Sent Doesn't Mean Gone: Why 'Revoke Access' Is a Finance Game-Changer
In February 2025, Bybit — one of the world's largest cryptocurrency exchanges — lost $1.5 billion in Ethereum in a single attack. But the Lazarus Group didn't crack the blockchain: Instead, they exploited the people and workflows surrounding it using social engineering, compromised internal communications, and a manipulated interface that made a malicious transaction look routine.
It was the largest crypto heist in recorded history, and it wasn't even the most instructive breach of the year.
That distinction belongs to an incident that didn't involve a single line of blockchain code. Overseas support agents at a major U.S. crypto exchange were bribed to access customer service tools and exfiltrate names, home addresses, masked Social Security numbers, government-issued IDs, and account balances for tens of thousands of customers. Attackers used that data to impersonate the exchange and social-engineer victims out of their remaining holdings. The estimated financial exposure was up to $400 million.
You might expect such an attack to be caused by a smart contract or a cracked wallet, but this wasn't the case. The breach traveled through the operational layer: Email threads, support tools like Zendesk, and Know Your Customer (KYC) documents that financial services organizations handle every single day.
By the end of the first half of 2025, nearly $1.93 billion had been stolen in crypto-related crimes — more than all of 2024. Phishing attacks targeting crypto users were up 40% year over year. Email compromise remained the number-one initial access method across the industry.
The threat is not where most security teams are looking.
The Off-Chain Blind Spot
The Federal Reserve has identified five distinct risk areas posed by crypto assets:
-
Technology and operations risks
-
AML/CFT (anti-money laundering/countering the financing of terrorism) risks
-
Consumer protection risks
-
Legal compliance risks
-
Financial stability risks
What's striking is how many of them live entirely off-chain. Technology and operations risk: cybersecurity vulnerabilities in employee workflows. Consumer protection risk: unauthorized access to customer PII. Legal compliance risk: the inability to demonstrate data governance to regulators. These are entirely disconnected from the blockchain itself.
Yet crypto firms continue to invest disproportionately in on-chain security like multi-signature wallets, hardware security modules, and smart contract audits. These investments are necessary — Bybit proves that. But they don't protect the KYC documents emailed to compliance teams. They don't secure the customer service thread containing a wallet address and transaction history. They don't cover the internal AML investigation file shared across four reviewers.
The operational layer — email, file sharing, employee communications — is where sensitive financial data lives much of the time. It's also where security investment remains thinnest.
Why Encrypting at Delivery Isn't Enough
The instinctive response to this gap is encryption. Encryption matters. But standard email encryption or TLS-in-transit protection answers only one question: was this data protected when it was sent?
It doesn't answer the questions that follow.
-
What happens when a file is forwarded to someone who shouldn't have it?
-
What happens when an employee is terminated — or worse, bribed?
-
What if a laptop is stolen six months after a sensitive file was downloaded to it?
-
What if a deal collapses and the counterparty still has access to your client's financial projections?
Encryption without revocation is a lock you can never change after the key is handed out. In financial services — where GLBA, the FTC Safeguards Rule, FINRA requirements, and emerging crypto-specific mandates require demonstrated, active control over full data lifecycles, not just the lifecycle of data until it leaves your organization. Full-lifecycle data audit is what regulators are increasingly asking organizations to document.
What "Revoke" Actually Means
Revoke is not a permission setting on a shared drive, or simply encrypting an outbound email. Data-centric revocation means protection is bound to the file itself. The file carries its own access policy wherever it goes — across email, cloud storage, a hard drive, a forwarded attachment chain.
When you can truly revoke access, you are disabling the decryption key at the source. The file becomes unreadable instantly, regardless of where it lives or how many copies exist. Protection travels with the data — from the first mile to the last mile.
The scenarios where this matters aren't hypothetical:
- A wealth manager sends a confidential portfolio analysis to the wrong client contact. Access revoked before it's opened.
- An investment banker shares a deal package with a prospective buyer. The deal falls through. Access revoked.
- A compliance officer shares an AML case file for peer review. The reviewer leaves the firm. Access terminated on offboarding.
- A support agent's device is flagged as compromised. Every encrypted file they ever accessed is locked down immediately — without touching a single downstream server.
The common thread here is that security does not end with delivery. It persists across the data's full lifecycle.
Here's what Virtru's revoke function looks like in practice — easy for users and admins alike to take back an email sent in error.

Why Cryptocurrency Companies Need Recall
For digital asset firms, the attack surface for operational data is unusually broad — and the consequences of exposure are unusually severe.
Unlike a fraudulent credit card transaction, a crypto transfer cannot be reversed. Once funds move, they move permanently. That irreversibility makes the data layer — the information that enables social engineering and account takeover — more valuable to attackers, and more dangerous in the wrong hands.
Consider what a typical day of operational data looks like at a crypto exchange:
- KYC onboarding: Customers submit passports, utility bills, tax forms, and proof of address. These documents travel via email and file-sharing workflows before they're ingested into compliance systems.
- Customer support: Agents discuss balances, transaction histories, and wallet addresses in email and support platforms.
- AML investigations: Compliance teams share case files on suspicious activity across internal reviewers and sometimes external counsel.
- Institutional sales and counterparty communications: Business development teams share sensitive term sheets, client lists, and account structures with partners and prospects.
Every one of these workflows generates files and emails that — once sent — can be forwarded, downloaded, and stored beyond the sender's control, unless protection travels with them. Also consider the likelihood that one of these external parties gets their email compromised. Whether it's this year or years down the road, if sensitive information remains stored in their inbox, it's
The Bybit breach began with social engineering of internal staff. The unnamed exchange breach that cost up to $400 million began with bribed agents accessing operational tooling. In both cases, the exploitation pathway ran directly through the communications layer. The data didn't need to be stolen from a blockchain. It was sitting in email, waiting.
A practical evolution underway in 2025–2026 is the normalization of wallet-risk scoring and counterparty analytics as standard AML controls. These are, of course, important to ensure the protection of digital assets. But even the most sophisticated on-chain monitoring does nothing to protect the case file emailed to outside counsel, or the customer identity document a compromised employee forwards to an attacker.
Compliance as a Forcing Function
Regulators are paying attention. The Federal Reserve's risk framework explicitly flags technology and operations risk and consumer protection risk as areas of distinct exposure for crypto firms. Emerging crypto-specific mandates are moving in the same direction as GLBA and the FTC Safeguards Rule: Toward requirements for demonstrated, active data governance, beyond just encryption at rest.
Audit trails make a difference. If a regulator asks whether customer PII was protected during an infrastructure incident, "we used TLS" is not a satisfying answer. A documented audit trail, showing every access event, every forwarding action, and the precise timestamp when access was revoked, is a different conversation entirely.
With Virtru, that audit trail is generated automatically. It documents who accessed what, when, and from where, as well as when access was terminated. For a compliance team managing AML obligations, consumer protection requirements, and the reputational weight of a breach, that log is a differentiation and a genuine life-saver.
Virtru: Security That Works Inside Your Existing FinTech Stack, for Data Shared Outside the Enterprise
One persistent objection to data-centric security is friction: if protecting files requires a new platform, a new workflow, or staff retraining, adoption collapses. Security that slows operations doesn't get used. Security that doesn't get used doesn't protect anything.
Virtru is built for integration, not replacement. It works natively inside Google Workspace and Microsoft 365 — the environments your teams already use. Encrypting a KYC document, setting an expiration on a sensitive email, or revoking access to a file shared last quarter doesn't require a new system. It requires a single click inside the tools your compliance and support teams open every morning.
Security should empower teams, not stifle productivity. For financial services organizations operating in a threat environment where nearly $2 billion was stolen in the span of six months, the urgency of secure collaboration couldn't be higher.
The Question Your Security Stack Should Be Able to Answer
The question for financial services security leaders isn't whether operational data needs protection. The breaches have answered that. The question is whether your current stack gives you a kill switch — the ability to revoke access to any file or email you've ever sent, instantly, from anywhere, regardless of where it now lives.
If the answer is no, request a demo to see how Virtru closes that gap for crypto exchanges, fintechs, and financial services organizations operating at the intersection of high-value data and irreversible consequences.
Frequently Asked Questions
FAQs on Recalling and Revoking Data Access in FinServ and Crypto
Revoking file access means disabling a recipient's ability to open or decrypt a file after it has already been shared — regardless of where the file is stored. Unlike removing a shared link, true revocation works at the data level, making the file unreadable on any device, in any location, the moment access is withdrawn.
Most crypto breaches don't target the blockchain — they target the operational layer around it. Customer KYC documents, support communications, AML case files, and employee emails are often shared with minimal protection. Attackers exploit these workflows through phishing, insider threats, and social engineering, gaining access to sensitive customer data without ever touching on-chain infrastructure.
Standard email encryption protects data in transit but surrenders control once the message is delivered. Data-centric security keeps protection bound to the file or message itself, so the sender retains the ability to revoke access, set expiration dates, and track who opened the content — even after it has been downloaded, forwarded, or stored on a third-party device.
Several regulations require financial services firms to demonstrate ongoing governance over sensitive data, not just point-of-delivery encryption. These include the Gramm-Leach-Bliley Act (GLBA), the FTC Safeguards Rule, FINRA requirements, and PCI DSS. The Federal Reserve has also identified technology and operations risk and consumer protection risk as distinct categories of exposure for crypto firms, both of which implicate post-delivery data control.
Yes — with a data-centric encryption platform like Virtru, you can revoke access to an email or attachment after delivery. The encryption travels with the message rather than residing on the mail server, so revoking access disables decryption for the recipient immediately, even if they have already downloaded or forwarded the attachment.
On-chain security protects blockchain transactions, smart contracts, and digital wallets. Off-chain security covers the operational data surrounding those assets — customer identity documents, account communications, compliance records, and internal investigations. Most crypto firms invest heavily in on-chain protections but leave off-chain workflows underprotected, which is where the majority of high-profile operational breaches originate.
Editorial Team
The editorial team consists of Virtru brand experts, content editors, and vetted field authorities. We ensure quality, accuracy, and integrity through robust editorial oversight, review, and optimization of content from trusted sources, including use of generative AI tools.
View more posts by Editorial TeamSee Virtru In Action
Sign Up for the Virtru Newsletter
Dive Deeper

"This Message Will Self-Destruct": Secure Document Sharing With an Access Kill Switch

Email Encryption for Banks: What CISOs Need to Know in 2026
/blog%20-%20anthropic%20boat/anthropic-boat.webp)
Mythos Is a "Walls Crumbling" Moment — And We're Gonna Need a Smaller Boat
/blog%20-%20mythos%20john/ai-john-mythos.webp)
Anthropic Just Proved What We've Been Saying: Security Has to Start with the Data
/blog%20-%20pubsec%20AI/pubsecAI.webp)
Public-Sector AI Needs Secure, Controlled Collaboration
/blog%20-%20RSA%202026/RSA-BLOG.webp)
RSA 2026: Hope, Hype, and a 20-Year Unsolved Problem

DCS in Action: How Virtru and the Trusted Data Format Power the Mission

Policy Foundations & Strategic Guidance: Data-Centric Security as a Mission Force Multiplier

The Splinternet Problem Has One Solution: Data Interoperability

Beyond Blockchain: Why Operational Data Security Is Crucial in Crypto
Book a Demo
Become a Partner
Contact us to learn more about our partnership opportunities.
Become a Compliance Champion
Contact us to learn more about our partnership opportunities.