Rex Mundi reveals a large number of consumer details after payday lender AmeriCash will not fork over ransom
Hacker team Rex Mundi has made good on its vow to create tens of thousands of loan-applicant documents it swiped from AmeriCash Advance following the payday lender refused to fork over between $15,000 and $20,000 as an extortion charge — or, in Rex Mundi’s terms, an «idiot taxation.»
The team announced on June 15 it was in a position to take AmeriCash’s client information considering that the business had kept a private web page unsecured on certainly one of its servers. «these pages enables its affiliates to observe how numerous loan candidates they recruited and exactly how much cash they made,» based on the team’s post on dpaste.com. «not just had been these pages unsecured, it had been really referenced inside their robots.txt file (bad, bad move, dudes).»
Rex Mundi not merely used the post to chastise AmeriCash for purported data that are lackluster, in addition took a swipe during the business’s business structure, criticizing it for focusing on low-income employees with «vastly overpriced» loans. AmeriCash’s APRs (annual portion prices) cover anything from 353 per cent on as much as 1,368 per cent.
Rex Mundi is not the hacker that is first to claim the ethical high ground when selecting objectives. Friends called UGNazi leaked and removed client information stolen from on line payment service provider WHMCS final thirty days, accusing the organization of supplying solutions to known scammers. Additionally month that is last a team called The Unknowns revealed it had been exposing safety holes into the IT systems of prominent businesses such as for instance NASA and branches for the U.S. army to force them to enhance their defenses.
Nevertheless, unlike the groups that are aforementioned, state, Anonymous, Rex Mundi has acknowledged that cash is a motivator. «We
The declaration continued to express that AmeriCash notified people who was indeed warned and affected them become vigilant, due to the fact stolen information might be utilized in phishing assaults. […]