Mitigating Reward Hacking via Information-Theoretic Reward Modeling