en

Banking Security Audit Across Digital Channels

Client:
A major financial institution serving over 500,000 clients
Industry:
Finance
Focus:
Protection of personal, financial, and corporate data across mobile applications, web portals, and internal infrastructure
Main challenge:
Assessing the resilience of digital services against attacks, safeguarding sensitive data, and ensuring compliance with international security standards
Market:
Georgia
Services provided:
Security Code Review, Black-box and Gray-box Pen Testing
Key Takeaways
  • Strengthened security of web, mobile, and APIs
  • Prevented potential DoS and found 106 issues
  • Pentest and Code Review were conducted for digital services
  • A detailed report and practical recommendations were provided to enhance security and ensure compliance with PCI DSS and ISO/IEC 27001 standards.
  • 48 hours
    from detection to remediation
    7
    critical vulnerabilities identified
    1
    DoS attack anticipated and blocked
    Banking Security Audit Across Digital Channels
    How resilient are banking services to modern cyberattacks? To find out, a major financial institution turned to Datami for a comprehensive penetration test and code review. The result: 106 vulnerabilities identified and a potential DoS attack on the call center successfully blocked.

    A major financial institution in Georgia serves over 500,000 clients through mobile applications, web portals, and APIs. The company handles sensitive data and operates in a regulated industry governed by PCI DSS and ISO/IEC 27001 standards.

    Information security is critical to preventing data leaks, financial fraud, and unauthorized access, while regular security assessments help strengthen cyber resilience.

     

    Objectives and challenges
    The banking institution initiated a scheduled security assessment to evaluate the resilience of its digital services against attacks and ensure compliance with regulatory standards, particularly PCI DSS and ISO/IEC 27001.

    The project's goal was to identify vulnerabilities, assess cyber threat risks, and strengthen the protection of personal, financial, and corporate data.
     
    • Conducting black-box and gray-box penetration testing of client-facing web portals, mobile applications, APIs, a POS terminal, and part of the internal IT infrastructure.
    • Performing a code review of critical components to verify business logic, authentication mechanisms, and module interactions.
    • Assessing configurations, identifying vulnerabilities, determining risk levels, providing recommendations, and validating compliance with security standards.
    icon
    Penetration Testing & Security Code Review
    Web portals, mobile applications, APIs, POS terminal, and internal network
    icon
    Risk Analysis
    Risk assessment, logic flaws, and configuration weaknesses
    icon
    Report & Recommendations
    Vulnerability descriptions, risk levels, and remediation steps
    Our approach

    Before testing, we analyzed the client’s technical documentation to accurately model potential threats.

    The team conducted black-box and gray-box penetration testing of the bank’s key digital services, along with Security Code Review of selected components. Datami tested web portals, mobile applications, APIs, internal infrastructure, and POS terminals.

    We combined automated scanners with manual testing, applying OWASP Top 10, MITM analysis, fuzzing, and custom scripts. We assessed configurations, authorization mechanisms, and component interactions with partial access to the client’s infrastructure, simulating the most likely attack vectors in a real-world environment.

    Black-box
    Black-box
    External testing without access to internal information — simulated attacks by third parties or hackers with no access rights.
    Gray-box
    Gray-box
    Partial access allowed us to examine internal system logic, identify vulnerabilities in APIs, mobile applications, and service configurations.
    Main project stages and solutions

    Throughout the process, Datami adapted the work plan to fit the specifics of the infrastructure, delays in access provisioning, and newly added testing targets that emerged after the project began.

    The team rotated IP addresses during scanning to avoid being blocked. Temporary privilege escalation was approved, and tunnels were created through restricted zones to reach isolated systems.

    • Preparation:
      Collection of technical information and documentation analysis, confirmation of testing targets, and development of a plan tailored to the specifics of a regulated industry.
    • Testing:
      Penetration Testing (black-box and gray-box) of digital services — including mobile applications, APIs, web portals, POS terminals, and parts of the internal network. Security Code Review focused on logic, authorization, and inter-module interactions.
    • Analysis & reporting:
      Risk assessment, issue prioritization, and creation of a detailed report with actionable recommendations for vulnerability remediation and security enhancement.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results and recommendations
    Results and recommendations

    Before the project, the client had a fairly secure system, but testing revealed a number of critical and high-risk issues, including the absence of CAPTCHA and DoS protection, weak security event monitoring, and vulnerable access points via APIs.

    The Datami team identified 106 vulnerabilities: 7 critical, 15 high, 44 medium, 36 low, and 4 informational. Among them, a potential DoS attack on the call center — through mass creation of callback requests — was discovered and blocked.

    The client promptly implemented initial measures: part of the issues was resolved within 48 hours.

    1. implement CAPTCHA and rate limiting on critical interface elements;
    2. improve logging and security monitoring;
    3. review access policies for APIs;
    4. regularly update the protection system in accordance with PCI DSS and ISO/IEC 27001.

    Due to the scale and complexity of the infrastructure, the project lasted 5 months, including additional targets that appeared during the course of work.

    Our certificates
    Key project outcomes

    The project helped the banking institution timely identify critical vulnerabilities, prevent a DoS attack on the call center, and strengthen the protection of client-facing services.

    The client received an in-depth security assessment and practical recommendations from Datami on how to eliminate vulnerabilities and enhance cybersecurity.

    This case study confirms: even well-protected financial companies require regular penetration testing and security code review to reduce risks and stay compliant.

    Direction
    Before the project
    After implementation
    Security posture
    Partial security coverage, no in-depth analysis
    106 vulnerabilities identified, remediation plan created
    Critical vulnerabilities
    Potential DoS, risks via API, and feedback form
    7 critical threats, some resolved within 48 hours
    Account compromise
    Risk of call center disruption, data leakage due to weak traffic limits
    Rate limiting implemented, monitoring and logging recommendations provided
    Security compliance
    Partial compliance with PCI DSS and ISO/IEC 27001 standards
    Technical report and action plan provided for full compliance
    Timeline
    Planned: 5 months
    Tasks completed on schedule despite increased project scope
    More success stories with Datami
    Browse other project case studies
    DDoS Protection and 24/7 Cyber Monitoring

    DDoS Protection and 24/7 Cyber Monitoring

    • Implemented the DataGuard solution based on Cloudflare to protect the website
    • Established reliable protection against DDoS attacks and bot traffic
    Services:
    Implementation of DataGuard and Cloudflare, 24/7 monitoring
    Aug 8, 2025
    Website Protection from DDoS Attacks

    Website Protection from DDoS Attacks

    • Implemented the DataGuard solution for website protection
    • DDoS protection deployed within 3 days
    Services:
    Website protection with DataGuard (Cloudflare), continuous monitoring, Cloudflare infrastructure management
    Aug 8, 2025
    Protection of E-commerce Websites From DDoS via DataGuard

    Protection of E-commerce Websites From DDoS via DataGuard

    • Implemented DataGuard to protect from DDoS attacks
    • Enabled rapid incident response
    Services:
    24/7 cybersecurity monitoring, integration with Cloudflare
     
    Aug 7, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s Datami Newsroom
    Datami Newsroom

    Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s

    Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.

    Sep 5, 2025 2 min
    The Myth of HTTPS Reliability: How Encryption Can Mislead Users Datami Newsroom
    Datami Newsroom

    The Myth of HTTPS Reliability: How Encryption Can Mislead Users

    Among internet users, a long-standing myth has taken hold: if a website has the HTTPS mark - that is, a padlock in the address bar and the letter S after “http” - it means the resource is safe and trustworthy. But in reality, the situation is much more co

    Sep 3, 2025 3 min
    Dangerous Calendar: A New Tool for Phishing Attacks Datami Newsroom
    Datami Newsroom

    Dangerous Calendar: A New Tool for Phishing Attacks

    Did you know that an ordinary calendar can become a tool for a hacker attack? Google researchers discovered that the hacker group APT41 is using Google Calendar to send commands to infected systems.

    Sep 2, 2025 3 min
    Order a free consultation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy