Russians blamed for hacking WADA, dumping private medical files and accusing U.S. Olympic team of doping The World Anti-Doping Agency (WADA) was hacked and confidential medical files of U.S. Olympic athletes Simone Biles, Serena and Venus Williams, and Elena Delle Donne were leaked online. The hackers said the dump is “just the tip of the iceberg.”A group claiming to be the Fancy Bears’ Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the U.S. Olympic team “played well but not fair,” it had “disgraced its name by tainted victories.”The hackers leaked Therapeutic Use Exemptions, or TUEs, which allow athletes to take banned substances on list of prohibited drugs so long as it is for verified medical conditions. The hackers claimed American Olympic athletes “just got their licenses for doping.”If anything, it seems like the leak proves American Olympic medalists are following the rules, being tested and submitting the proper paperwork for medical conditions that require the use of such drugs. At least that is how this American perceives it. Teenage Olympic medal gymnast Simone Biles took to Twitter to say:USA Gymnastics also released a statement on the WADA hack. Basketball star Elena Delle Donne thanked the hackers via Twitter.WADA blamed hack on RussiansWADA blamed the hack on a Russian cyber espionage group, claiming law enforcement said the attacks came out of Russia, but it is unclear if law enforcement actually pinned the blame on APT 28. While it is true that a group going by Fancy Bears’ Hack Team took credit for the hack, the group also claims to be flying under the banner of Anonymous.In a released statement, WADA confirmed “that a Russian cyber espionage group operator by the name of Tsar Team (APT 28), also known as Fancy Bear, illegally gained access to WADA’s Anti-Doping Administration and Management System (ADAMS) database via an International Olympic Committee (IOC)-created account for the Rio 2016 Games.”WADA thinks the ADAMS password was obtained via a spearphishing attack and that attackers only stole data related to the RIO 2016 Games.Olivier Niggli, Director General of WADA, added, “WADA has been informed by law enforcement authorities that these attacks are originating out of Russia. Let it be known that these criminal acts are greatly compromising the effort by the global anti-doping community to re-establish trust in Russia further to the outcomes of the Agency’s independent McLaren Investigation Report.”The report claimed Russian secret service helped swap Russian athletes’ positive doping samples for clean samples during the Sochi Olympics. As you may recall, some Russians athletes were banned from competing in Rio after those accusations of government-sponsored doping; others who competed were loudly booed. This attack follows the one WADA revealed last month; someone illegally accessed the ADAMS account of Russian whistleblower Yuliya Stepanova, who helped expose the “widespread doping in Russian athletics.” She is hiding in North America with her husband after fleeing Russia out of fear for her life. When WADA did announce the illegal activity on Stepanova’s account, the agency said it was aware of an “alleged hack of its website and to phishing scams.” Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe