Attacks/Breaches

6/22/2012
10:57 AM
50%
50%

Hackers Cite 'Idiot Tax,' Release Loan Records

Rex Mundi hacker group publishes thousands of records containing personal loan application data after payday lender AmeriCash Advance refuses $20,000 hush money request.

Earlier this month, payday loan lending company AmeriCash Advance received a ransom demand: Pay up, or see your loan-lending database get released to the Internet.

"We offered AmeriCash Advance not to publish those records, for the applicants' sake, if they paid us USD $20,000. They didn't. Hence the fact that you are now reading this data," read a statement released by hacking group Rex Mundi (which is Latin for "king of the world"). That statement was included in a 2.4-MB text file uploaded this week to file-sharing websites.

The text file data dump contains about 13,500 records, many of which include full names, email addresses, loan status, the loan amount requested by the applicant, and the amount of money earned by the affiliate company or provider who referred the applicant to AmeriCash Advance. Some records also include loan application notes that sport biographical details.

All of the records also include a field for the applicant's social security number. While all but the last four digits of the social security number are starred out, many companies--such as credit card providers--only use these four digits to help verify a phone caller's identity. Accordingly, this information could be useful to identity thieves.

Despite the warning from Rex Mundi that it would release the customer database, AmeriCash Advance said that it refused to work with extortionists. "We will not cave in to blackmail, and are cooperating fully with the authorities to protect our customers and bring these criminals to justice," according to a statement AmeriCash Advance provided to CNET.

[ Privacy Rights Clearinghouse has logged 266 breaches so far this year. Which are the worst? See 6 Biggest Breaches Of 2012. ]

Unusual for a hacker outfit, Rex Mundi sports a Bible verse--"Non nobis, Domine, non nobis, sed nomini tuo da gloriam" (translation: "Not to us, not to us, O Lord, But to your name give glory")--as its tagline, and claims to hail from Belgium. The group first surfaced on Twitter May 1.

In addition, while Rex Mundi labeled its ransom demand an "idiot tax," the group has worked to differentiate itself from hacktivist groups such as Anonymous that are only interested in leaking data in pursuit of a social agenda. "We <3 hacktivists like @AnonymousPress. However, we're in it for the money, which is also pretty awesome," according to a tweet from the group. "How we miss the good old days of LulzSec."

Why target AmeriCash Advance? Perhaps because the company offers payday loans--loans that must be repaid at the borrower's next payday--and cash advances. Under state laws, payday loans are legal in 37 states, which all cap maximum loan limits at either $500 or $1,500. In the case of AmeriCash Advance, its annual percentage rates reportedly range from 353% to 1,368%.

According to AmeriCash Advance, the first ransom demand surfaced not via email or Twitter, but its fax machine. "On June 12, AmeriCash Advance received a fax, telling us that part of our website had been hacked. The letter went on to demand initial payment of $15,000 from us," it said.

The company also explained how attackers had managed to grab its applicant database: "The section of the system that the criminals hacked into was the automatic e-mail responder section, the part of the system that sends an auto-reply to an applicant that their application has been received," the statement said. "We have notified those who have been affected and warned them to be vigilant. We are continuing to work closely with the authorities to identify the criminals."

But Rex Mundi disagreed with AmeriCash Advance's technical explanation of how the information had been obtained. "Tst, tst ... AmeriCash Advance, we didn't 'hack' into your system. The page was open to any1 & listed in your robots.txt," the group said via Twitter, which suggests that whoever designed the AmeriCash Advance website had purposefully left the file unsecured--to make it easier for affiliates to access--while leaving a request to Web crawlers to not index the page. "Oh, and it wasn't an email responder system, it was a page generating reports 4 yr affiliates. Get your facts straight," according to Rex Mundi.

AmeriCash Advance didn't immediately respond to a request for comment about whether it planned to offer identity theft protection services to the thousands of people affected by the breach. But as a recent report from the Consumer Federation of America noted, such services often do nothing to stop identity theft involving social security numbers.

Given the number of social security numbers that have been exposed in data breaches, some security experts are asking if it isn't time to rethink social security numbers. One approach--practiced in Spain--involves using national identity cards that contain a cryptographic chip. Anyone who wants to use the social security number as part of a transaction must first get the cardholder to digitally authenticate the transaction by using correctly entering the chip's PIN code to verify the identity.

The stakes have never been higher in the fight for control of corporate and consumer devices between malicious code and the anti-malware software designed to detect and stop it. The Malware War report covers the key methods malware writers use to thwart analysis and evade detection. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
GBARRINGTON196
50%
50%
GBARRINGTON196,
User Rank: Apprentice
6/24/2012 | 10:55:14 AM
re: Hackers Cite 'Idiot Tax,' Release Loan Records
I wonder how often other businesses have just knuckled under. I don't imagine the typical payday load customer is very sophisticated, so the commercial backlash to Americash is likely to be small. And the absolute economic value of these peoples identity is much smaller than those with fat bank accounts and a stack of credit cards. Though I suspect they may be useful as identities for malfeasance of other sorts.

I like the social security card suggestion, of using some sort of smart card as a companion to the number. But we could make it much more difficult for thieves if we just made it illegal for businesses to use SSN as an identifier.
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7268
PUBLISHED: 2018-05-21
MagniComp SysInfo before 10-H81, as shipped with BMC BladeLogic Automation and other products, contains an information exposure vulnerability in which a local unprivileged user is able to read any root (uid 0) owned file on the system, regardless of the file permissions. Confidential information suc...
CVE-2018-11092
PUBLISHED: 2018-05-21
An issue was discovered in the Admin Notes plugin 1.1 for MyBB. CSRF allows an attacker to remotely delete all admin notes via an admin/index.php?empty=table (aka Clear Table) action.
CVE-2018-11096
PUBLISHED: 2018-05-21
Horse Market Sell &amp; Rent Portal Script 1.5.7 has a CSRF vulnerability through which an attacker can change all of the target's account information remotely.
CVE-2018-11320
PUBLISHED: 2018-05-21
In Octopus Deploy 2018.4.4 through 2018.5.1, Octopus variables that are sourced from the target do not have sensitive values obfuscated in the deployment logs.
CVE-2018-8142
PUBLISHED: 2018-05-21
A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka &quot;Windows Security Feature Bypass Vulnerability.&quot; This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1035.