DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The Extortionist, Drake International Leak Data Insight

Posted on January 24, 2013 by Lee J

On the 8th January well known extortion hacker Rex Mundi @RexMundi_Anon announced an attack on Drake International (drakeintl.com). In this attack Rex has demanded 50k to prevent the release of client information. Since then Drake has confirmed this attack, Toronto police have started an official investigation and Rex Mundi has announced yet another up coming leak today. Read more about this on databreaches.net. Its not the first time Rex has made threats to leak further data if not paid and to actually carry out the leak as we have seen them do it in the past with company’s like CrediPet As normal the original data was removed from all file upload but i have since obtained a copy (it will not be released publicly) of the leaked data which is said to come from drake. > Our Drake International leak (1000’s of email/password combos!): pastebin.com/H8tLbGBH — Rex Mundi (@RexMundi_Anon) January 12, 2013

The leak contains just over 20,000 rows of user credentials with ID, Date ,first names, last name, emails, passwords and contact phone numbers. I have run a process of this data over at ozdc.net and the emails from these accounts come from various country’s like australia, america, canada and more and total to 22,712. See full stats here Also rex has announced that another leak will be released shortly. > Details about the new Belgian Web server we hacked into will be posted in 2 hours time! Stay tuned! — Rex Mundi (@RexMundi_Anon) January 23, 2013

Copy’s of the press releases for Drake data leaks, all links in them are dead. Cache

Twitter: RexMundi_Anon Email: [email protected] Dear friends, foes and members of the media, Our name is Rex Mundi. We previously hacked into the Web servers of Belgian companies Dexia and AGO Interim and, respectively, American, Dutch and French companies AmeriCash Advance, Accord.nl and Credipret. Last week, we hacked into the server of Canadian multinational temp work company Drake International (drakeintl.com). We gained access to over 300,000 confidential job applicant records, in addition to data related to the company’s clients. The data stored inside the website’s database relates to candidates located in Australia, New Zealand, the UK and Canada. We immediately contacted Drake International to offer them not to release the data in exchange of a mere $50,000 (fifty thousand US Dollars). So far, we have unfortunately not heard back from the nice folks over at Drake. Does this mean that they do not care about their clients and job applicants’ privacy? You be the judge. They have until the end of this week to pay us. If they fail to comply, their entire database will be posted on Pastebin and on various other websites. Sample data: JOB APPLICANTS ————– Let’s take a look at poor Mike Easter from Australia first. His email address is [email protected] and his password is "just4me" (not anymore!). He listed two references while applying for temp work: Lourdes Bonnici, who is Customer Service Manager at Coles Supermarket (Phone: 93983755) and Sister Helen Reed who is Principal at Mount Saint Joseph Girls College (Phone #: 93981555). Let’s move on to Adene Heinz now, who lives in beautiful New Zealand. Her email address is [email protected] and her password on the Drake Intl website is "fransdekoc". Her phone number is 0792681433. Bet you didn’t imagine Drake Intl would fail to secure its server, Adene! Finally, here comes Daniel Lacroix from Canada. His email address is [email protected] and his password is "samantha" (Girlfriend? Wife? Who knows…) Poor Daniel applied for a job (job ID 42671). First, things seemed to go well. The first message recorded in the Drake Intl DB reads: "Interview Friday 10AM," but then things took a turn for the worst. After the interview, the Drake Intl consultant recorded the following message: "too technical – would be bored." It can be tough getting temp work at Drake Intl! CLIENTS ——- One of Drake International’s clients is eHealth Ontario from, obviously, Canada. This company’s contact address is 777 Bay Street – Suite 701 and it is located in Toronto. Its phone number is 416-586-4141 and its login password on the Drake Intl website is "eagles18". The listed contact address is [email protected]

cache

Dear clients and users of the Drake International website, You will, no doubt, be pleased to hear that your privacy is not even worth $50,000 to Drake. Let’s recap here for a second. Earlier this week, we contacted Drake International to warn them that a security flaw had been found on their Web server and that we would release sensitive data contained in their database if we did not receive $50,000. Our philosophy is simple: "You messed up, you need to own up to it and protect your customers." Apparently, Drake International disagreed since they did not reply to our emails. We then contacted Drake International again to warn them that some of the passwords contained in their database could also be used to access the email inboxes (GMail, Hotmail, etc…) of job applicants who had created an account on their website. We even provided an example by sending them the contents of the Hotmail inbox of a specific applicant. Still, no reply from Drake International. So, fellow hackers, feel free to use the contacts listed in the following leak and sell those addresses to spam lists, Or use the passwords to steal confidential information from those users’ email inboxes. Or steal their identities. Or access their online banking accounts. But, please, make sure to tell your victims that they were scammed simply because Drake International refused to own up to their own shortcomings. Maybe then will they understand that they should have complied. Leak address (.txt file): https://www.multiupload.nl/A3DS9YTD9D Rex Mundi


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches
Category: Breach Incidents

Post navigation

← Official Microsoft Europe Tango Down Claim by @AnonSquadNo035
53,303 User Credentials Leaked from ezycoupons →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.