You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Yemen Electronic Army

Yemen Electronic Army

ID: 428c2b256666ec5cf86f7617b2777ffa74589
Hacktivist Group Hacktivism
Threat types: Intrusion, Data Leak, Defacement, Pro-Yemeni, Pro-Houthi
Yemen BRA, CAN, FRA, IND, MOZ, RUS, ZAF, TUN, USA, VEN
Updated: 2026-04-08
Created: 2025-10-21
Progress: 80% Completeness: 75% Freshness: 90%
Operation zone: Brazil, Canada, France, India, Mozambique, Russia, South Africa, Tunisia, United States, Venezuela
Aliases Limited alias preview
Ciberejército de Yemen Y.C.A Y** Y*****
Y** Ye************** Ye************ Ye*****************
Showing 2 of 8 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Yemen Electronic Army (YEA) — pro-Yemeni/Pro-Houthi hacktivist label often overlapping with Yemen Cyber Army; 2015 defacement of Al-Hayat and Saudi MFA data leaks used for propaganda.


Technique Technique name Tactics Evidence
T1491.002 External Defacement TA0040
  • 2015-04 — Defacement of the Al-Hayat media website during the Yemen conflict. · ref
T1190 Exploit Public-Facing Application TA0001
  • 2015 — Opportunistic exploitation of public-facing web applications consistent with defacement tradecraft (assessed from 2015 operations). · ref
T1041 Exfiltration Over C2 Channel TA0010
  • 2015-05 — Exfiltration of Saudi MFA data later disseminated through public mirrors/WikiLeaks. · ref
Strategic Intelligence
Limited preview
Last updated: 2025-10-22T02:17:00+00:00
Yemen Electronic Army (YEA) — Pro-Yemeni/Pro-Houthi Hacktivist Label

CLASSIFICATION: Unclassified / Open Source


Executive Summary

Open sources suggest that “Yemen Electronic Army” (YEA) surfaced around 2015 and is frequently conflated with or considered an alias/label variant of the Yemen Cyber Army (YCA). Operations attributed in that period include the defacement of Al-Hayat (London-based, pro-Saudi) and subsequent data theft from Saudi Arabia’s Ministry of Foreign Affairs, later publicized via WikiLeaks mirrors. Multiple analyses assessed possible Iranian linkages (infrastructure, Persian language indicators), framing the activity within Iran–Saudi proxy dynamics during the Yemen war. Public cases resurfaced in 2025 with the UK sentencing of a YCA-linked defacer. Overall capability: low–moderate (defacement/exfil via opportunistic vectors); Confidence: medium for YEA as a distinct brand, high that the operations are real under the YCA/YEA umbrella.


Pro-Yemeni/Pro-Houthi hacktivist posture; messaging targets Saudi and allied interests during the conflict. Several researchers describe Iranian support/enablement as plausible.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/7

Address Verification SOCMINT
x.com/Yem*********** Restricted Not integrated
Address Verification SOCMINT
t.me/Yem*********** Restricted Not integrated
t.me/Y_C***** Restricted Not integrated
t.me/Yem************* Restricted Not integrated
t.me/YC_************ Restricted Not integrated
t.me/YCA*** Restricted Not integrated
Address Verification SOCMINT
instagram.com/yem************* Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–7 of 7 images
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Affiliation with another group Free Preview
Affiliation with another group
Hacked website evidence Free Preview
Hacked website evidence
Propaganda Free Preview
Propaganda
Showing 4 of 7 images in preview mode. Additional evidence is restricted for Analyst and Premium plans.