Cutting-edge offensive security for fintechs at scale — from PSPs to digital wallets, BaaS and PIX infrastructure.
Why now
Every fintech is a target. Fraud, ATO, money mules, scraping, cashback abuse, balance scraping — attackers are already running playbooks against you. The difference is finding the vector before they do.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Audit of PIX charge, refund, MED flows and key/QR Code abuse.
Liveness bypass, deepfake, document OCR and PFA fraud.
Race conditions in withdrawal, induced overdraft, negative transfers.
Consent validation, mTLS, FAPI 1.0 Advanced, ITP/AISP.
Reverse engineering, root/jailbreak detection, certificate pinning, secrets in release.
Unauthorized operator access, internal abuse, employee fraud.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
OpenFinance/OpenBanking client; experience in BACEN-regulated environments.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes. We cover FAPI 1.0 Advanced (Brazil), mTLS validation, JARM, PAR and consent validation by scope.
Between 2 and 6 weeks depending on scope. Wallet + API + mobile usually takes 4 weeks with 2 pentesters.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.