Another Ship in Red Sea Attacked by Suspected Yemen Houthi Drone

An aircraft preparing to launch from USS Dwight D. Eisenhower (CVN 69) during flight operations in the Red Sea, Jan. 22. (Kaitlin Watt/U.S. Navy via AP)

A ship traveling through the southern Red Sea was attacked by a suspected Yemen Houthi rebel drone early on Tuesday, authorities said, the latest assault in their campaign targeting vessels over Israel’s war on Hamas in the Gaza Strip.

The attack happened west of the Yemeni port of Hodeida, and the projectile caused “slight damage” to the vessel’s windows on the bridge, the British military’s United Kingdom Maritime Trade Operations said. A small vessel had been near the ship before the attack, it added.

The private security firm Ambrey identified the vessel as a Barbados-flagged, United Kingdom-owned cargo ship. No one was hurt onboard the vessel, which suffered “minor damage,” the firm said.

Later, a military spokesman of the Iranian-backed Houthi rebels, Brig. Gen. Yahya Saree, claimed in a statement that the rebel forces attacked two separate vessels, one American and one British, in the Red Sea. He provided no evidence to support the claim.

One of the ships the Houthis claimed attacking, the Morning Tide, matched details provided by Ambrey. Tracking data showed it to be in the Red Sea near the reported attack.

The Morning Tide’s owner, British firm Furadino Shipping, told The Associated Press no one was hurt in the attack and the ship was continuing onward to Singapore.

Since November, the rebels have repeatedly targeted ships in the Red Sea over Israel’s offensive in Gaza against Hamas. But they have frequently targeted vessels with tenuous or no clear links to Israel, imperiling shipping in a key route for trade among Asia, the Mideast, and Europe.

In recent weeks, the United States and the United Kingdom, backed by other allies, have launched airstrikes targeting Houthi missile arsenals and launch sites for its attacks.

To Read The Full Story

Are you already a subscriber?
Click to log in!