Recent cyberattacks targeting the World Anti-Doping Agency (WADA) have been linked by researchers to the notorious Russian threat actor known as Fancy Bear.
WADA, a non-profit organization initiated by the International Olympic Committee (IOC) and supported by national governments, is tasked with promoting, coordinating and monitoring the fight against drugs in sports.
The organization warned stakeholders earlier this month that malicious actors had registered two fake WADA domains, Wada-awa.[org] and Wada-arna.[org], and leveraged them for phishing attacks designed to trick users into handing over their credentials for the Anti-Doping Administration and Management System (ADAMS). One of the users who fell for the scam was Yuliya Stepanova, a whistleblower who exposed widespread doping in Russian athletics.
Following the exposure of a Russian state-sponsored doping program, many Russian competitors were banned from the Olympics and the country’s entire team was suspended from the upcoming Paralympics.
Russia’s interest in the WADA seems to back the findings of threat intelligence firm ThreatConnect, which uncovered evidence that a threat actor believed to be sponsored by the Russian government is behind the attacks.
An analysis of the fake WADA domains revealed that they were likely registered by the group known as Fancy Bear, APT28, Pawn Storm, Strontium, Sofacy, Sednit and Tsar Team. ThreatConnect’s investigation showed that the attackers also registered tas-cass.[org], which typosquats the official domain of the Court of Arbitration for Sport (CAS).
“We assess that the phishing and Stepanova’s compromise most likely are part of targeted activity by Russian actors in response to the whistleblower and the WADA’s recommendation to ban all Russian athletes from the Olympic and Paralympic games in Rio de Janeiro, Brazil,” researchers explained. “Successful operations against these individuals and organizations could facilitate Russian efforts to privately or publically intimidate them or other potential whistleblowers.”
At around the same time as the WADA phishing attempts, a group calling itself Anonymous Poland leaked files allegedly stolen from the systems of WADA and CAS. While they haven’t found any definitive proof, circumstantial evidence suggests that these attacks could also be the work of a Russian group that used the Anonymous brand to throw investigators off track.
Researchers also blamed Fancy Bear for the recent attacks on the Democratic National Committee (DNC) and the Democratic Congressional Campaign Committee (DCCC). A hacker using the online moniker Guccifer 2.0 has taken credit for both attacks and leaked numerous documents to prove it. However, experts believe Guccifer 2.0 is just a “Russian propaganda effort,” not an independent hacker from Romania, as he claims to be.
Related: XTunnel Malware Specifically Built for DNC Hack
Related: More Evidence Links Russia to DNC Attack
Related: Evidence Links Russia to Second Democratic Party Hack

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
- Cybercriminals, APT Exploited Telerik Vulnerability in Attacks on US Government Agency
- US Charges Two Men Over Use of Hacked Law Enforcement Database for Doxing
- Chinese Cyberspies Hacked DLP Company Serving Military, Government Orgs
- Data Security Firm Rubrik Targeted With GoAnywhere Zero-Day Exploit
Latest News
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- New York Man Arrested for Running BreachForums Cybercrime Website
- Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder
- Latitude Financial Services Data Breach Impacts 300,000 Customers
- US Government Warns Organizations of LockBit 3.0 Ransomware Attacks
- New ‘Trigona’ Ransomware Targets US, Europe, Australia
- New Espionage Group ‘YoroTrooper’ Targeting Entities in European, CIS Countries
