Mr. Cooper – One Ransomware Binary, 14 Million Borrowers
How a single October night in 2023 froze mortgage payments, exposed every Social Security number the company held, and lit a $25 million bonfire under the U.S. housing market
"At 11:59 p.m. on 30 October 2023 it took them one successful log-in to turn America's largest non-bank mortgage servicer into a 14-million-row data buffet."
48 Hours That Shook the Housing Market
Date (2023) | Event |
---|---|
30 Oct (23:59) | An "unauthorised third party" uses stolen employee credentials to access Mr. Cooper's core loan-servicing network |
31 Oct (02:30) | Internal security tools flag abnormal file encryption; company pulls the plug on all customer-facing systems—payments, call-centre screen-pop, escrow portals |
31 Oct (morning) | 4.3 million active borrowers discover they cannot pay their mortgage; auto-draft fails, website shows generic "maintenance" page |
1 Nov | Forensic analysts confirm data exfiltration; ransom note appears |
15 Dec | SEC 8-K reveals scope: 14.7 million current & former customers touched; SSN, DOB, bank account numbers, loan balances copied |
Q4 earnings | Company books $25 million for response, credit-monitoring, litigation—equal to 9% of quarterly net income |
"Our forensic review has determined that personal information relating to substantially all of our current and former customers was obtained."
Numbers That Hurt
What We Know (and What They Won't Confirm)
Mr. Cooper has never publicly named the malware strain, but Cybersecurity Dive and Cyber Management Alliance both treat the event as ransomware based on:
- System-wide encryption followed by a ransom demand
- Data-theft double-extortion playbook—files published on a dark-web leak site after KME refused payment
- 1 Initial-access broker (IAB) penetrates network
- 2 Ransomware affiliate deploys payload and exfiltrates data
"The company declined to answer questions about the nature of the attack, including any potential extortion demands or payments."
When Your Mortgage Stops Working
Auto-draft payments bounced; some borrowers received late-fee letters before systems were back online
Call-centre queues hit four hours; agents used Excel spreadsheets to manually notate payment promises
Real-estate closings delayed because payoff letters could not be generated—rate-locks expired, costing buyers thousands
- One customer had $25,000 drained from a Charles Schwab account after criminals used the leaked data to pass phone-bank verification
- Another plaintiff saw 11 unauthorized credit-card applications filed in her name
Why the Housing Sector Is Ransomware Candy
"Hackers, organised-crime gangs and other bad actors are increasingly targeting financial-service companies to gain access to customer information."
Four NIST Controls That Would Have Broken the Kill-Chain
Control | NIST CSF ID | Mr. Cooper Gap & Fix |
---|---|---|
Phishing-resistant MFA | PR.AC-7 | Require FIDO2 keys for all VPN & privileged console logins—no SMS fallback |
Just-in-time privileged access | PR.AC-2 | Replace standing domain-admin rights with PAM vault that grants 4-hour elevate windows |
Immutable, off-line backups | PR.IP-4 | Store daily Veeam replicas in S3 Object-Lock; test full bare-metal restore monthly |
Segment payment engine | PR.AC-5 | Isolate payment-processing VLAN so a breach in customer portal cannot reach ACH files |
The 14.7 Million Dollar Question
Mr. Cooper's breach lasted two days, but the initial foothold took seconds—the moment an employee typed a password into a phishing page.
If America's largest non-bank mortgage servicer can lose every customer record they ever held, how secure is your borrower data right now?
"How many mortgage payments away from disaster are you?"
References
Secure Your Organization Before It's Too Late
Don't let your organization become the next cautionary tale. Get a comprehensive security assessment and protect what matters most.