PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

MCX Hacked In What Must Be the Worst Timing Ever

By Tim Sloane
October 29, 2014
in Analysts Coverage
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

CurrentC, the mobile payment application developed by MCX,has disclosed to pilot users that their email addresses may have been accessedby an unauthorized 3rd party.

From TechCrunch:

“Within the last 36 hours, MCX saysit learned that unauthorized third parties obtained the emailaddresses of some of its CurrentC pilot program participants and otherindividuals who had expressed interest in the app.

The group has now notified its merchantpartners about the incident and is communicating directly with thoseindividuals whose email addresses were involved, a company spokesperson tellsus.”

The articlealso includes the full email CurrentC sent to its users:

“Thank you for your interest in CurrentC. Youare receiving this message because you are either a participant in our pilotprogram or requested information about CurrentC. Within the last 36 hours, welearned that unauthorized third parties obtained the e-mail addresses of someof you. Based on investigations conducted by MCX security personnel, only thesee-mail addresses were involved and no other information.

In an abundance of caution, we wanted to makeyou aware of this incident and urge you not to open links or attachments fromunknown third parties. Also know that neither CurrentC nor Merchant CustomerExchange (MCX) will ever send you emails asking for your financial account,social security number or other personally identifiable information. So if youare ever asked for this information in an email, you can be confident it is notfrom us and you should not respond.

MCX is continuing to investigate thissituation and will provide updates as necessary. We take the security of yourinformation extremely seriously, apologize for any inconvenience and thank youfor your support of CurrentC.”

MCX is stating that just the email addresses were accessed.It would be extremely troubling if participants’ bank routing numbers were alsoreleased. The worst possible scenariowould be if hackers gained access to the customer’s checking account using bankrouting information, because at least credit card data is protected by thebanks with Zero Liability.

The hack will make it even harder for those merchants thatwere contractually forced to refuse Apple Pay by MCX to defend that decision ifthey are unable to prove their own system is more secure than Apple Pay, and ifthat new more secure solution isn’t available on iOS in short order.

The timing of the hack is almost unbelievable, as MCX andsome of its merchants have taken a stand against Apple Pay, disablingacceptance earlier this week. Naturally, we wonder who might be behind thehack. Since CurrentC is still in pilot, the app likely does not have data onmany consumers. The motive could be just to make a statement rather than toreap financial gain. Here are three possible explanations for the intrusion.

  • A loose cannon within Apple, or within one ofits partners, hacked MCX/CurrentC in retaliation for merchants deciding toblock Apple Pay acceptance – this is hopefully not the case.
  • An overly exuberant Apple fan boy, frustrated bysome merchants’ decision to not accept Apple Pay, hacked MCX out of spite.
  • Noticing that the CurrentC app requires users toprovide bank account, driver’s license, and social security info to enroll achecking account, thought the hack would be worthwhile despite only havingcredentials for a few pilot customers.


Overview by Tim Sloane, VP of Payments Innovation for Mercator Advisory Group

Read full story in TechCrunch

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    fraud agentic risks

    As Fraud and Agentic Risks Mount, Data Provides Continuity

    April 23, 2026

    Thirty Years and Counting: Bank of America Renews Alaska Air Deal

    April 22, 2026
    stablecoins

    What Would it Take for Stablecoins to Replace Wire Transfers in B2B Payments?

    April 21, 2026
    Payment Facilitator

    How Banks Are Competing with Fintech Apps for Small Businesses

    April 20, 2026
    ai financial

    Consumers Are Putting More Financial Decisions in AI’s Hands

    April 17, 2026
    cybersecurity frontier ai

    Cybersecurity Must Evolve as Frontier AI Fuels New Fraud Risks

    April 16, 2026
    isos thriving

    In Defiance of the Prognosticators, ISOs Are Thriving Again

    April 15, 2026
    agentic payments

    Beyond the Click: How Agentic Payments Are Redefining Global Financial Flow

    April 14, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2026 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result