en

AES-256 and Auth Module Security Assessment

Client:
HIDEEZ — a developer of digital identity solutions
Industry:
Healthcare
Focus:
Protecting personal and corporate data for B2B users
Main challenge:
Security verification of a custom AES-256 encryption implementation and authentication mechanism prior to new product release
Market:
Ukraine, with a focus on international B2B markets
Services provided:
White-box pentest, Security code review, SAST & DAST
Key Takeaways
  • Reduced crypto risk to low level pre-release
  • Fixed critical issue in under 48 hours
  • Identified 6 vulnerabilities: 1 critical, 2 medium, 3 low
  • Conducted a white-box pentest of cryptography and authentication mechanisms
  • Implemented recommendations based on OWASP ASVS
  • 48
    hours to fix a critical vulnerability
    6
    vulnerabilities identified and resolved
    3
    weeks total project duration
    AES-256 and Auth Module Security Assessment
    Can encryption and authentication mechanisms be production-ready in just 3 weeks? Yes! HIDEEZ turned to Datami to assess its custom solutions — AES-256 encryption and authentication modules. Datami’s experts conducted a white-box pentest, identified critical vulnerabilities, and helped reduce the risk of data compromise to a low level.

    HIDEEZ is a Ukrainian small and medium-sized enterprise (SME) that develops innovative digital identity solutions. Its product lineup includes wearable devices and software components for authentication, tailored for a B2B audience.

    Operating in a high-risk cybersecurity domain and handling both personal and corporate data, HIDEEZ considers security a critical factor in maintaining customer trust.

     

    Objectives and Challenges
    HIDEEZ initiated a security review of its encryption and authentication system ahead of a major product update to validate the robustness of its custom AES-256 encryption and authentication implementation.
     
    The project aimed to identify vulnerabilities, assess security risks, and verify the resilience of critical system components.
     
    • Conduct a white-box pentest with access to the source code of the encryption and authentication modules
    • Perform static application security testing (SAST) and dynamic application security testing (DAST) with a focus on cryptographic mechanisms
    • Deliver a comprehensive report detailing identified vulnerabilities and technical recommendations for strengthening system security
    icon
    Pentest execution
    White-box testing of cryptographic and authentication components
    icon
    Vulnerability identification
    SAST code analysis, DAST testing, and manual attack simulation
    icon
    Report and recommendations
    Detailed risk descriptions and technical recommendations for security improvement
    Our approach

    Datami conducted a targeted security assessment of HIDEEZ’s encryption and authentication modules, analyzing source code and authorization logic.

    The primary method was a white-box pentest, in which the team had access to source code to review critical components in depth.

    We combined static code analysis using tools, manual functionality auditing, attack simulation, and thorough encryption verification.

    Despite limited access to only parts of the codebase, the team successfully identified significant vulnerabilities and proposed effective improvements.

    White-box
    White-box
    Testing was performed with full access to the source code, enabling realistic attack simulations and providing an objective view of the product’s security posture.
    Key project stages and solutions

    During the project, Datami analyzed the provided fragments of HIDEEZ’s source code, focusing on encryption and authentication. Reviewing the authorization logic and cryptographic implementation helped identify critical risk areas.

    Due to limited access, the team created a simulated environment and adapted the testing process without requiring full product deployment.

    • Preparation
      Review of source code, clarification of technical details, creation of a simulation environment, and planning of test scenarios focused on cryptography and AES-256-related authentication risks.
    • Testing
      White-box pentest using Graudit, Burp Suite, custom scripts, SAST analysis, decompilation, and manual attack simulation to identify weaknesses in encryption and authorization logic.
    • Analysis and reporting
      A detailed report outlining identified vulnerabilities, risk assessments, and recommendations for enhancing security.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results and recommendations
    Results and recommendations

    Before the project began, the security level of the HIDEEZ product was assessed as high risk due to insufficient review of custom encryption and authentication implementations.

    During the white-box pentest, the Datami team identified 6 vulnerabilities: 1 critical (in data encryption), 2 medium (in authentication logic), and 3 low (e.g., hardcoded values in the code).

    HIDEEZ received clear recommendations to enhance security:

    1. updating the cryptographic library and improving the AES-256 implementation;
    2. reviewing the security of API calls and eliminating potential vulnerabilities;
    3. conducting regular code reviews and integrating SAST into CI/CD processes.

    After implementing the recommendations, the risk level was reduced from high to low. The successful security optimization helped avoid potential data leaks and reputational damage.

    The project was completed in 3 weeks instead of the typical 4–5. The critical vulnerability was resolved by the client in under 48 hours.

    Our certificates
    Key project outcomes

    Thanks to Datami, HIDEEZ received a targeted security testing of its cryptographic mechanisms and authentication systems in just 3 weeks.

    During the project, the submitted code was reviewed prior to release, and 6 vulnerabilities were identified. The implemented recommendations reduced the risk level from high to low. All tasks were completed on time.

    The case study demonstrates that even cybersecurity companies need independent audits.

    Aspect
    Before the project
    After implementation
    Security status
    High risk due to untested encryption modules
    Risk level reduced to low after implementing changes
    Account compromise
    Potential risk due to authentication logic
    Reduced after updating algorithms and validation mechanisms
    Security compliance
    Partial alignment with OWASP security standards
    OWASP ASVS practices implemented, access control strengthened
    Timeline
    Market average: 4–5 weeks
    Completed in 3 weeks
    More success stories with Datami
    Browse other project case studies
    Mobile App Security Outstaff Audit

    Mobile App Security Outstaff Audit

    • Identified dangerous configurations and data leaks
    • Strengthened security before product launch
    Services:
     
    Nov 20, 2025
    Security Policy Audit for a Fintech Company

    Security Policy Audit for a Fintech Company

    • Seven key cybersecurity policies were reviewed and assessed
    • Regulations aligned with ISO 27001, DORA, GDPR, and NBG
    Services:
    Security policy and compliance audit
    Nov 20, 2025
    Security Testing of the DonorUA Medical Platform

    Security Testing of the DonorUA Medical Platform

    • A report with recommendations for strengthening security was provided.
    • No critical security threats were confirmed.
    Services:
    Web application pentest (Black-box)
    Nov 18, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    KillSec Ransomware Attacks Healthcare Datami Newsroom
    Datami Newsroom

    KillSec Ransomware Attacks Healthcare

    The hacker group KillSec has recently been actively attacking the IT systems of the healthcare sector in Latin America and other countries — the attackers have already stolen dozens of gigabytes and nearly 95,000 files.

    Nov 18, 2025
    Datami at MERGE Madrid and EBC 25 Datami Newsroom
    Datami Newsroom

    Datami at MERGE Madrid and EBC 25

    The Datami team attended MERGE Madrid and the European Blockchain Convention 2025 to share their expertise and witness how Web3 is evolving. This year, the focus shifted toward real-world solutions – security, auditing, and transparent standards.

    Nov 13, 2025 3 min
    Cyberattack Types Oleksandr Filipov: Security engineer at Datami, author of articles
    Oleksandr Filipov: Security engineer at Datami, author of articles

    Cyberattack Types

    To effectively protect data and systems, it is important to understand what types of cyberattacks exist and how they work. In this article, we will look at the main types of attacks and figure out how to protect your business from them.

    Nov 6, 2025 15 min
    Order a free consultation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy