Data
Events
Data: CASIE
Negative Trigger
The
world
governing
body
of
track
and
field
says
it
has
become
the
victim
of
a
cyberattack
by
a
Russian
hacking
group
linked
to
other
incidents
,
including
the
hacking
of
the
World
Anti-Doping
Agency
and
the
U.S.
Democratic
Party
.
In
an
April
3
statement
,
the
International
Association
of
Athletics
Federations
(
IAAF
)
attributed
the
attack
to
the
Fancy
Bear
group
.
It
said
it
believed
the attack
Attack.Databreach
``
has compromised
Attack.Databreach
athletes
'
Therapeutic
Use
Exemption
(
TUE
)
applications
stored
on
IAAF
servers
''
during
an unauthorized remote access
Attack.Databreach
to
its
network
on
February
21
.
Fancy
Bear
began
posting
Attack.Databreach
medical
records
of
Olympians
online
last
year
,
with
U.S.
and
British
athletes
making
up
a
large
proportion
of
those
targeted
.
Only
selected
records
were released
Attack.Databreach
The
IAAF
said
it
contacted
Context
Information
Security
,
a
British
security
company
,
in
January
to
undertake
a
technical
investigation
of
its
systems
.
The
company
says
that
investigation
``
led
to
the
discovery
of
a
sophisticated
intrusion
.
''
IAAF
President
Sebastian
Coe
said
his
organization
will
continue
to
do
all
it
can
to
``
to
remedy
the
situation
and
work
with
the
world
's
best
organizations
to
create
as
safe
an
environment
as
we
can
.
''
Fancy
Bear
gained
widespread
notoriety
last
year
when
cyber-researchers
identified
it
and
another
group
--
and
they
appeared
to
be
linked
to
Russian
intelligence
services
.
They
were
also
said
to
be
behind
the
hack
of
the
U.S.
Democratic
Party
's
computer
systems
.
Hundreds
of
thousands–potentially
more
than
one
million–Netgear
routers
are susceptible
Vulnerability-related.DiscoverVulnerability
to
a
pair
of
vulnerabilities
that
can
lead
to
password
disclosure
.
Researchers
said
Vulnerability-related.DiscoverVulnerability
that
while
anyone
who
has
physical
access
to
a
router
can exploit
Vulnerability-related.DiscoverVulnerability
the
vulnerabilities
locally
,
the
real
threat
is
that
the
flaw
can
also
be exploited
Vulnerability-related.DiscoverVulnerability
remotely
.
According
to
Simon
Kenin
,
a
security
researcher
with
Trustwave
’
s
Spiderlabs
team
,
who
discovered
Vulnerability-related.DiscoverVulnerability
the
flaw
and
disclosed
Vulnerability-related.DiscoverVulnerability
it
Monday
,
the
vulnerabilities
can
be
remotely
exploited
Vulnerability-related.DiscoverVulnerability
if
the
router
’
s
remote
management
option
is
enabled
.
While
Netgear
claims
remote
management
is
turned
off
on
routers
by
default
,
Kenin
said
there
are
“
hundreds
of
thousands
,
if
not
over
a
million
”
devices
left
remotely
accessible
.
Kenin
claims
that
all
he
had
to
do
was
send
a
simple
request
to
the
router
’
s
web
management
server
to
retrieve
a
router
’
s
password
.
After
determining
a
number
that
corresponds
to
a
password
recovery
token
,
he
found
he
could
pair
it
with
a
call
to
the
router
’
s
passwordrecovered.cgi
script
.
Kenin
claims
Vulnerability-related.DiscoverVulnerability
he
made
his
discovery
by
leveraging
two
exploits
disclosed
Vulnerability-related.DiscoverVulnerability
in
2014
on
some
Netgear
routers
he
had
hanging
around
.
It
wasn
’
t
until
after
Kenin
pieced
together
a
python
script
designed
to
diagnose
the
scope
of
the
issue
that
he
determined
he
could
still
retrieve
the
router
’
s
credentials
even
if
he
didn
’
t
send
the
correct
password
recovery
token
.
“
After
few
trials
and
errors
trying
to
reproduce
the
issue
,
I
found
Vulnerability-related.DiscoverVulnerability
that
the
very
first
call
to
passwordrecovered.cgi
will
give
out
the
credentials
no
matter
what
the
parameter
you
send
.
This
is
totally
new
bug
that
I
haven’t seen
Vulnerability-related.DiscoverVulnerability
anywhere
else
.
When
I
tested
both
bugs
on
different
NETGEAR
models
,
I
found
Vulnerability-related.DiscoverVulnerability
that
my
second
bug
works
on
a
much
wider
range
of
models
,
”
Kenin
wrote
Monday
.
Kenin
’
s
employer
,
Trustwave
,
divulged
Vulnerability-related.DiscoverVulnerability
details
around
both
vulnerabilities
in
a
lengthy
blog
post
Monday
,
putting
the
wraps
on
a
nearly
year-long
odyssey
with
the
vendor
.
The
firm
first disclosed
Vulnerability-related.DiscoverVulnerability
the
vulnerability
to
Netgear
in
April
2016
,
initially
it
listing
18
vulnerable
models
,
before
listing
25
vulnerable
models
in
a
subsequent
advisory
.
After
repeated
requests
for
an
update
on
a
fix
for
the
vulnerability
,
Netgear
finally
obliged
in
July
and
provided
Vulnerability-related.PatchVulnerability
firmware
updates
for
a
fraction
of
the
affected
routers
.
It
wasn
’
t
until
this
weekend
that
Netgear
acknowledged
Vulnerability-related.DiscoverVulnerability
the
issues
again
,
posting
Vulnerability-related.PatchVulnerability
an
updated
version
of
the
article
on
its
support
page
,
instructing
users
to
find
and
download
the
appropriate
firmware
fixes
.
The
most
recent
version
of
the
advisory
claims
there
are
31
vulnerable
models
,
18
of
which
are patched
Vulnerability-related.PatchVulnerability
.
The
company
is
encouraging
users
of
some
devices
in
which
firmware
is
not
available
to
implement
a
workaround
.
According
to
Netgear
,
users
of
12
different
models
would
be
best
served
to
manually
enable
password
recovery
and
disable
remote
management
on
their
devices
.
“
The
potential
for
password
exposure
remains
if
you
do
not
complete
both
steps
.
NETGEAR
is
not
responsible
for
any
consequences
that
could
have
been
avoided
by
following
the
recommendations
in
this
notification
,
”
the
company
writes
.
It
’
s
the
first
critical
vulnerability
to
affect
Vulnerability-related.DiscoverVulnerability
Netgear
routers
this
year
but
the
second
in
the
last
two
months
.
In
December
,
it
was discovered
Vulnerability-related.DiscoverVulnerability
that
a
handful
of
the
company
’
s
Nighthawk
line
of
routers
were vulnerable
Vulnerability-related.DiscoverVulnerability
to
a
flaw
that
could
have
given
an
attacker
root
access
on
the
device
and
allowed
them
to
run
remote
code
.
The
company
was
quick
to
release
Vulnerability-related.PatchVulnerability
beta
firmware
updates
to
address
Vulnerability-related.PatchVulnerability
the
vulnerability
but
simultaneously
confirmed
Vulnerability-related.DiscoverVulnerability
that
more
routers
than
originally
reported
were vulnerable
Vulnerability-related.DiscoverVulnerability
.
When
reached
Wednesday
,
a
Netgear
spokesperson
said
it
was
aware
of
the
vulnerability
and
that
it
was
appreciative
of
the
research
Trustwave
carried
out
.
Trustwave
discloses
Vulnerability-related.DiscoverVulnerability
an
unpatched
vulnerability
in
Brother
printers
with
the
Debut
embedded
webserver
after
numerous
attempts
to
contact
the
vendor
failed
.