usually included names , emails , and physical addresses , and even personal bank details , ethnicity data , and phone numbers . And the hacks aren ’ t stopping anytime soon . 2017 has already been dominated by numerous data breachesAttack.Databreachand the most recent affects the Association of British Travel Agents , commonly known as ABTA . To keep you in the loop on data breachesAttack.Databreachthis year , WIRED will keep a running tally of successful hacks . The abta.com web server for the Association of British Travel Agents ( ABTA ) was recently hackedAttack.Databreachby “ an external infiltrator ” who exposedAttack.Databreachthe details of 43,000 individuals . Around 1,000 of these included files that could include personal identity information of customers of ABTA members uploaded since 11 January 2017 , while around 650 may also include personal identity information of ABTA members . As the UK ’ s largest travel association , ABTA ’ s members include travel agents and tour operators . The unauthorised accessAttack.Databreachwas said to be possible due to a system vulnerability “ that the infiltrator exploited ” to accessAttack.Databreachsome data provided by some customers of ABTA Members and by ABTA Members themselves . On immediate investigation , ABTA saidVulnerability-related.DiscoverVulnerabilityit identifiedVulnerability-related.DiscoverVulnerabilitythat although ABTA ’ s own IT systems remained secure , there was a vulnerability to the web server managed for ABTA through a third-party web developer and hosting company . “ This , unfortunately , means some documentation uploaded to the website , as well as some information provided by customers , may have been accessedAttack.Databreach, ” ABTA ’ s CEO , Mark Tanzer said . As a precautionary measure , it has taken steps to warn its members and customers of ABTA members who have the potential to be affected . The group has also alerted the relevant authorities , including the Information Commissioner ( ICO ) and the police .
The IAAF said in a statement the hacking group known as Fancy Bear , which has been linked by western governments and security experts to a Russian spy agency blamed for some of the cyber operations that marred the 2016 U.S. election , was believed to be behind the attack of medical records in February . The hack targeted information concerning applications by athletics for Therapeutic Use Exemptions , the IAAF said . Athletes who had applied for TUEs since 2012 have been contacted and IAAF president , Sebastian Coe , apologized . ” Our first priority is to the athletes who have provided the IAAF with information that they believed would be secure and confidential , ” Coe said in the statement . “ They have our sincerest apologies and our total commitment to continue to do everything in our power to remedy the situation ” . TUEs are issued by sports federations and national anti-doping organizations to allow athletes to take certain banned substances for verified medical needs . The IAAF said that data on athlete TUEs was “ collectedAttack.Databreachfrom a file server and stored on a newly created file ” . “ The attack by Fancy Bear , also known as APT28 , was detected during a proactive investigation carried out by cyber incident response ( CIR ) firm Context Information Security , ” the IAAF said . Private security firms and U.S. officials have said Fancy Bear works primarily on behalf of the GRU , Russia ’ s military intelligence agency . Fancy Bear could not be immediately reached for comment . The group and other Russian hackers were behind the cyber attacks during the U.S. presidential election last year that were intended to discredit Democratic candidate Hillary Clinton and help Donald Trump , a Republican , win , according to U.S. intelligence agencies . It was not known if the information was stolenAttack.Databreachfrom the network , the IAAF said , but the incident was “ a strong indication of the attackers ’ interest and intent , and shows they had accessAttack.Databreachand means to obtainAttack.Databreachcontent from this file at will ” . The attack was uncovered after British company Context Information Security conducted a investigation of the IAAF ’ s systems at the request of the athletics body . Context Information Security said in a separate statement that it was a “ sophisticated intrusion ” and that “ the IAAF have understood the importance and impact of the attack and have provided us comprehensive assistance ” . Last year , Fancy Bear hackedAttack.Databreachinto the World Anti-Doping Agency ( WADA ) database and publishedAttack.Databreachthe confidential medical records of several dozen athletes . Those included cyclist Bradley Wiggins , the 2012 Tour de France winner and Britain ’ s most decorated Olympian with eight medals , who was revealed to have used TUEs before some races . Wiggins retired last year under something of a cloud after it was revealed he took corticosteroid triamcinolone for asthma , although he broke no anti-doping rules . The IAAF banned Russia ’ s athletics federation after a WADA commission report found evidence of state-sponsored doping . Almost all Russia ’ s athletes missed the track and field events at the Rio Olympics last year and are likely to also miss the world athletics championships in London in August
Over the weekend , a hacker known as TheDarkOverlord resurfaced and released the first episode of season five for `` Orange is the New Black '' a popular show on Netflix that is n't slated to air until June . A short time later , TheDarkOverlord released episodes 2 though 10 , along with a warning to other Hollywood studios – you 're next . The media jumped on the story . Netflix would n't confirm or deny the leakedAttack.Databreachepisodes were legitimate , stating that proper law enforcement had been notified , and that a company used by several TV studios `` had its security compromised . '' The company in question , Larson Studios , does audio post-production work for a number of shows and films , including NCIS Los Angeles , Designated Survivor , and Arrested Development . According to Larson Studios , they 've done work for FOX , Netflix , ABC , NBC , IFC , Showtime , and more . As word of Netflix 's security problem started to spread , news outlets starting comparing the incident to the Sony Pictures hack and the medical hacks over the last few years . While there are some comparisons to be made , they 're not the same type of threat . Netflix did n't have a Ransomware incident , and neither did Larson Studios . Their files were stolenAttack.Databreach, not encrypted . Ransomware encrypts the files on a computer and renders them useless . Victims can recover the files if they pay a fee (ransom)Attack.Ransom, or they can try and recover the files from backups . According to TheDarkOverlord , Larson Studios was targeted because they were a post-production company . Late last year , TheDarkOverlord hackedAttack.DatabreachLarson Studios and downloadedAttack.Databreachan unknown number of files . Plenty of reporters knew TheDarkOverlord had targeted Hollywood , but until this weekend there was never any proof . Fast forward a few months . When Larson Studios did n't comply with the extortion demandsAttack.Ransom, TheDarkOverlord turned their attention to Netflix . When Netflix refused to payAttack.Ransom, season five ( minus three episodes ) of `` Orange is the New Black '' was released for download . `` It did n't have to be this way , Netflix . You 're going to lose a lot more money in all of this than what our modest offer was . We 're quite ashamed to breathe the same air as you . We figured a pragmatic business such as yourselves would see and understand the benefits of cooperating with a reasonable and merciful entity like ourselves , '' TheDarkOverlord wrote in a statement . Netflix surpassed $ 2.5 billion in quarterly streaming revenue in Q1 2017 , and added five million members to their subscriber base . While having one of their popular series leakedAttack.Databreachto the web is n't exactly helpful , it is n't clear if there will be any financial impact from this incident . Once again , extortion and Ransomware are two separate things . Netflix and Larson Studios are (were) being extortedAttack.Ransom, they were not infected with Ransomware and have complete accessAttack.Databreachto their files . However , there is a lesson to be learned . Third-parties are always going to pose a risk to any organization , and this is certainly the case in Hollywood where secrecy and suspense are key to their business model .
Earlier this week , private photos and video clip of the famous WWE Divas Lisa Marie Varon known by her WWE name Victoria and Charlotte Flair were leakedAttack.Databreachonline the internet . The photos showed Charlotte taking selfies of herself in front of the mirror using her iPhone while in Lisa ’ s case a video clip in her private moments along with selfies taken from her iPhone have been leakedAttack.Databreach. Her original name being Ashley Fliehr , the WWE woman wrestler is the daughter of Ric Flair , who is again a well-known wrestling legend . She is considered as one of the most popular WWE stars having been the women ’ s champion for up to four times . She began her career by first appearing on NXT in 2013 , and after a year , she managed to win NXT Women ’ s Championship . Later , she won the WWE Divas Championship after being promoted to the main roster in 2015 . She had also been married twice . Her first marriage was in 2010 with Riki Johnson . They later filed for divorce and Flair then married Bram in 2013 . They got divorced in 2015 . Flair also had a brother , Reid , who was found dead in March 2013 , in Charlotte ’ s bed and it was revealed that he died from heroin overdose . Flair tweeted about her photos being leakedAttack.Databreachsaying that her photos were shared online without her consent and demanded that they should be removed immediately . Upon this , there were a plethora of supporters who emerged on Twitter , showing their support for Flair with the hashtag Flair , however , is not the only victim whose photos have been leakedAttack.Databreachso unscrupulously . Alexa Bliss , who currently holds the title of RAW Women ’ s Champion , had her photos leakedAttack.Databreachas well on April 28 . Alexa tweeted that the photos are fake and demanded that they should be taken down immediately . Similarly , Paige , who was WWE Divas Champion , had her private photos hackedAttack.Databreachalong with explicit videos that were made public online . She later wrote that she felt quite bad and wanted to harm herself for days after the leak . Furthermore , private photos of WWE Divas including Maria Kanellis , Melina Perez , Kaitlyn and Summer Rae were also leakedAttack.Databreachon different online platforms . That ’ s not all , it was about two months ago when hackers leakedAttack.Databreachprivate photos of prominent Hollywood celebrities like Amanda Seyfried , Emma Watson . However , It is quite unnerving and yet troubling to see how these WWE stars are being exploited and no attention is being paid to the security standards of mobile communication . It is vital that network operators look into the issue immediately and build proper security features to prevent such infiltrations .
The hackers left a deface page along with a brief message explaining the reason for defacing the site and criticizing the role of “ political elite ” for the problems faced by “ common people ” . The message also criticized the role of Bilderberg group for planning wars for personal interests . The hackers also warned the group members to start working for human beings and their benefits rather than personal interests or expect more hacks since “ they ” the hackers will be watching them . “ Dear Bilderberg members , from now , each one of you has 1 year ( 365 days ) to truly work in favor of humans and not your private interests . Each TopIc you discuss or work you achieve through Your uber private meetings should from now benefit world population and not X or Y group of people otherwise , we will find you and we will hack you , ” according to the message . Here is a full preview of the deface page left by Anonymous and HackBack movement : If you are not aware of the HackBack hacker and their movement then HackBack also goes by the online handle of “ Phineas Phisher ” “ Hack Back ! ” and “ @ GammaGroupPR ” who came in the news some months ago after donating around €10,000 ( about £8,000 ) Bitcoin to a Kurdish anticapitalist group “ Rojava Plan ” that is based in Rojava . The hacker then hackedAttack.Databreachthe Catalan Police Union server and leakedAttack.Databreachhighly sensitive data against police brutality . The same hacker then hackedAttack.DatabreachSpanish Police server and ended up leakingAttack.Databreachpersonal details of police officers against the infamous Gag Law . Remember , it was the same law that forced a woman to pay a fine of 800 euros/ $ 889 for uploading a picture on Facebook showing a police car parked in a disabled spot
The hackers left a deface page along with a brief message explaining the reason for defacing the site and criticizing the role of “ political elite ” for the problems faced by “ common people ” . The message also criticized the role of Bilderberg group for planning wars for personal interests . The hackers also warned the group members to start working for human beings and their benefits rather than personal interests or expect more hacks since “ they ” the hackers will be watching them . “ Dear Bilderberg members , from now , each one of you has 1 year ( 365 days ) to truly work in favor of humans and not your private interests . Each TopIc you discuss or work you achieve through Your uber private meetings should from now benefit world population and not X or Y group of people otherwise , we will find you and we will hack you , ” according to the message . Here is a full preview of the deface page left by Anonymous and HackBack movement : If you are not aware of the HackBack hacker and their movement then HackBack also goes by the online handle of “ Phineas Phisher ” “ Hack Back ! ” and “ @ GammaGroupPR ” who came in the news some months ago after donating around €10,000 ( about £8,000 ) Bitcoin to a Kurdish anticapitalist group “ Rojava Plan ” that is based in Rojava . The hacker then hackedAttack.Databreachthe Catalan Police Union server and leakedAttack.Databreachhighly sensitive data against police brutality . The same hacker then hackedAttack.DatabreachSpanish Police server and ended up leakingAttack.Databreachpersonal details of police officers against the infamous Gag Law . Remember , it was the same law that forced a woman to pay a fine of 800 euros/ $ 889 for uploading a picture on Facebook showing a police car parked in a disabled spot
According to Darin Stanchfield , KeepKey founder and CEO , the attack took place on Christmas Day , December 25 , when an unknown attacker had activated a new phone number with Stanchfield 's Verizon account . This allowed the attacker to request a password reset for his Verizon email account , but receive the password reset details on the newly activated phone number . A few minutes later , the attacker had taken over Stanchfield 's email account and proceeded to request password resets for several services where the KeepKey founder had used that email address to register profiles . In no time , the attacker had taken over several of Stanchfield 's accounts on other sites , such as KeepKey 's official Twitter account , and several of KeepKey 's side services , such as accounts for sales distribution channels and email marketing software . In less than an hour after the attack started , the KeepKey CEO had discovered what happened and started working with his staff to regain access to the hijacked accounts , while also blocking the intruder from reaching other KeepKey services . The attacker also contacted the KeepKey staff , offering to provide details about how he hackedAttack.Databreachthe Verizon email account and what he stoleAttack.Databreach. The attacker had also promised to return the stolen data and keep quiet about the hackAttack.Databreachif KeepKey would agree to payAttack.Ransomhim 30 Bitcoin ( ~ $ 30,000 ) . Instead of paying the ransom demandAttack.Ransom, the KeepKey team managed to stall the attacker for two more hours , during which time they regained access to all but one account , the company 's Twitter profile . Since the night of the hack , the company has filed a complaint with the FBI and is now offering the 30 Bitcoin ransomAttack.Ransomas a reward for any clues that lead to the attacker 's arrest . KeepKey was adamant about the attacker not being able to access any of its customers ' Bitcoin access keys stored on its devices . KeepKey is known in the Bitcoin market for manufacturing hardware devices that allow users to store the access keys used to authenticate on Bitcoin wallets . The device , which is a modified USB storage unit , works offline and the keys on it can be accessed only with physical access to the device . In the Christmas security breach , the attacker would have only managed to stealAttack.Databreachhome addresses , emails , and phone numbers from users that have bought KeepKey devices in the past , and not the content of those devices . It is unknown at the time of writing if the attacker used the access over these accounts to stealAttack.Databreachany KeepKey customer data . Nevertheless , as a precautionary measure , the company is offering a 30-day refund policy to all customers that had their details stored in the sales distribution channels and email marketing software accounts that the attacker managed to gain accessAttack.Databreachto . At the start of December , someone had taken over the mobile number of Bo Shen , the founder of Bitcoin venture capital firm Fenbushi Capital , and had stolen at least $ 300,000 worth of Augur and Ether cryptocurrency . Two weeks later , the same hacker took over a mobile number for one of the Ethereum Project 's admins and used it to reset the passwords for various accounts , eventually downloading a copyAttack.Databreachof Ethereum forum database backup , dated to April 2016 . At the time of writing , there are no clues that link the first two attacks with the security breach at KeepKey , despite the similar hacking methods