en

Case Study: Comprehensive Security Assessment for a Large Financial Institution

Client:
A major financial institution serving over 500,000 clients
Industry:
Finance
Focus:
Protection of personal, financial, and corporate data across mobile applications, web portals, and internal infrastructure
Main challenge:
Assessing the resilience of digital services against attacks, safeguarding sensitive data, and ensuring compliance with international security standards
Market:
Georgia
Services provided:
Security Code Review, Penetration Testing (Black-box and Gray-box) of web portals, mobile applications, APIs, POS terminals, and parts of the internal network;
Key Takeaways
  • Pentest and Code Review were conducted for digital services
  • 106 vulnerabilities were identified, including a DoS attack threat targeting the call center.
  • Web portals, mobile applications, APIs, POS terminals, and the internal network were tested
  • A detailed report and practical recommendations were provided to enhance security and ensure compliance with PCI DSS and ISO/IEC 27001 standards.
  • 48 hours
    from detection to remediation
    7
    critical vulnerabilities identified
    1
    DoS attack anticipated and blocked
    Case Study: Comprehensive Security Assessment for a Large Financial Institution
    How resilient are banking services to modern cyberattacks? To find out, a major financial institution turned to Datami for a comprehensive penetration test and code review. The result: 106 vulnerabilities identified and a potential DoS attack on the call center successfully blocked.

    A major financial institution in Georgia serves over 500,000 clients through mobile applications, web portals, and APIs. The company handles sensitive data and operates in a regulated industry governed by PCI DSS and ISO/IEC 27001 standards.

    Information security is critical to preventing data leaks, financial fraud, and unauthorized access, while regular security assessments help strengthen cyber resilience.

     

    Objectives and challenges
    The banking institution initiated a scheduled security assessment to evaluate the resilience of its digital services against attacks and ensure compliance with regulatory standards, particularly PCI DSS and ISO/IEC 27001.

    The project's goal was to identify vulnerabilities, assess cyber threat risks, and strengthen the protection of personal, financial, and corporate data.
     
    • Conducting black-box and gray-box penetration testing of client-facing web portals, mobile applications, APIs, a POS terminal, and part of the internal IT infrastructure.
    • Performing a code review of critical components to verify business logic, authentication mechanisms, and module interactions.
    • Assessing configurations, identifying vulnerabilities, determining risk levels, providing recommendations, and validating compliance with security standards.
    icon
    Penetration Testing & Security Code Review
    Web portals, mobile applications, APIs, POS terminal, and internal network
    icon
    Risk Analysis
    Risk assessment, logic flaws, and configuration weaknesses
    icon
    Report & Recommendations
    Vulnerability descriptions, risk levels, and remediation steps
    Our approach

    Before testing, we analyzed the client’s technical documentation to accurately model potential threats.

    The team conducted black-box and gray-box penetration testing of the bank’s key digital services, along with Security Code Review of selected components. Datami tested web portals, mobile applications, APIs, internal infrastructure, and POS terminals.

    We combined automated scanners with manual testing, applying OWASP Top 10, MITM analysis, fuzzing, and custom scripts. We assessed configurations, authorization mechanisms, and component interactions with partial access to the client’s infrastructure, simulating the most likely attack vectors in a real-world environment.

    Black-box
    Black-box
    External testing without access to internal information — simulated attacks by third parties or hackers with no access rights.
    Gray-box
    Gray-box
    Partial access allowed us to examine internal system logic, identify vulnerabilities in APIs, mobile applications, and service configurations.
    Main project stages and solutions

    Throughout the process, Datami adapted the work plan to fit the specifics of the infrastructure, delays in access provisioning, and newly added testing targets that emerged after the project began.

    The team rotated IP addresses during scanning to avoid being blocked. Temporary privilege escalation was approved, and tunnels were created through restricted zones to reach isolated systems.

    • Preparation:
      Collection of technical information and documentation analysis, confirmation of testing targets, and development of a plan tailored to the specifics of a regulated industry.
    • Testing:
      Penetration Testing (black-box and gray-box) of digital services — including mobile applications, APIs, web portals, POS terminals, and parts of the internal network. Security Code Review focused on logic, authorization, and inter-module interactions.
    • Analysis & reporting:
      Risk assessment, issue prioritization, and creation of a detailed report with actionable recommendations for vulnerability remediation and security enhancement.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results and recommendations
    Results and recommendations

    Before the project, the client had a fairly secure system, but testing revealed a number of critical and high-risk issues, including the absence of CAPTCHA and DoS protection, weak security event monitoring, and vulnerable access points via APIs.

    The Datami team identified 106 vulnerabilities: 7 critical, 15 high, 44 medium, 36 low, and 4 informational. Among them, a potential DoS attack on the call center — through mass creation of callback requests — was discovered and blocked.

    The client promptly implemented initial measures: part of the issues was resolved within 48 hours.

    1. implement CAPTCHA and rate limiting on critical interface elements;
    2. improve logging and security monitoring;
    3. review access policies for APIs;
    4. regularly update the protection system in accordance with PCI DSS and ISO/IEC 27001.

    Due to the scale and complexity of the infrastructure, the project lasted 5 months, including additional targets that appeared during the course of work.

    Our certificates
    Key project outcomes

    The project helped the banking institution timely identify critical vulnerabilities, prevent a DoS attack on the call center, and strengthen the protection of client-facing services.

    The client received an in-depth security assessment and practical recommendations from Datami on how to eliminate vulnerabilities and enhance cybersecurity.

    This case study confirms: even well-protected financial companies require regular penetration testing and security code review to reduce risks and stay compliant.

    Direction
    Before the project
    After implementation
    Security posture
    Partial security coverage, no in-depth analysis
    106 vulnerabilities identified, remediation plan created
    Critical vulnerabilities
    Potential DoS, risks via API, and feedback form
    7 critical threats, some resolved within 48 hours
    Account compromise
    Risk of call center disruption, data leakage due to weak traffic limits
    Rate limiting implemented, monitoring and logging recommendations provided
    Security compliance
    Partial compliance with PCI DSS and ISO/IEC 27001 standards
    Technical report and action plan provided for full compliance
    Timeline
    Planned: 5 months
    Tasks completed on schedule despite increased project scope
    More success stories with Datami
    Browse other project case studies
    Case: Scheduled Penetration Testing of Mobile Applications and Internal Network

    Case: Scheduled Penetration Testing of Mobile Applications and Internal Network

    • Critical, medium, and low vulnerabilities were identified in mobile applications and the network
    • Risks were demonstrated through public Wi-Fi access and bypassing network restrictions
    Services:
    Mobile app pentesting, infrastructure penetration testing
    Jun 20, 2025
    Distribution Company Case: Penetration Test with Red Teaming Elements

    Distribution Company Case: Penetration Test with Red Teaming Elements

    • 21 vulnerability identified: 8 medium, 12 low, and 1 informational
    • Simulated internal attack: Wi-Fi password successfully cracked
    Services:
    Black-box penetration test with elements of Red Teaming
    Jun 6, 2025
    Case Fraudline: Scheduled Pentest of a Whistleblowing Platform

    Case Fraudline: Scheduled Pentest of a Whistleblowing Platform

    • Identified 6 technical vulnerabilities: 5 low-risk and 1 informational
    • Performed additional manual testing of business logic
    Services:
    automated gray-box pentest, audit of secure coding practices, additional manual review of business logic
    May 23, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    The Equifax Data Breach: A Preventable Catastrophe Datami Newsroom
    Datami Newsroom

    The Equifax Data Breach: A Preventable Catastrophe

    This incident occurred back in 2017, but cybersecurity experts are still studying it in detail. This case features a series of classic security failures – serving as a clear example of what not to do.

    Jun 30, 2025 3 min
    Unconventional Records: Pentesters Hacked a Tesla in Just 2 Minutes Datami Newsroom
    Datami Newsroom

    Unconventional Records: Pentesters Hacked a Tesla in Just 2 Minutes

    Today, all it takes to take over a car is a computer. That’s exactly what hackers demonstrated at a special competition - they hacked a Tesla in just 120 seconds, and the result became a true sensation.

    Jun 27, 2025 3 min
    Top 5 Reasons to Invest in Penetration Testing in 2025 Datami Newsroom
    Datami Newsroom

    Top 5 Reasons to Invest in Penetration Testing in 2025

    Today, nearly every business is closely connected to the internet: websites, mobile apps, cloud data storage, electronic payments, and more. This brings great convenience, but at the same time, it introduces additional risks and potential financial losses

    Jun 25, 2025 3 min
    Order a free consultation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy