Russian hackers leak medical files of US athletes including Venus and Serena Williams and Rio star Simone Biles

Hackers claim to have evidence of doping by US Olympians

Tim Walker
US Correspondent
Tuesday 13 September 2016 18:35
Comments
Gymnast Simone Biles, winner of four gold medals at the Rio Olympics, was among those targeted
Gymnast Simone Biles, winner of four gold medals at the Rio Olympics, was among those targeted

The World Anti-Doping Agency (Wada) has announced that its database was accessed by a Russian hacking group, which posted the confidential medical data of several US athletes online on Monday.

The cyber espionage group, known as Fancy Bear, released records on four female American Olympic athletes: tennis stars Serena and Venus Williams, gymnastics multi-gold medallist Simone Biles and basketball player Elena Delle Donne.

In each case, the hackers published records of so-called “Therapeutic Use Exemptions”, which permit athletes to use certain otherwise banned substances if they have a verified medical reason to do so. In making the disclosure, Fancy Bear said it planned to release more information in due course.

The group, also known as Tsar Team, claimed the Therapeutic Use Exemptions constituted evidence of doping by US Olympians. “After detailed studying of the hacked Wada databases we figured out that dozens of American athletes had tested positive,” the hackers said in a statement. “The Rio Olympic medallists regularly used illicit strong drugs justified by certificates of approval for therapeutic use. In other words, they just got their licences for doping.”

US Anti-Doping Agency (Usada) chief Travis Tygart said in a statement that it was “unthinkable” for hackers to “illegally obtain confidential medical information in an attempt to smear athletes to make it look as if they have done something wrong.” He added: “In fact, in each of the situations, the athlete has done everything right in adhering to the global rules for obtaining permission to use a needed medication.”

WADA Report Outlines Alleged Russian Doping Cover Up System Used in Sochi

Wada had previously warned that it might face cyberattacks, following its investigators’ revelations of Russian state-sponsored doping in the run-up to the Rio Games this summer. “These criminal acts are greatly compromising the effort by the global anti-doping community to re-establish trust in Russia,” said Olivier Niggli, the agency’s director general. “Wada deeply regrets this situation and is very conscious of the threat that it represents to athletes whose confidential information has been divulged.”

The agency said it believed the hack was carried out using spear-phishing emails to gather passwords for the Wada Anti-Doping Administration and Management System (Adams) database. Less than a month ago, the agency confirmed that a hacker had accessed the Adams account for Yuliya Stepanova, the Russian 800-metre runner who blew the whistle on the widespread doping among her country’s Olympic team.

More than 100 Russian athletes were subsequently banned from competing in Rio, following the publication of an independently commissioned Wada report, which found evidence of a Russian state-run doping programme going back at least four years.

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Join our new commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in