Protect electronic health records, hospital systems and medical devices against ransomware and patient data breaches.
Why now
Hospitals are the #1 ransomware target in Brazil — a single attack can shut down ICUs, delay surgeries and expose records of thousands of patients, triggering fines up to BRL 50M under LGPD and class actions for collective moral damages.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Access control audit, segregation of medical roles, logs and integrity of clinical records.
Analysis of infusion pumps, monitors, imaging equipment and devices connected to the hospital network.
IDOR testing for unauthorized access to other patients' records, exams and reports.
Authorization APIs, TISS billing and data exchange with health insurers.
Validation of segregation between patient network, medical equipment and back office.
Backup immutability testing and real RTO under ransomware scenarios.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
Prior engagements with large hospital institutions, including Santa Casa de Misericórdia (Portugal).
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
No. We work in mirror environments or controlled windows with agreed-upon red flags. Critical operations like ICU and surgical center are never touched without prior alignment.
Yes. The technical report includes a mapping of findings against LGPD articles and prioritized recommendations for the DPO/data officer.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.