RCI Hospitality Data Breach Exposes Sensitive Information of Contractors

RCI Hospitality Discloses Data Breach Resulting from IDOR Vulnerability

MEDIUM
April 16, 2026
3m read
Data BreachVulnerability

Related Entities

Organizations

U.S. Securities and Exchange Commission (SEC)

Products & Tech

Microsoft Internet Information Services (IIS)

Other

RCI Hospitality Holdings, Inc.RCI Internet Services, Inc.

Full Report

Executive Summary

RCI Hospitality Holdings, Inc., a leading operator in the adult nightclub and sports bar industry, has disclosed a data breach that exposed the sensitive personal data of its independent contractors. According to a filing with the U.S. Securities and Exchange Commission (SEC), the incident was caused by an Insecure Direct Object Reference (IDOR) vulnerability on a Microsoft Internet Information Services (IIS) web server. An unauthorized actor exploited this common web application flaw in March 2026 to access data including Social Security numbers. The company asserts that customer data and business operations were not affected.


Vulnerability Details

The root cause of the breach was an Insecure Direct Object Reference (IDOR) vulnerability. IDOR is a type of access control flaw where an application uses user-supplied input to access objects directly. In this case, an attacker was likely able to manipulate a parameter in a URL or API request (e.g., changing ?contractor_id=123 to ?contractor_id=124) to cycle through and access the records of other contractors without proper authorization checks.

  • Vulnerability Type: Insecure Direct Object Reference (IDOR)
  • Affected System: A Microsoft Internet Information Services (IIS) web server run by subsidiary RCI Internet Services, Inc.
  • Incident Timeline:
    • March 19, 2026: Breach begins.
    • March 23, 2026: Breach discovered.
    • April 7, 2026: Investigation concludes.

Impact Assessment

The breach resulted in the unauthorized access to a range of sensitive Personally Identifiable Information (PII) belonging to independent contractors. The exposed data includes:

  • Names
  • Dates of Birth
  • Social Security Numbers (SSNs)
  • Driver's License Numbers
  • Contact Information

This places the affected individuals at a high risk of identity theft, financial fraud, and other malicious activities. While RCI Hospitality stated that customer data was not impacted and that the data has not been publicly disseminated, the potential for misuse of the stolen contractor data remains significant.

Detection & Response

Detecting IDOR exploitation requires careful monitoring of application behavior:

  1. Code Analysis: The best detection is proactive, through static (SAST) and dynamic (DAST) application security testing during the development lifecycle to identify and fix IDOR flaws before deployment.
  2. Log Analysis (D3-RAPA: Resource Access Pattern Analysis): Monitor web server logs for suspicious access patterns. For example, a single IP address rapidly requesting a series of resources by incrementing an ID in the URL is a strong indicator of an IDOR scanning attempt.
  3. Authorization Monitoring: Implement monitoring that checks if a user's session is authorized to access the specific data object they are requesting and alert on any failures.

Mitigation

  1. Secure Coding Practices (M1013 - Application Developer Guidance): The primary mitigation for IDOR is to never rely on user-supplied input for direct object access. Instead of id=123, use indirect reference maps or verify on the server-side that the logged-in user (session.user_id) is authorized to access the requested object (requested_object.owner_id).
  2. Centralized Access Control: Implement and enforce a centralized access control mechanism that is checked on every single request to a data object, rather than relying on the presentation of a URL.
  3. Web Application Firewall (WAF): While not a complete solution, a WAF can be configured with rules to detect and block simple, sequential IDOR scanning attempts, providing a layer of defense.
  4. Penetration Testing: Regularly conduct external penetration tests on web applications to identify and remediate vulnerabilities like IDOR before they can be exploited by attackers.

Timeline of Events

1
March 19, 2026
The unauthorized actor first gains access to the server.
2
March 23, 2026
RCI Hospitality discovers the breach.
3
April 7, 2026
The company's internal investigation into the incident concludes.
4
April 16, 2026
This article was published

MITRE ATT&CK Mitigations

Implementing proper access control checks within the application logic is the primary defense against IDOR vulnerabilities.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Auditing web server logs for anomalous, sequential access patterns can help detect attempts to exploit IDOR flaws.

Mapped D3FEND Techniques:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachIDORVulnerabilityPIISSNRCI Hospitality

📢 Share This Article

Help others stay informed about cybersecurity threats