Skip to content

How to prevent cyber-attacks in healthcare: from Zero Trust to password management

Summary: Healthcare companies can effectively defend against cyber threats with solutions like encryption, VPNs, and multi-factor authentication.

In this day and age, when a cyber-attack happens roughly every 40 seconds, no industry is safe from threats. Every organization, regardless of what it does, faces some level of risk.

That said, some industries are targeted far more than others. Healthcare, unfortunately, is near the top of that list. First, let us explain why that’s the case. Later, we’ll discuss what healthcare facilities and institutions can do to better protect themselves against hacking attempts.

Why the healthcare industry is particularly vulnerable to cyber-attacks

The key reason why healthcare is often targeted by cybercriminals is that it deals with highly valuable data. To provide their services, healthcare companies must store and manage large volumes of electronic health records, sensitive patient information, and other confidential files. We’re talking ID documents, Social Security numbers, medical histories, insurance papers, and more. All of those, as you can guess, are highly sought after on the dark web.

And that’s only part of the problem. We also need to consider that many healthcare organizations still rely on outdated computer systems and legacy infrastructure. Yesterday’s technologies simply can’t keep up with today’s cybersecurity threats—and attackers know this all too well.

Add to that the growing number of connected devices used in hospitals and clinics—many of which lack proper security—and you get a large attack surface. In this scenario, every device creates a potential risk that cybercriminals can exploit to break into the system.

An infographic presenting the reasons why healthcare is often targeted by cybercriminals

The consequences of cyber-attacks for healthcare organizations

Let’s start with this: if sensitive data—personally identifying information, electronic health records, insurance details, and so on—gets leaked, the consequences can be far-reaching. For instance, attackers can use it to file fake insurance claims. They might also get prescription drugs illegally. In some cases, they could even blackmail patients or medical institutions to keep medical records private.

Of course, the impact of the breach on an organization can be profound. It can lead to severe financial losses and big damage to its reputation. Regular and potential customers may lose trust and run off to competitors.

And if you think incidents like this are probably rare, we hate to tell you otherwise. Cyber-attacks on healthcare companies have been on the rise over the last few years.

In 2024, the Department of Health and Human Services (HHS) reported that the average number of healthcare breaches was two per day. That’s millions of medical records compromised each year. This explains why healthcare organizations cannot afford to rely on half-measures when it comes to cybersecurity.

How to defend against cyber-attacks in healthcare

Just because the healthcare industry is a frequent target for cybercriminals doesn’t mean organizations in this sector should feel helpless. There are plenty of effective strategies and solutions available. If you’re part of this sector, here’s how you can improve your defenses:

Control who has access to electronic medical records

One way to boost healthcare cybersecurity is by adopting the Zero Trust model. Maybe you’ve heard the phrase “Never trust, always verify”—that’s what it’s all about. It means you double-check everyone’s identity every time they need to access sensitive resources, even if you’re 100% sure they work at your company. It may sound strict, but it’s one of the best methods to stop unauthorized access.

Also, just because someone is part of the team doesn’t mean they should have unlimited access to all sensitive information. You want to make sure people only access the apps and data they actually need, based on their role and responsibilities. That’s why it’s important to set up proper access permissions for each user in your organization.

Tools like Zero Trust Network Access (ZTNA) solutions can help you put this framework into practice. They let you set up proper identity checks and control access effectively, so employees only reach what they need for their work—and nothing more.

And one more thing. While focusing on digital access, remember to also control physical access to areas where servers and patient records are stored. Limiting this access helps prevent damage to equipment and data theft.

Divide your network into smaller parts

Speaking of controlling access to resources, you can take that concept further by breaking up your company’s network into smaller elements called “segments.” This process is called network segmentation. Basically, by using firewalls, gateways, and internet protocols, you create separate areas of the network for specific user groups to operate in—without giving them access to the other parts.

How does this help? For one, if a security incident occurs, it will be contained within that one particular segment. This means it won’t spread across the entire network. This not only helps you identify and resolve the issue faster but also protects the rest of your IT environment.

Use encryption to protect all patient records

When you encrypt sensitive information like medical research and patient records, you ensure that even if someone gets hold of this data, it will appear as a scrambled mess when they try to open it. All the information stays unreadable until the correct decryption key is provided.

Encryption is especially useful when you’re sharing sensitive information online, particularly between remote sites or workers. To keep data secure in transit, end-to-end encryption is often used. This means the data is encrypted right on the sender’s device and stays encrypted until it reaches the intended recipient, where it’s decrypted.

Because the data remains encrypted throughout its entire journey, even if someone intercepts it while it passes from point A to point B, they won’t be able to read or misuse it. Just remember that this protection requires using strong algorithms like AES-256 or XChaCha20 for encrypting your data—some weaker ones can still be cracked with modern hacking tools.

Get everyone to use only strong passwords

No matter how much you invest in healthcare cybersecurity, all that effort can go to waste if employees are using weak passwords. Verizon reports that web attacks happen mostly due to stolen credentials (77%) and easily guessable passwords (21%). That’s why it’s so important to make sure everyone on every team uses strong, hard-to-guess credentials.

To make this happen, you can use an advanced business password manager that allows you to enforce a strong password policy. Plus, it can help employees easily create, manage, and securely store strong passwords for all their work accounts. This way, they won’t have to struggle with coming up with long, random strings of characters or keep passwords written down in notebooks.

Add more protection layers to your online accounts

Considering how advanced threat actors’ methods have become for cracking passwords, one thing’s for sure—passwords alone might not be enough to keep work accounts safe. That’s why it’s important to add extra layers of security, like multi-factor authentication (MFA).

By implementing MFA, you require users to prove their identity with something beyond a password. This can be a code sent to their phone or a biometric scan. Access is granted only after that second step is verified. That way, even if someone does get hold of an employee’s password, they still won’t be able to break into their account.

Educate your employees

You can’t expect your team to follow security rules if you don’t explain why those rules exist in the first place.

That’s why investing in cybersecurity training is essential. In these sessions, the team should learn the basics of cyber threats and how to respond to attacks. For example, they should find out what a ransomware attack is, what types of information they can handle online, and what to do if they accidentally click on a phishing link.

By clearly explaining the threats, how they work, and how to avoid them, you greatly increase the chances that employees won’t make the human errors that can lead to security breaches. Also, if you need a knowledge base to refer to, you can check out our Cybersecurity Learning Centre. It covers everything from basic security frameworks to HIPAA compliance.

Update and monitor all software and devices regularly

Most of the software and hardware used in hospitals and clinics receive regular patches and updates, which are specifically designed to strengthen system and device security. With cyber-attacks becoming more and more sophisticated, staying on top of these updates is one of the simplest, most effective ways to protect mobile devices and improve IoT security.

Outdated software can create major vulnerabilities and weaken your device posture security. That’s why it’s so important not to skip updates, not even one. It might not seem urgent at the time, but missing that update could leave your systems exposed when you least expect it.

It’s also crucial that you continuously monitor all devices and platforms within your IT infrastructure. Why? To stay aware of everything connected to your company’s network, ensure each one complies with your security policies, and quickly identify any unusual behavior before it leads to potential vulnerabilities.

With NordLayer, you’re covered on key cybersecurity fronts

NordLayer is a toggle-ready network security platform that checks all the right boxes—especially for healthcare organizations looking to strengthen their defenses. In fact, it delivers on many of the key cybersecurity practices we’ve covered in this article.

For starters, it offers a cutting-edge Business VPN to ensure your team can safely access your network from anywhere. But that’s just the beginning. NordLayer also allows you to segment your network and control who can access what, while monitoring user activity. What’s more, it enables you to apply Zero Trust principles, so every user’s identity is checked before each login. It also helps maintain strong device posture security by allowing you to keep tabs on all devices in your network. Throw in multi-factor authentication, DNS filtering, malware prevention, and strong encryption, and you’ve got a tool built for serious protection.

Bottom line? NordLayer is designed to be an all-in-one solution for many of the cybersecurity challenges healthcare companies face. If you’re in the healthcare industry and want to learn more about our product, just contact our team. We’ll be happy to show you what NordLayer can do to protect your organization.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET PROTECT Shines as a Leader! Proudly securing a second position in G2’s Summer 2025 Grid® Report for Extended Detection and Response (XDR) Platforms

The ESET PROTECT cybersecurity platform has been crowned a Leader in the prestigious G2 Summer 2025 Grid® Report for Extended Detection and Response (XDR) Platforms. This accolade stands as a testament to ESET PROTECT’s outstanding customer satisfaction, earning the highest score in this category, and its strong market presence.

ESET PROTECT outperformed XDR-first vendors like CrowdStrike and SentinelOne. An impressive 97% of users have rated it 4 or 5 stars, with 89% believing it’s on the right track. Furthermore, a remarkable 91% of users are likely to recommend ESET PROTECT to others.

In the Summer 2025 Grid® Report for XDR Platforms ESET PROTECT is rated #1 for Data Security, the highest-rated feature with a 99% rate, Data loss Prevention, Workflow Automation, and Governance. It has been awarded various unique badges in the XDR Platforms category, including “Most Implementable”, “Best Results” for mid-market, “Best Estimated ROI” and “Fastest Implementation” for enterprise, and more.

Users have praised ESET PROTECT for its outstanding ability to meet business requirements and its ease of platform setup and use. Dive into the full report to discover why ESET PROTECT is the go-to choice for businesses worldwide.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cyberattack on Brazil’s Payment System: Technical Analysis, Timeline, Risks, and Mitigation

Executive Summary

This article presents a detailed analysis of one of the most severe cybersecurity incidents ever to impact Brazil’s Payment System (Sistema de Pagamentos Brasileiro – SPB), which occurred in June and July of 2025. The breach was directly linked to C&M Software, a major Information Technology Services Provider (PSTI) for the national banking sector. This incident exposed, for the first time at this scale, the critical role PSTIs play within the financial ecosystem, and how internal vulnerabilities can reverberate systemically, compromising the integrity of financial operations across hundreds of banks and institutions.

The Brazilian Financial System (Sistema Financeiro Nacional – SFN) serves as the infrastructure enabling the circulation of money, credit, and payments throughout the country. It involves the Central Bank, banks, fintechs, credit cooperatives, payment institutions, and specialized technology providers, such as PSTIs. Through the SPB and the Instant Payments System (SPI), the SFN ensures fast, secure, and traceable settlement of fund transfers between institutions, thereby upholding trust and maintaining market functionality.

This cyberattack was facilitated through the compromise of C&M Software’s internal IT environment. A malicious insider—an employee of the PSTI—was recruited by a cybercriminal group and, in exchange for financial compensation, granted privileged access to internal systems, passwords, and sensitive institutional certificates. That access allowed attackers to manipulate the credentials and private keys of several C&M clients, primarily banks and fintechs, including BMP Money Plus. From there, attackers generated fraudulent transactions, signed in proper compliance with SPI’s cryptographic and procedural standards, allowing them to be instantly settled by the Central Bank. As these operations were technically valid, they were automatically debited from the reserve accounts of the victim institutions.

Because C&M Software acted as a core technical hub for hundreds of institutions, the breach had a wide-reaching and magnified impact. Not only did BMP Money Plus suffer substantial financial losses, but at least five other institutions were also compromised. The siphoned funds were immediately funneled through accounts held by mules, then quickly transferred to cryptoasset exchanges for conversion into Bitcoin and USDT, effectively complicating their traceability and recovery.

Due to its central role, C&M was at the center of the response efforts: alerted by affected institutions, C&M notified the Central Bank, implemented emergency containment measures, and had its operations within the SPB suspended until robust new controls could be enforced. The incident underscores how shortcomings in governance, privilege management, and certificate protection can result in systemic consequences. This analysis underscores the necessity of key security measures, including behavioral monitoring, automated credential management, just-in-time access control, and strict separation of client secrets to prevent similar events within such a highly interconnected financial environment like the SFN.

1. Introduction

In a financial system built on trust and speed, a single insider can bring the entire network to a halt.

Over the last two decades, Brazil has emerged as a global reference in financial innovation and infrastructure modernization. Its Financial System (SFN) stands out for its level of digital maturity, robust regulatory framework, and ability to integrate multiple market actors, fostering inclusion, efficiency, and large-scale security. One of the latest milestones in this evolution is the Instant Payment System (SPI), which, in tandem with PIX, has positioned Brazil ahead of many global markets in terms of speed and ubiquity of electronic fund transfers.

PIX/SPI has become the financial backbone for transactions involving individuals, businesses, fintechs, and banks, processing billions of transfers with near-immediate settlement across accounts belonging to different institutions. This orchestration is made possible not just by the Central Bank but by a network of specialized providers—the Information Technology Services Providers (PSTIs)—who perform critical functions in clearing, settlement, and interconnection for traditional banks, credit unions, payment institutions, and digital platforms. The advent of open finance has further intensified reliance on these technical intermediaries, expanding both the number and diversity of participants and interfaces within Brazil’s digital financial ecosystem.

However, this growth also brings new and complex challenges. As digitalization progresses and integrations multiply, so too do points of exposure to cyber threats, fraud, governance failures, and supply chain vulnerabilities. With operations distributed across many players—often with unequal security maturity—an isolated breach has the potential to jeopardize the confidentiality, integrity, and systemic availability of services that individuals and businesses rely on daily. Additionally, given the growing use of APIs, outsourced operations, and the sharing of institutional secrets, new attack surfaces are created for insiders, cybercriminals, and advanced persistent threat (APT) actors.

The case examined in this article offers a stark exemplification of the risks and critical weak points in Brazil’s so-called “chain of trust.” By analyzing a real-life breach involving a central PSTI supporting banks and fintechs, we highlight the root causes, technical and institutional impacts, and practical recommendations to strengthen system resilience, privileged access management, and behavioral security controls within a complex and highly interconnected financial environment.

2. Understanding Brazil’s Financial System

The SFN operates via multiple interconnected components to ensure fast and secure interbank settlements. The Central Bank of Brazil (BACEN) serves as both the top regulator and operator of the Brazilian Payment System (SPB), which includes banks, payment institutions, technology providers (PSTIs), and cryptocurrency exchanges.

Reserve Accounts

A cornerstone of the SPB is the reserve account, maintained by each financial institution with the Central Bank. These accounts power SPI (Instant Payment System), enabling irreversible, real-time transaction settlements via PIX.

Banking-as-a-Service (BaaS)

BaaS platforms like BMP Money Plus enable fintechs, funds, and digital platforms to leverage full banking infrastructure, maintain reserve accounts, and facilitate payments through the SPB.

Role of Exchanges

Cryptocurrency exchanges such as SmartPay and Truther bridge traditional finance and the crypto world, playing an essential role in transaction traceability and regulatory compliance at scale.

Caption:The client initiates a purchase via SmartPay/Truther. BMP, using its BaaS model, processes the PIX transaction and routes it to the SPI/SPB via C&M Software (PSTI). The payment moves from BMP’s reserve account at BACEN to the recipient’s institution, with instant settlement. The process concludes with confirmation back to the client.

3. Incident Description

At 4:00 a.m. on June 30, 2025, a senior executive at BMP Money Plus—a fintech specializing in banking-as-a-service (BaaS) solutions—received an unexpected call from CorpX Bank, alerting him to an unauthorized transfer of R$18 million from BMP’s reserve account. As the person responsible for managing those reserves with the Central Bank, the executive quickly identified that other similarly unauthorized PIX transactions were actively underway at that moment. BMP’s internal team immediately launched containment efforts and, by around 5:00 a.m., officially reported the incident to C&M Software, their critical payment processing service provider.

Initial investigations and information published in the media indicated that the attack originated from an internal compromise at C&M Software—one of the leading PSTIs in Brazil’s Payment System (SPB). An internal facilitator, allegedly motivated by financial gain, provided privileged credentials to cybercriminals and assisted in executing malicious commands within company systems. Possessing privileged access and the digital certificates of C&M’s financial institution clients—including BMP itself and at least five other institutions—the attackers were able to inject fraudulent PIX orders directly into the SPI/SPB infrastructure. Because the transactions were digitally signed using valid institutional certificates, the Central Bank’s core systems processed them as legitimate, immediately debiting funds from the reserve accounts of the victim institutions.

It is estimated that approximately R$400 million was siphoned from BMP’s reserve account alone, with R$160 million later successfully recovered. Following the breach, stolen funds were swiftly transferred to accounts held by third parties at smaller banks and payment institutions, particularly cryptoasset platforms integrated with PIX, including exchanges, gateways, and swap platforms. Most of the stolen funds were quickly converted into USDT or Bitcoin, further complicating traceability. However, in at least one case, an exchange that detected a high volume of suspicious activity froze the settlement and immediately notified BMP, thereby preventing the dispersion of a portion of the stolen funds.

Given the magnitude of the attack and in order to prevent further losses, the Central Bank ordered an emergency suspension of C&M Software’s systems from the SPB—affecting PIX operations across more than 300 financial institutions that relied on its services. Despite the substantial financial damage, BMP Money Plus publicly emphasized that no end-customer funds were affected and that institutional guarantees fully covered the stolen amounts. Meanwhile, the Federal Police, activated by the Central Bank, opened a formal investigation to examine potential crimes such as criminal conspiracy, fraud-related theft, unauthorized system intrusion, and money laundering. The case remains under active investigation.

4. Incident Timeline

Below is the timeline of key events related to the incident—from initial compromise to response—based on information available at the time.

  • June 30, 2025 – 12:18 AM: Exchanges such as SmartPay and Truther detect unusually high transaction volumes in Bitcoin/USDT and alert executives at financial institutions.
  • June 30, 2025 – 4:00 AM: A BMP Money Plus executive is informed of an unusual PIX transfer totaling R$18 million; multiple unauthorized transactions are identified.
  • June 30, 2025 – 5:00 AM: BMP executives report the incident to C&M Software.
  • June 30, 2025: The Central Bank orders the emergency disconnection of C&M Software from the SPB.
  • July 1, 2025: News portal Brazil Journal publishes an in-depth report on the cyberattack.
  • July 2, 2025: BMP Money Plus issues an official statement acknowledging the breach.
  • July 3, 2025: The Central Bank announces the partial restoration of C&M Software’s operations and confirms the arrest of an employee involved in the incident.
  • July 4, 2025: Authorities confirm the detention of a staff member suspected of aiding the cybercriminal operation.

5. Technical Analysis of the Incident

The incident that unfolded between June 29 and July 4, 2025, may represent one of the largest systemic frauds ever recorded within Brazil’s Payment System (SPB), involving a wide range of actors—from external cybercriminals and internal insiders to financial institutions, technology service providers, and regulatory authorities. Below is a technical, chronological breakdown of the attack’s modus operandi, the mechanisms exploited, the money flow, and institutional responses.

1. Initial Compromise: Insider Threat and Privilege Escalation

The first step in the incident was an internal compromise at C&M Software, an authorized and mission-critical Information Technology Services Provider (PSTI) within Brazil’s financial ecosystem. According to official investigations and media reports, an employee at C&M—referred to here as the “Facilitator”—was recruited by a cybercriminal group. Motivated by financial incentives, the insider shared administrative credentials and, following external instructions, executed strategic commands that enabled the attackers to operate undetected within the company’s internal environment.

This privileged access was essential. It allowed the attackers to discover and retrieve cryptographic keys and digital certificates belonging to C&M’s client institutions, enabling the group to digitally impersonate those financial institutions. In many financial environments, inadequate segregation of secrets management (keys, certificates, and credentials) between clients and tech providers makes these attacks exponentially more dangerous.

2. Injection of Fraudulent Orders and Automated Settlement

Once in possession of the original digital credentials and certificates belonging to compromised institutions—particularly BMP Money Plus and at least five others—the attackers began fabricating and injecting PIX payment orders directly into SPI (Instant Payment System) and SPB. Since the digital signatures were valid and the requests followed standard cryptographic formats, the Central Bank’s settlement infrastructure processed and executed them as legitimate. The SPI system, by design, presumes the authenticity of requests from verified participants.

During the night of June 29 to June 30, these operations were carried out in bulk, automated fashion, outside of business hours—when manual oversight tends to be minimal. The reserve accounts of the victim institutions—held with the Central Bank for interbank operations—were systematically debited without triggering any SPI anomalies.

3. Rapid Dispersion and Chain Effect

The next step involved the immediate dispersion of stolen funds. Large amounts—often sent in batches—were moved to “mule accounts” and smaller payment institutions (PIs), many of which featured less stringent KYC, onboarding, and compliance protocols. Funds were then transferred to cryptoasset service providers such as exchanges, OTC platforms, and swap apps. There, they were converted into Bitcoin and USDT and moved to wallets held by the attackers—often split into many small transactions to evade tracing.

This sequence underscores the attackers’ operational sophistication:

  • Exploiting supply chain links between the PSTI (C&M) and multiple banks/fintechs;
  • Leveraging scripts and automation to submit dozens of transactions in succession;
  • Executing the fraud during off-peak operational hours.

4. Timeline of Actions, Detection, and Response

🕛 June 30, 2025 – 12:18 AM: Initial Detection by Exchanges
SmartPay and Truther exchanges were the first to detect suspicious activity. Their monitoring systems flagged abnormal transaction volumes and unusual purchases of Bitcoin/USDT made via PIX, triggering alerts to internal compliance teams and associated financial institutions.

🕓 June 30, 2025 – 4:00 AM: BMP Executives Flag the Incident
Prompted by exchange alerts and transaction analysis, a BMP Money Plus executive was contacted by a CorpX Bank representative regarding an extraordinary PIX transfer of R$18 million originating from BMP. This kicked off an internal audit that revealed several unauthorized SPI transactions debiting BMP’s reserve account.

🕔 June 30, 2025 – 5:00 AM: Incident Escalation
BMP formally notified C&M Software, reporting the breach and requesting urgent assistance from the provider responsible for part of the institution’s interbank infrastructure. By this point, the breadth of the attack suggested a systemic compromise affecting multiple C&M clients.

⚠️ June 30, 2025: Regulatory Response — Central Bank Intervention
With converging reports from exchanges, BMP, and other affected financial institutions, the Central Bank was officially notified of a potential systemic breach. As an emergency measure, it ordered the precautionary suspension of C&M Software’s connections to SPB—halting PIX operations across all institutions that interfaced through its platform. This action aimed to prevent further fraud and maintain system liquidity, despite triggering operational interruptions for hundreds of banks, fintechs, and payment entities.

📰 From July 1, 2025 Onward: Public Disclosure, Analysis, and Partial Recovery
In the days that followed, national media widely covered the breach, and official statements from BMP, C&M Software, and the Central Bank confirmed that no end-user funds had been affected. BMP reported that, of the R$400 million initially stolen, approximately R$160 million had been recovered through rapid collaboration with crypto exchanges, court orders, and financial tracing efforts.

Later, the Central Bank authorized the partial reactivation of C&M’s services—only after new control mechanisms and stricter access segregation were implemented. Amid the ongoing investigation, authorities confirmed the identification and arrest of the “facilitator”, the insider who enabled the breach. The Federal Police continues to investigate charges related to unauthorized access, banking fraud, and money laundering.

5. Operational Roles Across the Attack Chain

  • Cybercriminals: Strategized and executed the attack, exploiting both human and technical vulnerabilities. Used automation to scale operations and reduce execution time.
  • Insider (Facilitator): Served as the human vulnerability, granting “legitimate” access to core systems. Illustrates the danger of excessive privilege and lack of behavioral monitoring.
  • C&M Software (PSTI): Due to the absence of strong access segregation and behavioral controls, acted as the point of compromise that exposed its entire client base.
  • Victim FIs: Banks and fintechs whose reserve accounts were debited, suffering direct financial loss and reputational impact.
  • SPI/SPB: The infrastructure processed all digitally signed payment orders as expected—highlighting the limitations of automated controls against insider-originated attacks.
  • Mule Accounts / Payment Institutions (PIs): Weak onboarding and due diligence processes made them attractive channels for laundering and dispersing stolen funds.
  • Exchanges: A key positive aspect—proactive exchange-based compliance systems successfully detected, contained, and reported portions of the fraud, helping reduce total impact.

Below, you’ll find a step-by-step visualization of the incident flow:

6. MITRE ATT&CK Mapping

The attack on C&M Software’s environment demonstrates a well-defined chain of techniques documented in the MITRE ATT&CK Framework (Enterprise v17). Mapping these techniques supports threat hunting, incident response, and the enhancement of internal security controls across financial institutions and PSTI providers.

Below, we highlight the main tactics and techniques involved, referencing specific examples from the 2025 incident.

7. APT Groups: Exploratory Assessment

It is important to highlight that, as of now, none of the groups listed below have any confirmed connection to the attack under investigation. These references are intended primarily to inform threat intelligence efforts and assist in shaping strategic defense planning.

Although there has been no formal attribution to any internationally recognized Advanced Persistent Threat (APT) groups, the technical analysis of the attack on C&M Software reveals multiple operational similarities with campaigns previously carried out by sophisticated threat actors. These actors vary in motivation, technical breadth, and focus—often targeting critical financial infrastructures.

The purpose of this mapping is to help place the Brazilian incident within the context of global cyber threat trends, supporting the early identification of attack patterns and contributing to more proactive and intelligence-driven defense strategies.

The groups outlined below demonstrate common Tactics, Techniques, and Procedures (TTPs) seen in supply chain compromises, banking intrusions, ransomware campaigns, and money-laundering-driven data exfiltration:

Notable Examples

  • Plump Spider – Known for leveraging the Clop ransomware, this group has been involved in systemic attacks on global financial institutions. Its operations often combine supply chain compromise, large-scale data and confidential information exfiltration, and laundering of proceeds via cryptoasset mixer services.
  • TA505 – Specializes in malspam-driven campaigns, frequent use of Cobalt Strike for post-exploitation, and targeted attacks on banks and fintechs. Notable for its ability to rapidly convert and disperse illicit funds.
  • FIN7 / Carbanak – With an established reputation for social engineering and persistent access to banking environments, FIN7 is known for extended campaigns that leverage legitimate infrastructure and internal credentials to facilitate stealthy data exfiltration and fund diversion.
  • LAPSUS$ – Gained notoriety for its highly visible and theatrical attacks on major enterprises, with a particular focus on social engineering, privileged access acquisition, and the public exposure of stolen data. While the group is not a direct fit for this incident, which centers on financial operations, some alignment remains in terms of initial access and insider exploitation tactics.

8. Mitigation Strategies

Given the context and the vulnerabilities exposed by the incident, we propose a set of mitigation measures focused on behavioral security, automated credential management, and strong governance across the digital supply chain:

  • Behavioral Analytics: Real-time detection of anomalous privileged access; automatic blocking based on deviation patterns, with correlation by geolocation, time of access, and other indicators.
  • Just-in-Time Access: Grant privileged access strictly for specific tasks or timeframes, thereby reducing exposure windows to insider threats.
  • Credential Rotation (triggered by anomalous behavior): Credentials are automatically refreshed or revoked upon detection of any suspicious activity.
  • Secrets and Token Management for APIs and Supply Chain: Deployment of secure vaulting tools to safely isolate and manage third-party integrations and secrets.
  • Certificate Management and Rotation: Continuous monitoring and automated renewal of digital certificates used in critical financial operations.
  • Third-Party Access Control: Implementation of Zero Trust policies for partners, with strict onboarding and offboarding processes.

Reference Architecture: A recommended visual design illustrating an integrated security model for PSTIs, financial institutions, and the Central Bank (suggested as a flowchart or architecture diagram).

9. Conclusion

The attack that impacted C&M Software and multiple institutions connected to Brazil’s Payment System (SPB) underscores the critical role of behavioral cybersecurity and credential control in safeguarding financial ecosystems. This event exposed significant weaknesses in privileged access management, particularly within trust relationships between financial institutions and their technology service providers. It clearly demonstrates that traditional paradigms—relying solely on logical perimeters, firewalls, and network segmentation—are insufficient to defend against insider threats, supply chain compromise, and sophisticated attacks enabled by the misuse of valid credentials and seemingly legitimate but unauthorized operations.

The incident revealed that insider actions, improper certificate usage, and the absence of behavioral monitoring allowed fraudulent activity to flow through automated systems without triggering alarms across various points in the chain. Additionally, it reinforced the importance of traceability, real-time threat intelligence, and collaborative defense among key ecosystem players including fintechs, banks, exchanges, and regulatory bodies.

From the lessons learned, the following mitigation strategies stand out:

  • Continuous Behavioral Analytics: Monitor privileged user behavior in real time, generating alerts and automated blocks when anomalies are detected—such as unusual access times, organizational changes, or abnormal geolocation data.
  • Just-in-Time Access & Least Privilege: Minimize the time during which sensitive credentials remain active. Grant access strictly for specific tasks and timeframes, with comprehensive logging and traceability.
  • Credential Rotation Triggered by Anomalies: Implement mechanisms for the automatic replacement of passwords, tokens, and certificates whenever suspicious behavior is detected—preventing persistence or reuse of compromised access.
  • Secure Management of Secrets, Tokens, and Digital Certificates: Centralize the lifecycle control, usage auditing, and periodic renewal of these assets—especially across integrations between financial institutions, PSTIs, and APIs—to mitigate leakage and misuse risks.
  • Zero Trust Policies and Tight Third-Party Controls: Define robust procedures for granting, monitoring, and revoking access to partners, vendors, and external teams. Ensure consistent due diligence and oversight.

Ultimately, the case highlights that operational resilience, rapid intelligence sharing, transparent communication, and the integration of technical and procedural controls are foundational pillars for the systemic defense of the national financial environment in the face of evolving and sophisticated threats.

Speak to Our Experts
To learn how Segura® can support your organization in behavioral cybersecurity, privileged access management, and fraud-resistant architecture, contact us for a personalized strategic assessment.

 

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Why GDPR Still Reigns: Navigating the Modern Data Privacy Landscape

Cast your mind back to May 2018. Remember that flurry of privacy policy updates hitting your inbox?

That was the grand entrance of the General Data Protection Regulation (GDPR). And if you thought it was just a fleeting trend, or something that would eventually fade like dial-up internet or fidget spinners, guess again!

Fast forward to today, and GDPR isn’t just sticking around – it’s stronger, more influential, and more vital than ever. Said another way: GDPR isn’t just a suggestion, it’s the law. If your business interacts with any personal data of individuals living in the European Union (EU) or the European Economic Area (EEA), you absolutely must comply. It’s the primary legal framework to ensure the millions of people living across the EU and EEA have fundamental rights over their digital footprints.

GDPR’s staying power is having an even wider impact on our global perspective of trust, privacy, compliance, and the commitments we make to one another about how we handle and process personal data. This article dives into that far-reaching impact, and showcases how GDPR’s success is an investment in trust.

Let’s dive in!

The Impact of GDPR Is Real (And Can Be Really Expensive)

GDPR is not a distant threat. Data Protection Authorities (DPAs) across Europe have demonstrated their willingness to levy hefty fines for noncompliance. Remember that eye-watering $1.3 billion fine Meta received in 2023 for data transfers to the US?

That wasn’t just a slap on the wrist; it was a loud, clear message.

Regulators are scrutinizing everything, from how transparent companies are about their data practices to whether they’re truly respecting individuals’ rights (like asking for your data back or requesting it be deleted). Enforcement is becoming more sophisticated and far-reaching, which means companies of all sizes need to be sure their systems and policies are compliant.

And while GDPR may directly apply to Europe, it’s far from a European idea. GDPR kicked off a wave of similar, robust data privacy laws across the globe. From California’s CCPA/CPRA to Brazil’s LGPD and South Africa’s POPIA, these regulations often share GDPR’s core principles and intent.

What does that mean for you?

If you’re doing a great job with GDPR compliance, you’re likely already building a fantastic foundation for meeting other international privacy requirements. If not, you’ll find that your efforts to improve your handling of private data will generally apply across the board.

AI’s New Frontier: GDPR’s Guiding Hand

The world may be buzzing about AI and Generative AI. But what is often lost in the conversation is that they bring a whole new set of questions about how our personal data is used, especially when it comes to training these powerful models.

The good news? GDPR’s foundational principles are incredibly robust and adaptable. They’re helping us navigate critical discussions around:

  • Lawful Basis: Is it okay to use my data to train an AI? What’s the legal reason?
  • Transparency: How do these AI models make decisions? Can I understand why an AI gave me a certain outcome?
  • Bias: Is the data used to train AI fair and unbiased?

And while the EU AI Act is on its way, it’s designed to work hand-in-glove with GDPR, not replace it. This shows just how forward-thinking and resilient GDPR’s framework truly is.

Ready to Be a GDPR Champion?

Becoming GDPR compliant (and staying that way!) is an ongoing journey, not a one-time checkbox. Here are some tips to get you on the path to being a GDPR pro:

Become a Data Detective: Time to map out all the personal data your company holds – from names and emails to IP addresses and even sensitive health info. Ask yourself:

  • Where does it live?
  • Who has access to it, both inside and outside your company?
  • Why are you collecting it in the first place?

Understanding “what you have” is step one!

Find Your “Why”: For every piece of personal data you process, you need a clear, legal reason (a “lawful basis”) under GDPR. Ask yourself:

  • Are you collecting it because someone consented?
  • Is it part of a contract?
  • Is it part of a legal obligation?

Pinpointing your “why” keeps you on the right side of the law.

Empower Your Users’ Rights: Make it easy for people to:

  • Know what data you’re collecting
  • Access their data
  • Correct any mistakes
  • Erase their data (“the right to be forgotten”)
  • And even move their data elsewhere (data portability)

Boost Your Security Game: You need strong defenses to protect personal data from unauthorized access, accidental loss, or anything that could compromise it.

Master the Breach Response: If a data breach occurs, you need a clear plan to detect, investigate, manage, and report it quickly – often within 72 hours! Being prepared is half the battle.

Bake Privacy In (By Design!): Data Protection by Design and by Default means thinking about privacy from the very beginning when you’re designing new systems, products, or services. And by default, ensure the strictest privacy settings are active and you only collect the data you truly need.

Mind Your Global Transfers: If you’re sending personal data across borders (especially outside the EU/EEA), make sure you’re doing it legally! There are specific mechanisms, like Standard Contractual Clauses, that help ensure data remains protected wherever it travels.

The Bottom Line: Invest in Trust

GDPR isn’t just a complex set of rules; it’s a fundamental pillar of global data privacy that’s built on trust.

Its influence continues to shape how businesses worldwide handle sensitive information. Ignoring GDPR doesn’t just invite hefty fines; it risks your reputation and the trust of your customers – something no organization can afford to lose in today’s digital age.

JumpCloud and GDPR

JumpCloud takes security and privacy seriously and complies with the EU privacy regulation GDPR to protect personal data. You can check out our JumpCloud GDPR Compliance online documentation for more information. Our safeguards for personal data include, but are not limited to:

  • Encrypting all data at rest and in transit
  • Training employees in security awareness and performing appropriate background checks
  • Maintaining access controls
  • Actively monitoring JumpCloud user logins and privileged commands
  • Monitoring logs

If you have questions about GDPR, or how JumpCloud can help you become GDPR-compliant, please contact us at sales@jumpcloud.com.

Prioritizing GDPR compliance isn’t just a cost; it’s a smart, critical investment in your company’s future and your relationship with your users. So, let’s embrace it and build a more privacy-conscious world together!

 

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Best secure video conferencing tips

What is video conferencing software?

In simple terms, video conferencing software allows multiple users to hold live video and audio meetings online. This makes it feel like they’re having a face-to-face conversation, even though they’re not in the same room. It usually includes handy features like screen sharing, chat, and file sharing to ensure efficient, secure video conferencing. Video conferencing software is commonly used for work-related virtual meetings and online classes.

Cybersecurity risks in video conferencing

At the beginning of April, Zoom—one of the most popular video conferencing services—had a ton of security-related problems. Most of them revolved around poor encryption and data protection.

Zoom has always claimed to offer end-to-end encryption. However, this turned out to be far from the truth. The company only encrypts data in transit. To make matters worse, the developers have encryption keys that allow Zoom to decrypt its users’ data.

Another problem Zoom had to deal with was so prominent that it even had its own name: zoombombing. It’s a type of photobombing in which hackers and regular internet trolls infiltrate video conferences and post malicious links, pornographic images, or use obscene language.

A combination of weak encryption and bugs in some of Zoom’s apps led to the exposure of 500,000 users’ credentials, which ended up for sale on the dark web. It doesn’t help that Zoom is known to collect and sell users’ data to third parties without informing them.

Even though Zoom was quick to react and patch most of these vulnerabilities, new exploits will likely continue to arise in Zoom and other video chat services. Therefore, you should always keep tabs on the latest cybersecurity news. Otherwise, you risk your private conversations, passwords, and business secrets ending up online.

Secure video conferencing best practices

To ensure that your personal and business video calls are safeguarded, we suggest following these secure video conferencing tips:

  1. Make sure to install the latest version of the app the moment it’s available. Updates include security patches that are vital if you want to stay safe online.

  2. Never share the meeting link or ID publicly—send it only to the people participating in the video call. If your app allows it, set a password for your meeting to maintain access control. Need help with creating a strong password? Try our password generator.

  3. Take advantage of the other features offered by your video conference app. Some have a virtual waiting room where you can approve each person individually. Others allow you to disable participants’ cameras and microphones, or even kick them out. Learn about all the features of your secure video conferencing platform, as well as how to use them to stay safe.

  4. Never accept video conference invites from people you don’t know. They might be scams or attempts at catfishing, so it’s best to stay away from people you don’t know.

  5. Always be mindful of what you say and show during a video call. Remember, everything can be recorded, and you never know where it will end up. So, avoid sharing any information that’s too personal or sensitive. Look for safer methods to discuss business secrets.

  6. Even though many video conferencing apps offer encrypted video calls, you should still take additional safety measures and do your own research. Make sure that the apps don’t have any known vulnerabilities, the encryption protocols they use are bulletproof, and your own device is not infected with malware. If someone has control over your computer or phone, they can listen in on your calls, even if they are end-to-end encrypted. Scan your devices regularly to make sure they are safe to use.

  7. Be careful with apps you have never heard of. Only download them from official app stores, and always check whether the developer is trustworthy before installing. Hackers are known to create fake versions of popular, secure video conferencing platforms that infect your phone with malware.

  8. The usage of various video conferencing tools is skyrocketing, and cybercriminals have their eyes set on them. Therefore, never reuse passwords, change them regularly, and come up with strong, complex passwords for your most sensitive accounts. If you need help remembering them, use a password manager to safely store them all.

  9. Use a HIPAA-compliant video conferencing platform to ensure the safe handling of sensitive health information. Considering that sometimes employees need to share their health data with people in other departments (e.g., HR), you should create a safe virtual environment where they can do that without worrying about security.

  10. Use a HIPAA-compliant video conferencing platform to ensure the safe handling of sensitive health information. Considering that sometimes employees need to share their health data with people in other departments (e.g. HR), you should create a safe virtual environment where they can do that without worrying about security, complying with HIPAA requirements.

  11. Use only strong passwords—combinations of letters, numbers, and symbols that are complex and unique enough to prevent cybercriminals or malicious machines from identifying them. You should also implement two-factor authentication to increase the level of cybersecurity at your company. With two-factor authentication, employees must provide more than just their password to log in to your company applications or access company data. This means, for example, that they will be sent a verification code via email or SMS, or asked to confirm their identity using biometrics.

  12. Limit screen sharing to trusted people only, and be mindful about sharing individual web pages or applications rather than your entire screen to ensure that no sensitive information is shown.

CISA guide for securing video conferencing

The Cybersecurity and Infrastructure Security Agency (CISA), a US Department of Homeland Security agency, has released a guide on how to carry out video conferences in a secure way. In essence, CISA has come up with 4 tips that, when followed, can help you safely connect with others over a video chat. They are:

Make your network secure—set up your router to use the WPA2 or WPA3 wireless encryption standard, and create strong passwords for both the router and your Wi-Fi network.

Control access to your video conferencing software—create strict policies, processes, and procedures so that only the right people can use your video conferencing software.

Create a secure environment for file and screen sharing—establish secure rules regarding the types of files that can be shared during a video conference. Also, if you plan to record the meeting, notify all participants.

Use only the latest versions of your applications—enable automatic updates and follow a patch management policy to make sure your applications are up-to-date and as secure as they can be.

Most secure video conferencing software

Below, we have compiled a list of what we consider to be the best secure video conferencing tools available on the market today. They are:

  • ZoHo Meeting—a secure video conferencing platform that not only provides all the communication features needed to connect with other team members. It encrypts all audio, video, and screen sharing to make sure that all information—both personal and business—is safe and sound. Using ZoHo Meeting, you can easily record your meetings and share them with the people you trust. Plus, as a host, you can “lock” the meetings so that they are fully private. This gives you full control over who can join the meeting, and you can add/remove participants at any time.

  • Microsoft Teams—probably one of the most popular video conferencing tools available on the market, Microsoft Teams is a secure video conferencing service that comes with a wide range of features to help you easily set up and carry out video conferences. Not only does it allow you to connect with up to 10,000 people at once for a live event, but it also enables you to go from a group chat to a video conference with the press of just one button.

  • Pexip—a video conferencing tool that prioritizes security. With Pexip, you can set up PIN-protected virtual meeting rooms that allow you to keep communication private and control meeting access. As a host, you can see all participants taking part in the meeting and thus be sure that no eavesdropping is attempted. If you are looking for a secure video conferencing service, you should give Pexip a go.

  • Google Meet—developed by Google services, this secure video conferencing tool allows users to host and join virtual meetings. It offers features like screen sharing, real-time captions, and integration with Google Workspace tools, making it ideal for both personal and professional use. Users can engage in encrypted video conferencing through a web browser or mobile app without being required to install any additional software.

  • Zoom—another highly popular video conferencing platform that lets users set up virtual meetings, webinars, and online events. While it had its fair share of security issues in the past, it offers features like screen sharing, breakout rooms, and virtual backgrounds, providing functionality for both personal and professional needs. By allowing users to join meetings via a web browser, desktop application, or mobile app, Zoom makes video conferencing an enjoyable experience anywhere, anytime.

Bottom line

Follow the best practices outlined in this article to ensure secure video conferencing, both for private and business environments. Likewise, review all your options before choosing one of the secure video conferencing tools for yourself or your team. Lastly, use NordPass to store passwords for these platforms or generate them for meeting access with our password generator.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×