en

Preparation of the Platform for Regulatory Audit

Client:
Mid-sized fintech company
Industry:
FinTech
Focus:
Testing of the KYC module and compliance with AML/KYC, GDPR, and PCI DSS
Main challenge:
Verification reliability testing, and preparation for a regulatory audit
Market:
International – EU and Eastern Europe
Services provided:
API, web, and mobile application pentest (Gray-Box)
Key Takeaways
  • The risk of KYC bypass was reduced from high to low.
  • A rate limit and an AI module for deepfake detection were implemented.
  • A Gray-box pentest of web and mobile applications, KYC, and API was conducted.
  • 12 vulnerabilities were identified: 3 critical, 5 medium, and 4 low.
  • Critical threats were eliminated in less than 72 hours.
  • 12
    vulnerabilities identified
    80%
    increase in attack resilience
    72
    hours to eliminate threats
    Preparation of the Platform for Regulatory Audit
    The company recorded suspicious attempts to bypass KYC and turned to Datami to verify the reliability of document verification before the regulatory audit. During the pentest, 12 vulnerabilities were identified and eliminated – the platform achieved full compliance with fintech security standards.

    The fintech company operates in the international market of the EU and Eastern Europe, providing users with a platform for online payments and digital wallets.

    The security of KYC processes is critically important, as the business handles large volumes of personal and financial data and must comply with GDPR, PCI DSS, and AML/KYC standards.

    Tasks and challenges
    Before undergoing a regulatory audit, the company recorded suspicious attempts to bypass KYC, which could have caused data theft or money laundering.

    To verify the reliability of document verification and the protection of personal data, it turned to Datami for comprehensive security testing.
     
    • To check the possibility of bypassing KYC through forged documents or photos.
    • To conduct a Gray-box pentest of the KYC backend API, mobile, and web application.
    • To provide a report with PoC and recommendations for conformity to security standards.
    icon
    Verification testing
    KYC module testing: documents, selfies and videos (replay, deepfake, biometrics)
    icon
    Vulnerability discovery
    Gray-box pentest of backend API, web and mobile applications for threats
    icon
    Compliance with standards
    PoC report with risk descriptions and technical recommendations for AML, GDPR and PCI DSS
    Our approach

    To assess the resilience of verification processes, Datami specialists conducted a targeted review of the KYC module: they examined the architecture, test accounts, and APIs using a Gray-box approach.

    For this case study, they used automated scanners and manual testing: OCR analysis, deepfake simulations, authorization, and API logic testing using Burp Suite, MobSF, and custom scripts.

    Gray-box
    Gray-Box
    Penetration testing with limited access to test accounts and documentation for realistic attack modeling.
     
    Key stages of work and solutions

    To avoid disrupting platform users, Datami specialists worked in a clear sequence. After agreeing on key details, they carried out automated and manual testing.

    Based on the assessment results, the client received a detailed PoC report with evidence of vulnerabilities, risk levels, and technical recommendations for compliance with security standards.

    • Preparation
      Analysis of the KYC architecture, agreement on rate limits, creation of test accounts and test data, and planning verification scenarios.
    • Testing
      Scanning the API, web, and mobile applications, manual modeling of KYC bypasses using forged documents, and verification of API logic.
    • PoC report
      Preparation of a report describing vulnerabilities, evidence of their exploitation, and technical recommendations to improve security.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results and recommendations
    Results and recommendations

    During the fintech platform pentest, the Datami team identified 12 vulnerabilities in the KYC module: 3 critical, 5 medium, and 4 low. The most serious issues – document reuse, lack of rate limiting in the KYC API, and weak video verification – were fixed within 72 hours.

    Following the cybersecurity assessment, the client received recommendations to:

    • conduct an annual KYC audit;

    • implement document uniqueness verification;

    • maintain API rate limiting;

    • update security policies;

    • use AI modules for deepfake detection.

    After implementing the updates, the risk of fraud decreased from high to low, and system resilience increased by 80%. The platform achieved full compliance with AML/KYC, GDPR, and PCI DSS standards, avoiding fines and a negative audit outcome.

    Our certificates
    Key project results

    For fintech companies, cybersecurity assessment is extremely important, as vulnerabilities can lead to serious losses: data leaks, fines, theft, or money laundering.

    As this case study demonstrates, the pentest allowed the client to proactively eliminate threats, enhance attack resilience, and achieve compliance with security standards. Datami’s recommendations helped the fintech company successfully pass the audit and avoid penalties.

    Direction
    Before the project
    After implementation
    Risk level
    High – possible KYC bypass, document reuse
    Low – threats eliminated, processes secured
    KYC security
    Insufficient control of documents and video verification
    Enhanced document verification, an AI module for deepfake detection added
    Vulnerabilities
    12 identified, including 3 critical
    All eliminated
    System resilience
    Vulnerable to replay attacks and forgeries
    Increased by 80%
    Standards compliance
    Partial
    Full compliance with AML/KYC, GDPR, and PCI DSS
    More success stories with Datami
    Browse other project case studies
    Preparing a smart contract for release on Web3

    Preparing a smart contract for release on Web3

    • The code was prepared for certification.
    • The project was secured against 99% of known threats.
    Services:
    Smart contract audit (White-box source code review)
    Sep 16, 2025
    Web3 Project Random Walk: Smart Contract Audit

    Web3 Project Random Walk: Smart Contract Audit

    • Secure launch on Polygon mainnet ensured within 5 days
    • Risk level reduced from medium to minimal
    Services:
    Smart contract audit (White-Box source code analysis)
    Sep 2, 2025
    Smart Contract Audit of a Web3 Company

    Smart Contract Audit of a Web3 Company

    • The product was prepared for a secure market launch.
    • The risk was reduced from high to minimal.
    Services:
    Smart contract audit (White-box source code analysis)
    Aug 20, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    Datami Took Part in CV Summit 2025 Datami Newsroom
    Datami Newsroom

    Datami Took Part in CV Summit 2025

    CV Summit 2025 brought together leaders in fintech, blockchain, and artificial intelligence in Switzerland. The Datami team participated in the global dialogue on how technology is shaping the new financial landscape.

    Oct 10, 2025 3 min
    Web Applications Penetration Testing: A Pentest Guide Oleksandr Filipov: Security engineer at Datami, author of articles
    Oleksandr Filipov: Security engineer at Datami, author of articles

    Web Applications Penetration Testing: A Pentest Guide

    Web applications are targeted by attacks every day - from simple scanners to deliberate breaches. To understand how vulnerable a web application is and how to protect it from hackers’ actions, a special assessment is conducted - penetration testing (pente

    Oct 1, 2025
    Microsoft enables email bombing protection Datami Newsroom
    Datami Newsroom

    Microsoft enables email bombing protection

    Microsoft announced a new update to Defender for Office 365 that automatically detects and blocks email bombing attacks. The rollout started in June, and most users will receive the feature by mid-July 2025.

    Sep 12, 2025 3 min
    Order a free consultation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy