Hackers Cite 'Idiot Tax,' Release Loan Records

Rex Mundi hacker group publishes thousands of records containing personal loan application data after payday lender AmeriCash Advance refuses $20,000 hush money request.

Mathew J. Schwartz, Contributor

June 22, 2012

4 Min Read

Earlier this month, payday loan lending company AmeriCash Advance received a ransom demand: Pay up, or see your loan-lending database get released to the Internet.

"We offered AmeriCash Advance not to publish those records, for the applicants' sake, if they paid us USD $20,000. They didn't. Hence the fact that you are now reading this data," read a statement released by hacking group Rex Mundi (which is Latin for "king of the world"). That statement was included in a 2.4-MB text file uploaded this week to file-sharing websites.

The text file data dump contains about 13,500 records, many of which include full names, email addresses, loan status, the loan amount requested by the applicant, and the amount of money earned by the affiliate company or provider who referred the applicant to AmeriCash Advance. Some records also include loan application notes that sport biographical details.

All of the records also include a field for the applicant's social security number. While all but the last four digits of the social security number are starred out, many companies--such as credit card providers--only use these four digits to help verify a phone caller's identity. Accordingly, this information could be useful to identity thieves.

Despite the warning from Rex Mundi that it would release the customer database, AmeriCash Advance said that it refused to work with extortionists. "We will not cave in to blackmail, and are cooperating fully with the authorities to protect our customers and bring these criminals to justice," according to a statement AmeriCash Advance provided to CNET.

[ Privacy Rights Clearinghouse has logged 266 breaches so far this year. Which are the worst? See 6 Biggest Breaches Of 2012. ]

Unusual for a hacker outfit, Rex Mundi sports a Bible verse--"Non nobis, Domine, non nobis, sed nomini tuo da gloriam" (translation: "Not to us, not to us, O Lord, But to your name give glory")--as its tagline, and claims to hail from Belgium. The group first surfaced on Twitter May 1.

In addition, while Rex Mundi labeled its ransom demand an "idiot tax," the group has worked to differentiate itself from hacktivist groups such as Anonymous that are only interested in leaking data in pursuit of a social agenda. "We <3 hacktivists like @AnonymousPress. However, we're in it for the money, which is also pretty awesome," according to a tweet from the group. "How we miss the good old days of LulzSec."

Why target AmeriCash Advance? Perhaps because the company offers payday loans--loans that must be repaid at the borrower's next payday--and cash advances. Under state laws, payday loans are legal in 37 states, which all cap maximum loan limits at either $500 or $1,500. In the case of AmeriCash Advance, its annual percentage rates reportedly range from 353% to 1,368%.

According to AmeriCash Advance, the first ransom demand surfaced not via email or Twitter, but its fax machine. "On June 12, AmeriCash Advance received a fax, telling us that part of our website had been hacked. The letter went on to demand initial payment of $15,000 from us," it said.

The company also explained how attackers had managed to grab its applicant database: "The section of the system that the criminals hacked into was the automatic e-mail responder section, the part of the system that sends an auto-reply to an applicant that their application has been received," the statement said. "We have notified those who have been affected and warned them to be vigilant. We are continuing to work closely with the authorities to identify the criminals."

But Rex Mundi disagreed with AmeriCash Advance's technical explanation of how the information had been obtained. "Tst, tst ... AmeriCash Advance, we didn't 'hack' into your system. The page was open to any1 & listed in your robots.txt," the group said via Twitter, which suggests that whoever designed the AmeriCash Advance website had purposefully left the file unsecured--to make it easier for affiliates to access--while leaving a request to Web crawlers to not index the page. "Oh, and it wasn't an email responder system, it was a page generating reports 4 yr affiliates. Get your facts straight," according to Rex Mundi.

AmeriCash Advance didn't immediately respond to a request for comment about whether it planned to offer identity theft protection services to the thousands of people affected by the breach. But as a recent report from the Consumer Federation of America noted, such services often do nothing to stop identity theft involving social security numbers.

Given the number of social security numbers that have been exposed in data breaches, some security experts are asking if it isn't time to rethink social security numbers. One approach--practiced in Spain--involves using national identity cards that contain a cryptographic chip. Anyone who wants to use the social security number as part of a transaction must first get the cardholder to digitally authenticate the transaction by using correctly entering the chip's PIN code to verify the identity.

The stakes have never been higher in the fight for control of corporate and consumer devices between malicious code and the anti-malware software designed to detect and stop it. The Malware War report covers the key methods malware writers use to thwart analysis and evade detection. (Free registration required.)

About the Author(s)

Mathew J. Schwartz

Contributor

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights