vacuum of accountability let solvable problems like the hijacked .YE domain fester. 🧵
#FreeDotYE
When Yemen's legitimate government left the country, leaders continued to collect salaries abroad while accountability collapsed.

Yemenis at home paid the price as the state's most basic digital assets were neglected and ultimately lost.
Simultaneously, much of the advocacy and humanitarian sector fell into a trap of "report-ism"; satisfying donors but changing little on the ground.

Critical infrastructure issues like digital state capture were ignored, deemed too technical or not fitting within a funding silo.
Read 9 tweets
Sep 19
This single Google search tells the story of Yemen's hijacked digital identity.

Search "Yemen Ministry of Foreign Affairs":

✅ The legitimate gov @yemen_mofa is forced onto mofa-ye.org (a domain only created in 2017).

❌ The Houthi militia occupies the state domain: mofa[.gov.ye], which now works only inside Yemen after being hacked in July by @S4uD1Pwnz.Image
This is digital state capture: a militia using the official ccTLD to present itself as the state, while the recognized government is downgraded to a .org domain like an NGO.
The evidence is undeniable: The Houthi-run .YE infrastructure is both illegitimate and incompetent.

This isn’t a glitch. It’s a governance failure by @ICANN and @theiana.

National domains must belong to the people and their legitimate institutions not militias.
That’s why we demand redelegation of .YE.

🔗 freethedotye.org
Read 4 tweets
Sep 18
The Houthi-hijacked .YE domain isn't just about websites. It's a weaponized tool used to control Yemen's health sector.

This system of digital capture enables corruption and mismanagement with lethal outcomes. The cost is measured in Yemeni lives🩸🧵
#FreeDotYE
The instruments of this capture are official state domains, now under militia authority.

Houthi-controlled health domains:

- Ministry of Health: moh[.gov.ye]
- Supreme Board of Drugs and Medical Appliances: sbdma[.gov.ye] & sbd-ye[.org]
- Supreme Medical Council: ysmc[.gov.ye]

These operate as extensions of the Houthi militia, not neutral public institutions.
Meanwhile, Yemen's actual health authorities are digital exiles, forced onto non-governmental domains:

- Legitimate Ministry of Health: moh-ye[.org]
- The Supreme Board of Drugs and Medical Appliances: ysbda[.com]
- Supreme Medical Council: smc-ye[.org]

This split forces parallel systems, undermining legitimate authorities' digital sovereignty.
Read 8 tweets
Sep 13
كيف تستخدم ميليشيا الحوثي هوية اليمن الرقمية لتشرعن هجماتها العالمية؟

في هذه السلسلة من المنشورات نستعرض كيفية بنائهم بنية تحتية رقمية كاملة للابتزاز العسكري. 🧵
#FreeDotYE
أولاً، سيطروا على مؤسسة وطنية حقيقية وحرفوها.

موقع saba[.ye] كان تابع لوكالة الأنباء اليمنية الرسمية(سبأ). اليوم، أصبح منصة سياسية دعائية لجماعة الحوثي.

في المقال المنشور توجه الملاحة البحرية إلى بريد تابع للميليشيا info@navy[.gov.ye]، منتحلين صفة البحرية اليمنية. Image
ثم تصاعد الأمر إلى تهديدات عسكرية مباشرة.

كما ورد في تقرير لرويترز اعادت نشره @IndyArabia، استخدموا بريداً آخر ينتهي بـ .gov.ye لتهديد شركة شحن يونانية، هذه المرة منتحلين صفة "مركز عمليات إنسانية" تابع للحكومة اليمنية. لكن التضليل أعمق من ذلك. Image
Read 9 tweets
Sep 13
How does a militia hijack the identity of Yemen itself to legitimize its global attacks?

Their weapon is the country's digital identity: the hijacked .YE domain.

Here is the undeniable evidence of how they built a digital infrastructure for military extortion. 🧵

#FreeDotYE
First, they corrupted a real national institution.

Once a genuine national institution, saba[.ye] was Yemen’s official news agency. Under Houthi control it has become a propaganda outlet.

In this news report, it goes further: directing international maritime traffic to info@navy[.gov.ye], an email under a hijacked government domain. This impersonates the Yemeni Navy and uses the national domain system to legitimize the militia.Image
From co-opting old institutions, they escalated to creating new fake ones for military threats.

As reported by @reuters, they used another .gov.ye email to threaten a Greek shipping company, this time posing as a Yemeni government "Humanitarian Operations Center." But the deception goes deeper.Image
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(