WADA details response to Fancy Bears' hacking
Anti-doping agency says its investigation into athlete TUE revelations is ongoing
The World Anti-Doping Agency (WADA) on Wednesday released a statement detailing the security and investigatory steps it has taken in light of the recent Fancy Bears hacking that revealed athletes' confidential medical information, including Therapeutic Use Exemptions granted to Grand Tour winners Chris Froome and Bradley Wiggins.
Tour de France winners Froome and Wiggins named in confirmed 'Fancy Bear' WADA hack
USADA and UKAD condemn Fancy Bear's hacking of athletes' medical documents
Bobridge, Trott latest targets of 'Fancy Bears' WADA hack
Skinner latest target in 'Fancy Bears' medical records hack
Cancellara, Cummings, Fuglsang featured in latest Fancy Bears leak
Tom Dumoulin says Wiggins' TUE case stinks
Froome calls on anti-doping authorities to 'urgently address' TUE system
WADA object to Team Sky's idea of making TUEs public
Bradley Wiggins explains TUE use, asthma and allergies
Latest Fancy Bears leaks include Emma Johansson's TUE records
Revelations that the UCI granted Wiggins TUEs for asthma medication Salbutamol and for the powerful corticoid Triamcinolone Acetonide stirred controversy that continues to reverberate.
In its Wednesday statement, WADA revealed that since the Fancy Bears hackers gained access to the Anti-Doping Administration and Management System [ADAMS] that was created especially for the Rio 2016 Olympic Games [Rio 2016 ADAMS Account], gaining access to TUE information for all the athletes competing at the RIO Olympics, it has deactivated all Rio 2016 ADAMS accounts; disabled the self-service 'forgot password' reset feature; increased logging capabilities related to security events; increased monitoring of logs and network activity; and deactivated dormant accounts.
Earlier this week, WADA announced it hired Günter Younger, creator and director of the Cybercrimes division of the Bavarian Landeskriminalamt (BLKA) in Germany, as director of the agency's Intelligence and Investigations unit.
WADA also revealed that the investigation taken up by Mandiant, a security and forensic consulting firm, into the agency's online assets is 90 percent complete, and it has not found "any evidence of additional compromise to ADAMS data beyond the export of the Rio 2016 ADAMS Account data through 12 September," the day before the Fancy Bear breach was revealed.
The anti-doping agency also said it has warned athletes, other ADAMS users and administrators to "vigilantly monitor their electronic communications and remain alert for attempted phishing schemes," adding that it had been informed "that some users have received suspicious emails, purportedly from WADA’s Deputy Director General, Rob Koehler, advising them that WADA’s President wanted to speak with them regarding the cyber-attacks."
WADA made it clear that the emails were not authentic, and that "no such email was ever sent by the Deputy Director General," again pleading with ADAMS users to remain vigilant to possible scams.
Get The Leadout Newsletter
The latest race content, interviews, features, reviews and expert buying guides, direct to your inbox!
Moreover, not all data Fancy Bears released accurately reflected ADAMS data, according to the WADA statement, and the agency encouraged any affected parties to contact WADA should they become aware of any inaccuracies in the data that has been released.
Summary of Fancy Bears breach
As part of Wednesday's statement, WADA revealed that third party hackers targeted a number of WADA and International Olympic Committee email accounts before and during the 2016 Games for an email "spear phishing" attack that potentially led to the compromise of certain ADAMS passwords.
WADA's investigators believe an intruder illegally accessed the Rio 2016 ADAMS Account multiple times between August 25 and September 12 using credentials unlawfully obtained from one of these targeted users.
Beginning on September 13, Fancy Bear began releasing information about TUEs for athletes competing in the Rio Games. "The released data all corresponds to the data thefts that occurred between 25 August and 12 September as described above," according to the statement.