A regional distribution company wholesales food products within one of Ukraine’s oblasts. Around 150 employees are involved in the client's digital infrastructure.
The specifics of the industry and the processing of confidential data make security a critically important issue for the company.
Datami performed black-box testing with elements of Red Teaming. The assessment covered office infrastructure, Wi-Fi network, web resource, and subdomains. A standard toolset was used, including both automated and manual testing methods.
The team simulated an attack without access to the company’s internal systems. Special attention was given to Wi-Fi, authentication, access control, as well as the detection of weak passwords and default configurations that could be exploited by attackers.
During project implementation, the Datami team focused on an effective testing model, following a defined structure.
After thorough preparation for the assessment of the targets, we simulated an attack, scanned the network and web resources.
Based on the discovery and analysis of identified vulnerabilities, a report with recommendations to enhance security was prepared.
Every
At the start of the project, the client’s digital infrastructure had several hidden weak points. Although the overall risk level was initially assessed as low, the Datami team identified 21 vulnerabilities during the black-box penetration test — including entry points into the internal network via weak passwords and default configurations.
During a simulated attack, the team successfully cracked the office Wi-Fi password, which allowed scanning of the internal network. In the Afterlogic system, the testers discovered a default account that granted access to internal resources.
Based on the test results, the client was advised to:
The project was completed within the planned timeframe. Thanks to timely security testing, the identified vulnerabilities did not result in any critical incidents.
Thanks to the scheduled assessment, the company received an objective view of its cybersecurity posture and actionable recommendations for strengthening the protection of its infrastructure and digital assets.
Datami identified 8 medium, 12 low, and 1 informational vulnerability — this case study confirms the effectiveness and relevance of scheduled security assessments, even for companies with an apparently stable situation.
Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.
Among internet users, a long-standing myth has taken hold: if a website has the HTTPS mark - that is, a padlock in the address bar and the letter S after “http” - it means the resource is safe and trustworthy. But in reality, the situation is much more co
Did you know that an ordinary calendar can become a tool for a hacker attack? Google researchers discovered that the hacker group APT41 is using Google Calendar to send commands to infected systems.