1. Home
  2. / Economy
  3. / Jovem Pan loses R$ 175,000 in just 40 minutes after a phone scam, sees 18 Pix transfers leave the account consecutively, and issues an alert about frauds against companies in Brazil.
Reading time 5 min of reading Comments 0 comments

Jovem Pan loses R$ 175,000 in just 40 minutes after a phone scam, sees 18 Pix transfers leave the account consecutively, and issues an alert about frauds against companies in Brazil.

Written by Carla Teles
Published on 05/05/2026 at 15:16
Be the first to react!
React to this article

The scam that hit Jovem Pan exposed the speed with which financial frauds can empty a company’s account in Brazil. The broadcaster lost R$ 175.3 thousand after a criminal, pretending to be a Bradesco manager, made contact by phone and claimed to need to enable a supposed “corporate chat”. From this contact, an employee was instructed to access a fraudulent link and provide access credentials, such as username, password, and tokens.

The case occurred on September 29 of last year and, in about 40 minutes, the intruder made 18 Pix transfers until the fraud was noticed. The episode gained repercussion because it shows a type of scam that does not depend on sophisticated invasion of the company’s system, but on a persuasive approach, made in real-time, with an institutional appearance and step-by-step guided by the criminal themselves.

How the scam started and gained account access

According to the UOL Portal, it all started with a phone call. The criminal introduced himself as a Bradesco manager and said it was necessary to activate a faster and more efficient service channel, called corporate chat. The strategy was to create an environment of urgency and legitimacy to convince the victim to follow instructions without suspecting fraud.

Subsequently, the con artist sent a fraudulent link with an institutional appearance and guided the broadcaster’s employee through each step of the supposed installation. The decisive point of the scam was the sequential delivery of access credentials, which gave the criminal the necessary conditions to access the account and initiate transactions.

The numbers that explain the dimension of the fraud

The case draws attention mainly due to its speed. In approximately 40 minutes, 18 Pix transfers were carried out, totaling R$ 175.3 thousand diverted from Jovem Pan’s account.

This volume of sequential transactions is the most impressive data. It was not an isolated operation, but a rapid succession of financial outflows in a short period, which turns the case into a relevant alert for companies operating with corporate bank accounts and digital authorization routines.

Why this scam raises an alert for companies

The fraud exposes a common vulnerability in corporate environments: trust in contacts that appear legitimate and the execution of banking procedures guided by third parties in real-time. When the criminal masters the conversation script and uses language compatible with business routines, the risk of adherence increases.

The Jovem Pan case shows that the scam doesn’t need to start with a visible system failure in the company, but rather with a well-orchestrated approach and an apparently trustworthy link. It is precisely this mix of urgency, institutional appearance, and step-by-step instruction that makes the scheme so dangerous.

What happened after the transfers

After the loss, Jovem Pan sued Bradesco, arguing that the pattern of transfers should have triggered a stronger preventive response. The broadcaster pointed out that there were several similar operations, in sequence, and some directed to the same accounts, which, according to its understanding, would require containment proportional to the risk.

In the unfolding of the case, however, the Court rejected the request for restitution. Judge Rossana Luiza de Faria, from the 9th Civil Court of Osasco, considered that the fraud originated outside the environment controlled by the bank and highlighted that the company’s representatives clicked on the link, followed the con artist’s instructions, and fully provided the access credentials.

The most significant point in the case

The bank’s security system even contacted the broadcaster to question the regularity of the transactions, and the representatives confirmed that they were valid. This detail makes the episode even more emblematic, because it shows how the scam managed to bypass not only the initial access stage but also a subsequent verification layer.

This is one of the toughest aspects of the case; the fraud was not sustained only by the initial invasion, but also by the ability to maintain the appearance of normality during the movements themselves. When this happens, reaction time decreases even further.

How the bank described the fraud

In its defense, Bradesco stated that the lawsuit attempted to transfer to the institution a responsibility that, according to the bank, resulted from the victim’s own delivery of credentials to the criminal. It also argued that there was no failure in the security system and that fraudsters use sophisticated strategies to exploit moments of victim inattention.

This position reinforces an important aspect of the episode. The scam was built much more on social engineering than on a traditional technical invasion. In other words, the criminal needed to convince, guide, and induce the victim’s action to enable large-scale diversion.

What this episode shows about current scams

Cases like this help to understand why financial frauds continue to advance even in environments with protection systems and alert channels. The criminal acts not only as a digital thief but as someone who plays a role, reproduces the bank’s language, and leads the victim to collaborate with the fraud itself.

In the Jovem Pan case, the scam brought together several elements that increase the power of persuasion: phone calls, authoritative discourse, promise of efficiency, institutional-looking links, and detailed guidance. This combination transforms a common fraud into an extremely fast operation with high potential for damage.

The alert for the corporate environment

The episode serves as a warning because it shows that companies are also vulnerable targets, especially when the criminal takes advantage of operational routines, trust in banking contacts, and haste in validating procedures. In business accounts, the potential for damage is usually greater precisely because of the volume that can be moved in a few minutes.

The case shows that the risk is not just in the click itself, but in the entire chain of trust that forms from it. When the victim believes they are speaking with a legitimate representative and begins to follow instructions without interrupting the process for independent verification, the scam gains ground very quickly.

The outcome does not yet close the alert

According to the UOL portal, it informs that Jovem Pan can still appeal. But, regardless of the subsequent path, the case has already established itself as a strong portrait of the type of fraud that today threatens companies in the country.

More than the value lost, what makes this story impactful is how it all happened: 18 Pix transactions in sequence, R$ 175.3 thousand diverted, and only 40 minutes between the first access and the realization of the loss. The short time between the approach and the loss is precisely what makes this episode such a serious warning.

If a phone scam managed to empty R$ 175,000 in 40 minutes within a well-known company, how many other similar operations might be happening without the loss being perceived in time?

Sign up
Notify of
guest
0 Comments
most recent
older Most voted
Built-in feedback
View all comments
Carla Teles

I produce daily content on economics, diverse topics, the automotive sector, technology, innovation, construction, and the oil and gas sector, with a focus on what truly matters to the Brazilian market. Here, you will find updated job opportunities and key industry developments. Have a content suggestion or want to advertise your job opening? Contact me: carlatdl016@gmail.com

Share in apps
0
I'd love to hear your opinion, please comment.x