Newsinterpretation

Brazilian hacker caught after Bitcoin trail exposes $6 million digital heist

Brazilian police have arrested a 20-year-old hacker after uncovering a large digital crime involving stolen money and cryptocurrency. The case shows how online crimes can leave clear digital trails, even when criminals believe they are hiding behind complex technology like Bitcoin. Authorities say the hacker stole more than R$6 million from a Brazilian payment company and tried to hide the money by converting it into cryptocurrency.

The investigation has drawn attention across Brazil because of the amount of money involved and the simple mistakes that helped police solve the case. Officials say the crime highlights both weak security systems and the growing ability of law enforcement to track digital financial crimes.

How the Digital Heist Happened

The crime took place in July 2024,s, when the hacker targeted Cashway, a Brazilian payment processing platform. Investigators say the attacker did not use highly advanced tools. Instead, he took advantage of weak security practices inside the company.

Crypto wealth flows into European housing as buyers convert digital holdings into apartments

Authorities found that the hacker accessed dormant employee accounts. These were old accounts that were no longer actively used but were still connected to the system. Because they had little protection, the hacker was able to enter without raising alarms.

Once inside, the hacker changed passwords on several customer-linked bank accounts. This allowed him to move money without immediate detection. Over a short period, large sums were transferred out of the system.

According to police records, the total amount moved through these illegal transfers reached R$6,054,861.61. Investigators noticed that the withdrawals followed unusual patterns. Large amounts were moved quickly, and many of the transfers were converted into Bitcoin soon after.

The rapid conversion of cash into cryptocurrency caught the attention of investigators. Bitcoin transactions are recorded on a public system called the blockchain, which means they can be traced even if names are not shown. This became a key part of the investigation.

Digital Clues Lead Police to the Suspect

Police teams closely examined the flow of the stolen funds. They noticed Bitcoin activity connected to a platform that raised immediate red flags. Investigators then tracked the internet addresses used during the transactions.

This digital trail led directly to a physical location. The IP address used during the suspicious activity was linked to the home of the suspect’s mother. With this information, police obtained search warrants and moved quickly.

During the search, officers found multiple electronic devices, including computers and mobile phones. These devices contained data that tied the suspect to the illegal access and money transfers.

U.S. charges Venezuelan national Jorge Figueira in alleged $1 billion money laundering scheme tied to crypto networks

Police also discovered 20 Pix keys registered under the suspect’s name. Pix is Brazil’s instant payment system, and these keys were used to move and receive money connected to the stolen funds. The number of keys and their transaction history strengthened the case against him.

Investigators say the evidence showed clear involvement in the hacking operation. Digital logs, account access records, and transaction data all pointed to the same individual. The suspect was taken into custody as the investigation continued.

The case showed how online actions often leave behind digital footprints. Even when criminals try to hide their tracks, data such as IP addresses, transaction times, and device records can connect online activity to real people and places.

Messages, Purchases, and Arrest Details

Further checks on the seized mobile phones gave police some of the strongest evidence in the case. Investigators found WhatsApp messages where the hacker had sent himself sensitive information. Among these messages was a cryptocurrency wallet seed phrase, which is a group of secret words that gives full access to a digital wallet.

Police confirmed that the message containing the recovery codes was sent on July 15, 2024, just days after the Cashway system was attacked. This helped prove that the suspect controlled the wallet used to store the stolen cryptocurrency.

Authorities also discovered how part of the stolen money was spent. Investigators found iFood gift card codes on the suspect’s devices. These codes matched transactions linked to the stolen Cashway funds. Three purchase receipts showed that the money was used to order food for personal use, connecting the digital crime to real-life spending.

AI Models Reveal 2026 Crypto Trends: as AMT DeFi’s renewable energy investment returns are becoming mainstream.

In addition to this, police found Bitcoin payments sent to a well-known wallet service, showing how the stolen money was moved through different platforms to hide its origin.

The suspect asked the court for release through a habeas corpus request, but the Superior Court of Justice rejected it. The case is being prosecuted in Santa Catarina and is based on strong digital evidence, including transaction records, device data, and message logs. The investigation remains under judicial review.

Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

macSync malware spreads through Google ads, exposing over 15,000 Mac users

A large-scale macOS malware campaign is spreading through sponsored...

Microsoft pushes toward AI self-sufficiency after $135 billion OpenAI restructuring

Microsoft is reshaping its artificial intelligence strategy in a...

David Solomon Accepts Resignation: How the ‘Uncle Jeffrey’ Files Changed the Game at Goldman

Goldman Sachs Group Inc. (GS) Chief Legal Officer Kathy...

Epstein files reveal emails discussing how to “neutralize” journalist Tina Brown

Recently released Epstein files have revealed private emails that...

FTC questions Apple News after reports of favoring left-leaning outlets

The United States Federal Trade Commission has raised concerns...

DOJ filings place Jes Staley’s trustee role in Epstein trust under renewed scrutiny

Newly released legal records have drawn attention to former...

Elon Musk ignites nationwide debate after questioning pride flags in schools

Elon Musk has sparked widespread discussion after sharing his...

DOJ unredacts more Epstein names as Washington faces fresh scrutiny over transparency and political accountability

The latest developments involving the Trump administration have drawn...

Shock Epstein records outline hidden link to entrepreneur and Tesla board member Kimbal Musk

Newly released government documents have revealed details about how...
error: Content is protected !!
Exit mobile version