A regional distribution company wholesales food products within one of Ukraine’s oblasts. Around 150 employees are involved in the client's digital infrastructure.
The specifics of the industry and the processing of confidential data make security a critically important issue for the company.
Datami performed black-box testing with elements of Red Teaming. The assessment covered office infrastructure, Wi-Fi network, web resource, and subdomains. A standard toolset was used, including both automated and manual testing methods.
The team simulated an attack without access to the company’s internal systems. Special attention was given to Wi-Fi, authentication, access control, as well as the detection of weak passwords and default configurations that could be exploited by attackers.
During project implementation, the Datami team focused on an effective testing model, following a defined structure.
After thorough preparation for the assessment of the targets, we simulated an attack, scanned the network and web resources.
Based on the discovery and analysis of identified vulnerabilities, a report with recommendations to enhance security was prepared.
Every
At the start of the project, the client’s digital infrastructure had several hidden weak points. Although the overall risk level was initially assessed as low, the Datami team identified 21 vulnerabilities during the black-box penetration test — including entry points into the internal network via weak passwords and default configurations.
During a simulated attack, the team successfully cracked the office Wi-Fi password, which allowed scanning of the internal network. In the Afterlogic system, the testers discovered a default account that granted access to internal resources.
Based on the test results, the client was advised to:
The project was completed within the planned timeframe. Thanks to timely security testing, the identified vulnerabilities did not result in any critical incidents.
Thanks to the scheduled assessment, the company received an objective view of its cybersecurity posture and actionable recommendations for strengthening the protection of its infrastructure and digital assets.
Datami identified 8 medium, 12 low, and 1 informational vulnerability — this case study confirms the effectiveness and relevance of scheduled security assessments, even for companies with an apparently stable situation.
This incident occurred back in 2017, but cybersecurity experts are still studying it in detail. This case features a series of classic security failures – serving as a clear example of what not to do.
Today, all it takes to take over a car is a computer. That’s exactly what hackers demonstrated at a special competition - they hacked a Tesla in just 120 seconds, and the result became a true sensation.
Today, nearly every business is closely connected to the internet: websites, mobile apps, cloud data storage, electronic payments, and more. This brings great convenience, but at the same time, it introduces additional risks and potential financial losses