Real incidents · Verified sources

When cloud finance apps
failed their users

These are not hypothetical risks. These are documented events where popular finance apps exposed, sold, or permanently lost their users' financial data.

Why does this matter? When you use a cloud-based finance app, your most sensitive data — bank credentials, transaction history, receipts, salary information — lives on someone else's server. You are trusting that company's security, business ethics, and long-term survival. These cases show what happens when that trust breaks.
📴
Platform shutdown · Data loss
Mint shut down — 3.6 million users lost years of financial history
2024 · Intuit / Mint

Mint was one of the most popular free budgeting apps in the world. In November 2023, Intuit — the company that owns Mint — announced it was shutting down the service effective January 1, 2024. Users had a short window to export their data manually as a CSV file. Anyone who missed that window, or who had financial history older than three years, lost that data permanently. There was no migration tool that preserved budgets, categories, or historical insights. Users who had trusted Mint with a decade of financial records had no recourse.

💡
The lesson: A company's business decision can erase years of your financial records overnight — and you have no say in it.
Sources: CNBC · Bloomberg
🕵️
Unauthorized data collection · $58M settlement
Plaid collected your full banking history without telling you — and settled for $58 million
2021–2022 · Plaid (backend for Mint, YNAB, Personal Capital, and dozens more)

You may have never heard of Plaid, but if you used Mint, YNAB, Personal Capital, Venmo, Cash App, or Coinbase, Plaid was quietly sitting in the middle of your bank connection. Plaid used login screens that mimicked your real bank's interface to capture your full banking credentials. It then used those credentials to pull far more transaction history than you authorized — and shared that data with third parties. A federal class action lawsuit was filed, and a judge approved a $58 million settlement in 2022. Plaid agreed to change its practices and give users more control over their data.

💡
The lesson: Even if you trust the app you signed up for, there may be invisible intermediaries collecting your data in ways you never agreed to.
👁️
Human review of private data · No disclosure
Expensify's "AI" was actually strangers on the internet reading your receipts
2017 · Expensify

Expensify marketed its SmartScan feature as an AI-powered tool that automatically reads and categorizes your expense receipts. In 2017, it was revealed that the "AI" was actually human workers on Amazon Mechanical Turk — a crowdsourced marketplace — manually reading and transcribing customers' receipts. Those receipts contained names, home addresses, hotel bookings, medical receipts, boarding passes, and signatures. A bug then made some of those receipts publicly visible on the platform. The CEO confirmed that non-paying users' receipts were being processed by strangers without any disclosure in the product.

💡
The lesson: "AI-powered" features can mean real humans — strangers — reading your most private financial documents.
🔒
Pennyway is different: Pennyway uses the Google Gemini AI model — either via a Pennyway managed API key (routed through OpenRouter) or your own API key. No human ever sees your data. Your transactions are processed by the model and the response is returned directly to your device. Nothing is stored, reviewed, or accessible by anyone.
Sources: Quartz · Consumer Affairs
🏦
Account draining · Aggregator attack
Attackers used Mint's bank connections to drain accounts — one victim every 5 minutes
2019 · Mint / QuickBooks / NCR

NCR Corp. runs the online banking software used by hundreds of financial institutions. In late 2019, NCR blocked both Mint and QuickBooks from its platform after a wave of automated bank account takeovers. Attackers had discovered that the persistent connections these apps maintain with banks — connections created when you link your bank account — could be exploited to silently monitor balances and then drain accounts. The attacks ran in automated cycles, targeting a new victim every 5 to 10 minutes, for 12-hour stretches at a time.

💡
The lesson: Linking your bank account to a cloud app creates a persistent connection that attackers can exploit — even without ever breaching the app itself.
🔓
Credential stuffing · Tax returns exposed
TurboTax users' tax returns — including SSNs and salary data — repeatedly accessed by attackers
2021–2025 · Intuit / TurboTax

In multiple documented incidents between 2021 and 2025, attackers used a technique called credential stuffing — taking username and password combinations leaked from unrelated data breaches and trying them on TurboTax accounts. When a match was found, attackers gained access to complete tax returns containing Social Security numbers, full names, home addresses, salaries, and financial deductions. Intuit stated there was "no breach of Intuit systems," but multiple state Attorney General filings confirm that users' tax data was repeatedly accessed without authorization.

💡
The lesson: Your financial data stored in the cloud is only as safe as every other account you've ever created online. One reused password can expose everything.
🎰
Cross-account exposure · Technical failure
Credit Karma glitch showed users strangers' complete financial profiles — like a roulette wheel
2019 · Credit Karma

On August 14, 2019, Credit Karma users began reporting on Reddit and Twitter that when they logged in, they were seeing someone else's account — full credit card details, balances, credit scores, and financial history belonging to a complete stranger. Some users reported that logging out and back in again showed them yet another stranger's account, as if they were spinning a roulette wheel through other people's financial lives. Credit Karma called it a "technical malfunction" and declined to say how many users were affected. With approximately 100 million users at the time, even a fraction of a percent represents hundreds of thousands of people.

💡
The lesson: A single bug in a cloud system can instantly expose your financial profile to strangers — with no warning and no way for you to know it happened.

The pattern behind every case

📴

Your data can disappear overnight

A company shuts down, pivots, or gets acquired — and years of your financial history go with it. You had no copy, no backup, no warning.

🕵️

Data gets shared without your knowledge

Most free apps rely on data-driven business models. That model often involves your data — shared with advertisers, data brokers, or invisible intermediaries like Plaid. Pennyway is different: your data never leaves your machine, so it can never be shared or sold.

👁️

"AI" can mean real humans reading your receipts

Just because it says "automated" or "AI-powered" doesn't mean no human ever sees your financial documents. Pennyway uses the Google Gemini AI model with no human involvement whatsoever.

🔗

Cloud connections become attack surfaces

Every persistent link between your bank and a cloud service is a door that attackers can try to open — on their timeline, not yours.

Pennyway keeps everything on your machine

No cloud storage. No third-party data brokers. No persistent bank connections to exploit. Your data is encrypted on your device — and only you have the key.

← Back to Pennyway