top of page

$100 Million Heist Exposes Brazil’s Weak Spot in Insider Risk

In a stunning display of how a single insider can become the key to a multimillion-dollar cyber heist, Brazilian authorities have arrested an IT employee who allegedly sold his login credentials for just $2,700—an act that helped hackers siphon off over $100 million from Brazil’s PIX instant payment system.


The suspect, João Roque, 48, worked for C&M Software, one of eight firms authorized to connect directly to Brazil’s Central Bank and financial institutions. According to police and local media reports, Roque met the attackers in a bar earlier this year. They coached him through the steps: create new accounts, enable remote access, and hand over his credentials. The payoff? Two cash payments totaling less than the price of a new iPhone.


But the consequences were far more severe. Police believe the hackers stole over 540 million Brazilian reais (roughly $98.3 million) from at least one institution, and TV Globo reports that at least five others were impacted. Authorities have frozen nearly half of that amount, but the damage is already done—C&M Software’s systems are partly suspended, and the Central Bank is on high alert.


While the story is alarming, it’s far from unique. Insider threats are no longer anomalies—they’re a structural risk, especially in financially pressured, AI-powered, and digitally integrated environments.


“These threats don’t begin with a breach—they begin with a shift in behavior,” said Margaret Cunningham, Director of Security & AI Strategy and Field CISO at Darktrace. “Traditional security controls often miss these early signals because they focus on external threats and static access permissions. They operate on the assumption that access equates to trust—an assumption that no longer holds.”


In Roque’s case, it wasn’t elite hacking or advanced zero-days that cracked Brazil’s financial infrastructure. It was social engineering, a bar conversation, and the failure to detect behavioral changes in someone with privileged access.


The attackers didn’t just capitalize on Roque’s access—they exploited the economic and psychological pressures many employees face in today’s volatile landscape. “Employees may surrender access for money, ideology, coercion, or ego,” said Cunningham. “Regardless of motivation, the result is the same: someone with authorized access takes actions that cause harm to an organization.”


Adding to the complexity, cybercriminals are now using AI to supercharge their reconnaissance, scanning LinkedIn, job boards, and company websites to tailor social engineering campaigns. In short: the modern insider threat is being weaponized with intelligence, automation, and ruthless precision.


C&M Software has claimed it’s a “direct victim” of criminal misuse of credentials and is cooperating with authorities. But the broader warning echoes far beyond Brazil. Security teams worldwide must abandon the illusion that user credentials are static fortresses.


“If an organization’s security strategy is built on the belief that credentials will remain secure, that strategy is already flawed,” said Cunningham. She advocates for mature insider risk programs that focus on behavioral visibility—detecting changes in user activity before they lead to catastrophe.


On Telegram, crypto sleuth ZachXBT noted that up to $40 million of the stolen funds have already been converted into crypto and moved through Bitcoin, Ethereum, and USDT—illustrating how quickly attackers can erase the trail once the breach is done.


The case of João Roque is not just a story of a man who sold his password. It’s a cautionary tale about the fragility of digital trust and a wake-up call for companies whose defenses still end at the perimeter.

bottom of page