The Nasajon data breach has been claimed by a threat actor who published internal source code repositories belonging to Nasajon, a major Brazilian developer of enterprise resource planning software. According to the actor, the November 2025 incident resulted in the theft and leak of proprietary ERP application code that supports business management systems used across Brazil. The compromised material reportedly includes multiple internal repositories containing core components of Nasajon’s flagship software suite, making this event one of the most significant source code exposures affecting a Latin American enterprise software vendor in recent years.
Background on Nasajon
Nasajon is a long-established Brazilian technology company specializing in ERP systems for financial management, payroll, accounting, and operational automation. Its products support thousands of businesses across Brazil, including accounting offices, small and medium enterprises, and organizations that depend on accurate and secure administrative software. By integrating payroll, taxation modules, human resources processing, financial workflows, and enterprise compliance tools, Nasajon serves as an essential infrastructure provider for many companies that rely on fast and reliable digital administration.
The company’s software ecosystem includes cloud services, desktop applications, database components, integrations with external systems, and proprietary automation modules. Because ERP platforms contain business logic, compliance frameworks, and client specific workflows, source code is among the most sensitive data a software vendor can lose. Access to this code can reveal internal architecture, proprietary functionality, API behaviors, encryption routines, and security controls embedded inside the platform.
The exposure of this material offers threat actors valuable insight into how the software operates, enabling reverse engineering, vulnerability discovery, and the development of targeted exploits that could affect every organization using Nasajon products.
Detailed Description of the Breach
The threat actor who initially posted the material on a cybercrime forum claimed responsibility for the Nasajon data breach and stated that multiple source code repositories had been exfiltrated during an intrusion occurring in November 2025. The attacker shared samples to demonstrate authenticity and posted a directory tree showcasing internal projects associated with Nasajon’s ERP ecosystem.
These repositories reportedly contain financial processing modules, client management components, internal automation scripts, and application logic used across Nasajon’s product line. The actor did not indicate any use of ransomware and instead described the operation as a straightforward data theft resulting in the publication of proprietary development assets.
The forum post emphasized that the material included full functional codebases rather than isolated files. The scope of the disclosed data suggests the attacker achieved privileged access to an internal development network, source control platform, or build server. While the company has not issued public confirmation, the attacker’s samples indicate structured project folders organized in a manner consistent with enterprise software development environments.
Technical Analysis of Leaked Data
Based on the available information provided by the threat actor, the leaked repositories include:
- ERP business logic modules used for accounting, financial management, and payroll
- Internal automation scripts associated with software deployment and testing workflows
- Configuration files revealing internal application structure and environment variables
- API components used for data exchange between Nasajon products and client systems
- Front end and back end application elements embedded in the ERP platform
The presence of source code is particularly dangerous because it can reveal developer comments, internal naming conventions, database schema design principles, and logic paths. Threat actors who obtain source code can audit it for vulnerabilities, logic flaws, or insecure authentication routines that could be exploited against Nasajon clients. Even if the stolen material contains no client data, the exposure of source code alone dramatically increases attack surface risk for all downstream users.
Additionally, any embedded configuration files may reveal legacy internal infrastructure details. These often include outdated URLs, undocumented API endpoints, or code related to deprecated systems that could still exist in production environments. Such details can assist in targeted exploitation efforts if attackers identify weaknesses tied to this information.
Threat Actor Activity and Dark Web Listing
The actor responsible for the Nasajon data breach is the same individual seen in previous source code leaks involving corporate software vendors. The post was made on a high-traffic cybercrime forum used for distributing databases, development tools, and stolen corporate intellectual property. In the listing, the actor described the breach as a disclosure event intended to release the full source code collection for public download rather than requesting ransom or demanding payment.
Several samples were included in the forum thread, allowing researchers to validate the structure of the leaked repositories. These samples included directory trees of internal development projects that appear consistent with enterprise-grade ERP software environments. The listing encouraged users to download the material and examine the proprietary code, indicating that the threat actor intends to maximize exposure and potential downstream misuse.
This approach differs from traditional ransomware operations, which focus on encrypting data and demanding payment. Instead, the attacker published the stolen code freely, signaling an intent to damage the company’s intellectual property value and undermine the security of its ERP ecosystem.
National, Legal, and Regulatory Implications
The Nasajon data breach poses considerable regulatory concerns under Brazil’s General Data Protection Law (LGPD). Even if no personal data was included in the leak, Brazilian regulators may still investigate due to the exposure of proprietary code tied to software used across multiple regulated industries. When ERP systems process payroll, tax data, and sensitive financial information, any compromise of their architecture has the potential to impact regulated workflows and client compliance obligations.
In addition, unintended vulnerabilities discovered through leaked source code may facilitate future intrusions that lead to the exposure of customer data. If such downstream risks materialize, regulators may require Nasajon clients to strengthen monitoring, enforce additional access controls, or apply mandatory security updates.
Brazilian authorities generally treat source code exposure as a high impact incident because it can undermine the entire trust model surrounding a software platform used in critical business operations.
Industry Specific Risks
ERP systems sit at the center of business operations. When attackers obtain internal code from an ERP vendor, the risks extend well beyond the vendor itself. For companies relying on Nasajon products, potential implications include:
- Exposure of architectural weaknesses that attackers could use to target ERP deployments
- Increased likelihood of supply chain attacks where malicious actors exploit platform level vulnerabilities
- Potential for customized malware targeting the ERP ecosystem based on reverse engineered code
- Reputational and operational risks for organizations dependent on Nasajon’s software for payroll, auditing, tax compliance, accounting, or employee management
Because ERP software integrates with other internal systems, a compromised platform can act as an entry point for broader corporate network intrusions. Attackers who understand the internal logic of the system can craft exploits that bypass traditional authentication mechanisms or abuse hidden functions.
Supply Chain and Infrastructure Impact
Modern ERP environments rely on interconnected components such as databases, reporting engines, authentication gateways, cloud modules, and internal automation scripts. If source code reveals vulnerabilities in these systems, attackers can design multi stage intrusions that compromise organizations through their ERP layer.
Nasajon’s large customer base means that exploitation of any newly discovered vulnerabilities could have cascading consequences across Brazil. Downstream organizations may face elevated risks of credential theft, financial fraud, unauthorized access to administrative tools, or corruption of financial workflows. Even organizations with strong internal security controls may be affected because vulnerabilities within software can bypass perimeter defenses.
Additionally, any integrations between Nasajon systems and third party services could expose those services to indirect risk, contributing to a broader supply chain threat model.
Mitigation and Response Strategies
Organizations using Nasajon products should take immediate steps to evaluate potential risk exposure from the Nasajon data breach. Recommended actions include:
- Conduct full code integrity verification where applicable, ensuring production systems match legitimate builds
- Review ERP system logs for unusual authentication attempts or unauthorized module loads
- Deploy behavioral monitoring tools to detect anomalous activity rooted in ERP processes
- Perform internal penetration testing focused on ERP integrations and administrative functions
- Rotate credentials and authentication tokens associated with ERP environments
- Implement additional access restrictions for administrative accounts tied to ERP systems
- Ensure endpoint protection tools are updated; organizations may also scan devices using Malwarebytes to detect potential malicious activity related to exploitation attempts
- Evaluate all ERP related third party integrations for inherited risks
If Nasajon issues security patches or updated builds, organizations should apply them immediately. Clients should also monitor threat intelligence sources for reports of newly discovered vulnerabilities derived from the leaked code.
Long Term and Global Implications
The Nasajon data breach underscores significant global risks tied to the exposure of proprietary source code for enterprise software. Once code is publicly leaked, it becomes permanent attack fuel for cybercriminals, researchers, and competitors. Attackers may spend months or years reviewing the material to identify weaknesses. These discoveries can surface as targeted exploits, supply chain attacks, and system level compromises affecting businesses that rely on ERP infrastructure to manage finances, human resources, taxation, and regulatory compliance.
For enterprise software vendors, this breach serves as a reminder of the critical need for robust access controls, secure development practices, encrypted source repositories, and segmented internal networks. For businesses dependent on third party ERP platforms, it highlights the importance of understanding vendor security posture and preparing for the possibility of platform level compromise.
For verified coverage of major data breaches and the latest cybersecurity threats, visit Botcrawl for ongoing updates and expert analysis.
- GitHub Data Breach Confirmed After Poisoned VS Code Extension Exfiltrates Internal Repositories
- Vodafone Data Breach Claim Follows LAPSUS$ Data Leak
- Udemy Data Breach Resurfaces as 1.4M Records Circulate on Forum
- ClickUp Data Leak Shows $4B Came Before Customer Security for Over a Year
- Rheem Manufacturing Data Breach Claim Follows Reported INC Ransom Listing
Sean Doyle
Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.










