• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Cyberattacks on Athletes May Be Russian Distraction Tactic

September 17, 2016 by Shain R. Amzovski 4 Comments

This past Wednesday, private information about international athletes leaked on the internet.  This information was allegedly leaked from the World Anti-Doping Agency, and included 25 medical drug exemptions given to athletes from 8 different countries.  As many of you may know, Russia was banned from competing in the Olympics in several sports this summer in Rio, due to a systematic doping scandal with Russian athletes in all sports.  The hackers originally gained access through a phishing technique used against the whistle-blower that accused Russia of state-sponsored doping.  There is no proof that Russia was behind the cyber-attack, but all evidence suggests it was a hacking group called “Tsar Team” or “Fancy Bear”.

 

http://www.technewsworld.com/story/83906.html?google_editors_picks=true

Filed Under: Week 04: Vulnerability Scanning Tagged With:

Reader Interactions

Comments

  1. Jason A Lindsley says

    September 18, 2016 at 7:32 am

    I found it interesting that the article seems to imply that Russian cyber attacks are occurring to divert media attention away from media negativity surrounding Donald Trump. That seems like a strange motive to me, especially for this attack on athletes. I would agree that the attacks on the DNC e-mails and other recent leaks about Hillary Clinton are politically motivated, but this one seems like a reach.

    Log in to Reply
  2. Vaibhav Shukla says

    September 18, 2016 at 12:39 pm

    Yeah its a bit strange that athletes who put on so much efforts are even not spared from such cyber attacks.The WADA (world anto doping agency ) has actually confirmed that Russian cyber espionage group Fancy Bear, which is also known as Tsar Team, accessed the Americans’ data through an International Olympic Committee account created for the Rio Olympics by spear phishing email accounts to obtain passwords to its database
    The group released information on four American athletes — Simone Biles, Elena Delle Donne, Serena Williams and Venus Williams on their website.

    Log in to Reply
  3. Ioannis S. Haviaras says

    September 18, 2016 at 5:29 pm

    Shain,

    Great article. This goes to show how any organization is vulnerable to attacks such as phishing. Even though it isn’t known who did the attack it is a bit tough to not overlook Russia as a possibility based on the relationship they had with WADA and the Olympics in Rio. WADA should learn from this attack and try to train their employees for phishing attacks to prevent this from happening in the future.

    Log in to Reply
  4. Mengxue Ni says

    September 20, 2016 at 6:34 pm

    Shain,

    I read article that related to Fancy Bear as well. They also leaked American athletes–Simone Biles and Serena Williams’ medical records. Both reports indicated that they were doped during the Olympic game but the anti-doping agency didn’t mention it. They had to explained to the public that those medicines didn’t count for prohibited drugs. I don’t know who is right, but I still hope Olympic can be hold under a fair and honest environment.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in