False Clues Make It Tough to Find WADA Hackers

Advertisement
By Associated Press | Updated: 16 September 2016 14:22 IST

Medical data from some of the world's leading athletes has been posted to the web and the World Anti-Doping Agency says Russians are to blame. Even the hackers seem to agree, adopting the name "Fancy Bears" - a moniker long associated with the Kremlin's electronic espionage operations.

But as cybersecurity experts pore over the hackers' digital trail, they're up against a familiar problem. The evidence has been packed with possible red herrings - including registry data pointing to France, Korean characters in the hackers' code and a server based in California.

(Also see: World Anti-Doping Agency Condemns Russian Hack Attack)

Advertisement

"Anybody can say they are anyone and it's hard to disprove," said Jeffrey Carr, the chief executive of consulting firm Taia Global and something of a professional skeptic when it comes to claims of state-backed hacking.

Advertisement

Many others in the cybersecurity industry see the WADA hack as a straightforward act of Russian revenge, but solid evidence is hard to find.

What's known is that it was only days after scores of Russian athletes were banned from the Olympic Games that suspicious looking emails began circulating . Purporting to come from WADA itself, the booby trapped messages were aimed at harvesting passwords to a sensitive database of drug information about athletes worldwide. Among other things, the Anti-Doping Administration and Management System carries information about which top athletes use otherwise-banned substances for medical reasons - prize information for a spurned Olympic competitor seeking to embarrass its rivals.

Advertisement

On September 1 someone registered a website titled "Fancy Bears' Hack Team." A few days later, a Twitter account materialized carrying a similar name. Just after midnight Moscow time on September 13, the Fancy Bears Twitter account came alive, broadcasting the drugs being taken by gold medal-winning gymnast Simone Biles, seven-time Grand Slam champion Venus Williams and other US Olympians. It followed up Thursday with similar information about the medication used by British cyclists Bradley Wiggins and Chris Froome, among many others.

(Also see: WADA Confirms Another Hacking of Its Athletes Database)

There is no suggestion any of the athletes broke any rules, but Russians seized on the leak as evidence that US and British players were using forbidden drugs with the blessing of anti-doping officials.

Advertisement

"Hypocrisy" Russia's embassy to London tweeted in reaction to the news. Kremlin channel RT broadcast a cartoon showing a WADA official picking up a bulky American player's steroid bottle with a smile. "All good! You're cleared to compete!" he says.

Citing law enforcement sources, WADA said the attacks "are originating out of Russia." Russian officials dismissed the allegation; in an email, WADA said it wouldn't be commenting further.

With little to go on, independent investigators have still made some intriguing connections.

Virginia-based intelligence firm ThreatConnect said that whoever compromised WADA did so using websites registered through an obscure domain name company that also set up the fake sites used in a variety of other hacks blamed on the Kremlin, including the one that hit the Democratic National Committee. In a telephone interview, the company's chief intelligence officer, Rich Barger said he had been cautious at first about tying the WADA breach to Russian hackers but that "confidence is certainly growing as more and more people weigh in and lend their voice."

Even the meaning of the name "Fancy Bears" is unclear. California-based threat intelligence firm CrowdStrike has long applied that nickname to an allegedly Russian state-backed group, but the hackers' adoption isn't necessarily a brazen acknowledgement of CrowdStrike's research. It might be an attempt to hold it up to ridicule. Which interpretation the group favors hasn't been made clear. Repeated messages to email addresses associated with Fancy Bears have gone unreturned.

Fancy Bears' website doesn't necessarily provide any more insight. Some its artistry appears to have been lifted from a Russian clip art page. But tech podcaster Vince Tocce also found Korean script in the site's code - characters which vanished shortly after he made his discovery public . In a telephone interview, he said that showed how difficult it was to take anything for granted.

Some pieces of Fancy Bears' infrastructure were almost certainly structured to sow confusion.

The site, for example, appears to be hosted in California but was registered at an address in the town of Pomponne, east of Paris, under the name "Jean Guillalime."

A man residing at that address, Jean-Francois Guillaume, told The Associated Press the registry information was bogus and that he was mystified as to why the hackers had picked on him.

"I have absolutely nothing to do with this," he said, adding that he ran a consulting shop and a flower business and wasn't particularly interested in sports. "I don't know any Russians," he said.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. Top OTT Releases of the Week: Kantara Chapter 1, Lokah Chapter 1, Idli Kadai, and More
  2. Know Your Vehicle (KYV) Explained: All You Need to Know About the Process
  3. Xiaomi 17, Poco F8 Series and Redmi Note 15 Certified, Could Launch Soon
  4. You Can Now Repair the iPhone 17 Series, iPhone Air Yourself in These Regions
  5. Realme GT 8 Pro India Launch Date Leaked: Here's When It Might Arrive
  1. SpaceX Revises Artemis III Moon Mission with Simplified Starship Design
  2. Rare ‘Second-Generation’ Black Holes Detected, Proving Einstein Right Again
  3. Starlink Hiring for Payments, Tax and Accounting Roles in Bengaluru as Firm Prepares for Launch in India
  4. Google's 'Min Mode' for Always-on Display Mode Spotted in Development on Android 17: Report
  5. OpenAI Upgrades Sora App With Character Cameos, Video Stitching and Leaderboard
  6. Samsung's AI-Powered Priority Notifications Spotted in New One UI 8.5 Leak
  7. Samsung Galaxy S26 Series Could Feature Model Slimmer Than Galaxy S25 Edge With New Name
  8. iQOO 15 Colour Options Confirmed Ahead of November 26 India Launch: Here’s What We Know So Far
  9. Vivo X300 to Be Available in India-Exclusive Red Colourway, Tipster Claims
  10. OpenAI Introduces Aardvark, an Agentic Security Researcher That Can Find and Fix Vulnerabilities
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.