PIX Security for Businesses: How to Protect Your Merchant Account from Fraud
Learn how to protect your business from PIX fraud including fake payment screenshots, QR code swaps, and social engineering attacks targeting Brazilian merchants.
PIX Security for Businesses: How to Protect Your Merchant Account from Fraud
PIX has transformed how businesses in Brazil handle payments. With instant settlement, zero transaction fees for most operations, and 24/7 availability, it has become the dominant payment method — processing over 40 billion transactions in 2025. But as PIX adoption has exploded, so have the fraud techniques targeting merchants.
For businesses that rely on PIX, understanding these threats is not optional. Here is your complete guide to PIX security for merchants.
PIX Threats Targeting Businesses
1. Fake Payment Screenshots
The simplest and most common fraud. A customer presents a fabricated PIX receipt on their phone screen, claiming payment was sent. For busy merchants — food trucks, street vendors, retail shops — the temptation to glance at the screenshot and move on is exactly what scammers count on.
Scale of the problem: FEBRABAN reported that fake PIX receipt fraud affected over 500,000 businesses in 2025.
2. QR Code Swap Attacks
Scammers physically replace your PIX QR code at your point of sale with their own. Every customer who scans the QR code sends money to the fraudster instead of your business. This is especially common at:
- Food courts and street stalls
- Market vendors
- Self-service payment stations
- Printed QR codes left unattended
3. Social Engineering Against Employees
Scammers call your business pretending to be from your bank or payment processor. They claim there is a "PIX system update" or "security verification" that requires your employees to share account credentials, make a test transfer, or install remote access software.
4. Scheduled PIX Exploitation
A customer shows you a "scheduled PIX" receipt as proof of payment. Unlike an instant PIX transfer, a scheduled transfer can be canceled by the sender before it processes. You release the goods, and the customer cancels the scheduled payment.
5. Refund Exploitation
A customer makes a legitimate small PIX payment, then claims they paid more or paid twice. They request a refund to a different PIX key. The refund goes through, but the original dispute leaves you at a loss.
6. Account Takeover via PIX Key
If your business PIX key is a phone number or email, and an attacker gains control of that phone number (via SIM swap) or email account, they can redirect incoming payments to themselves.
PIX Business Threat Matrix
| Threat | Target | Complexity | Impact |
|---|---|---|---|
| Fake Screenshot | Point of sale | Low | Medium per transaction |
| QR Code Swap | Physical location | Low | High (affects all customers) |
| Social Engineering | Employees | Medium | Very High |
| Scheduled PIX Trick | Point of sale | Low | Medium |
| Refund Exploitation | Finance team | Medium | Medium |
| PIX Key Takeover | Business account | High | Critical |
| Malware/RAT | Accounting systems | High | Critical |
Merchant Protection Measures
Real-Time Payment Verification
Never rely on what the customer shows you. Implement these verification steps:
- Check your bank account directly — Open your banking app or POS system to confirm the credit
- Set up real-time push notifications for every incoming PIX payment
- Use audio notifications — Some banking apps can announce incoming payments, useful in noisy retail environments
- Verify the amount, sender, and timestamp match the expected transaction
QR Code Security
Protect your PIX QR codes from tampering:
- Laminate static QR codes so they cannot be easily covered with stickers
- Check QR codes daily — Look for signs of overlaid stickers or replacement
- Use dynamic QR codes that change per transaction (available through most POS systems)
- Mount QR codes where staff can monitor them — Not in blind spots
- Test-scan your own QR code regularly to verify it directs to your account
Employee Training
Your staff is your first line of defense:
- Train employees to verify every PIX payment in the banking app, not from customer screenshots
- Establish a policy that no employee should share banking credentials over the phone
- Create a verification protocol for anyone claiming to be from your bank — hang up and call the bank directly
- Practice scenarios so staff recognize social engineering attempts
Account Security
Protect the accounts that receive your PIX payments:
- Use a CNPJ-linked PIX key rather than a personal phone number or email
- Enable two-factor authentication on all banking and financial apps
- Limit account access — Only authorized personnel should have credentials
- Set up transaction limits for individual PIX operations
- Review account activity daily for unauthorized transactions
Sharing Business Financial Information Securely
Businesses regularly need to share PIX keys, bank account details, and payment instructions with partners, suppliers, and employees. Sending this information through email or WhatsApp groups creates permanent records that can be compromised.
Use LOCK.PUB to share your business banking details through password-protected links that expire after a set time. This ensures your PIX keys and account numbers are not sitting in dozens of WhatsApp chat histories where they could be harvested by someone who gains access to any of those devices.
Setting Up PIX Securely for Your Business
Choose the Right PIX Key
| PIX Key Type | Security Level | Recommendation |
|---|---|---|
| Random Key (EVP) | Highest | Best for business — no personal info exposed |
| CNPJ | High | Good for formal business identification |
| Medium | Risk if email account is compromised | |
| Phone Number | Lower | Risk of SIM swap attacks |
| CPF | Lowest for business | Avoid using personal CPF for business transactions |
Configure Transaction Limits
The Central Bank allows you to customize PIX limits:
- Set lower nighttime limits (between 8 PM and 6 AM)
- Establish per-transaction maximums appropriate for your business size
- Require additional authentication for transfers above a certain threshold
- Register trusted recipients for recurring large payments
Monitor and Audit
- Review all PIX transactions daily
- Reconcile PIX receipts with your sales records
- Watch for unusual patterns (multiple small transactions, off-hours activity)
- Set up alerts for transactions above your typical range
What to Do If Your Business Is Targeted
- Freeze the affected account by contacting your bank immediately
- Request a MED (Mecanismo Especial de Devolucao) through your bank within 80 days for fraudulent transactions
- File a B.O. (police report) online with all transaction evidence
- Notify your employees about the specific fraud technique used
- Review and strengthen your verification procedures
- Check all QR codes at your physical locations for tampering
Conclusion
PIX has made payments faster and more convenient for Brazilian businesses, but that convenience requires a corresponding investment in security. The most critical habit is simple: always verify payments in your bank account before releasing goods or services. Never trust a screenshot, never skip verification during busy periods, and protect your QR codes from physical tampering.
When sharing business banking information with partners or employees, use LOCK.PUB to create free password-protected, expiring links that keep your financial details secure.
Keywords
You might also like
GoPay, OVO, DANA Account Security: How to Protect Your Indonesian E-Wallet
Learn how to secure your GoPay, OVO, and DANA e-wallet accounts from fraud, phishing, and social engineering attacks common in Indonesia.
SIM Swap Fraud in Indonesia: How Attackers Drain Your Bank and E-Wallet
Learn how SIM swap scams work in Indonesia through Telkomsel, Indosat, and XL, how attackers intercept OTPs to drain bank accounts, and how to protect yourself.
How to Share Your SSN Safely: Protecting Your Social Security Number
Learn when and how to safely share your Social Security Number. Avoid identity theft with secure sharing methods, fraud alerts, and SSN protection best practices.
Create your password-protected link now
Create password-protected links, secret memos, and encrypted chats for free.
Get Started Free