Brazilian police arrest IT worker over $100 million cyber theft

Police in Brazil have arrested an employee of a prominent software company after more than $100 million was stolen through an instant payment system called PIX.

Local news outlets and the Associated Press reported on Friday that João Roque, an employee of C&M Software, was nabbed by police and told them he sold his login credentials to hackers who had approached him earlier this year. 

Roque worked on the company’s information technology team and helped the hackers breach PIX — which links Brazil’s Central Bank to the country’s financial institutions. 

The outlet TV Globo reported that the 48-year-old Roque sold his account and password to the hackers for about $2,700 in two separate cash payments. He allegedly told investigators that he was approached at a bar by the hackers who asked for his account details. 

They later walked him through what he needed to do, which included creating separate accounts in the system and enabling remote access.  

Police told the Associated Press the hackers stole more than 540 million Brazilian reais (more than $98.3 million) from at least one financial institution but likely took more from other banks and lenders. TV Globo said at least six financial institutions were impacted. 

The Central Bank has shut off access to parts of C&M Software’s system and police are now searching for the hackers behind the incident, identifying at least four culprits. Another 270 million reais (about $49 million) connected to the incident has been frozen by authorities. 

C&M Software told local news outlets that they are cooperating with police. It is one of eight companies approved by the Central Bank to connect their system to financial institutions.

“The company is a direct victim of criminal action, which included the misuse of credentials to attempt to fraudulently access its systems and services,” the company told TV Globo in a statement last week.

On Telegram, prominent cryptocurrency investigator Zachary Wolk — who goes by the online alias ZachXBT — said he was tracking some of the stolen funds and saw about $30 million to $40 million converted into Bitcoin, Ethereum and USDT.

NewsNews BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Beware of Bert: New ransomware group targets healthcare, tech firms

Next Post

CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation

Related Posts

Step Into the Password Graveyard… If You Dare (and Join the Live Session)

Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don’t need advanced tools; they just need one careless login. For IT teams, that means endless resets, compliance struggles, and sleepless nights worrying about the next credential leak. This Halloween, The Hacker News and Specops Software invite you to a live webinar: “
Read More

Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger

Cybersecurity researchers have disclosed details of a new malware loader called QuirkyLoader that's being used to deliver via email spam campaigns an array of next-stage payloads ranging from information stealers to remote access trojans since November 2024. Some of the notable malware families distributed using QuirkyLoader include Agent Tesla, AsyncRAT, Formbook, Masslogger, Remcos RAT,
Read More

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Cybersecurity researchers are calling attention to a malware campaign that's targeting security flaws in TBK digital video recorders (DVRs) and Four-Faith routers to rope the devices into a new botnet called RondoDox. The vulnerabilities in question include CVE-2024-3721, a medium-severity command injection vulnerability affecting TBK DVR-4104 and DVR-4216 DVRs, and CVE-2024-12856, an operating
Read More