top of page

Сase study:
Bank

Vulnerability Assessment of Information Systems for a Bank

Client’s Objective

Conduct an external security assessment of the bank’s information systems using the Grey Box testing methodology, and provide a detailed report outlining identified vulnerabilities along with recommendations for remediation.

About the Project

Our ESKA team of cybersecurity experts performed a comprehensive vulnerability assessment for a financial sector organization, identifying critical weaknesses in their systems. Detecting and mitigating these vulnerabilities is vital to prevent potential data breaches and protect sensitive customer information.

By simulating real-world attack scenarios, we help financial institutions discover and remediate security gaps, ensuring the highest level of data protection for their clients.

Protect your organization and customer data by contacting us for a full vulnerability assessment and penetration test conducted by our experienced team. Stay one step ahead of cyber threats and strengthen your defenses today.

Scope of Work

Featured icon.png

Scanning the external network perimeter and web applications

Featured icon.png

Testing the security of the corporate email system (including attachments, links, etc.)

Featured icon.png

Vulnerability assessment of mobile applications (iOS and Android platforms)

Assessment Goals

The purpose of the assessment was to identify vulnerabilities, evaluate their risk levels, and provide actionable recommendations for remediation. The testing was conducted by ESKA’s ethical hackers following methodologies including OWASP MASVS, simulating attacks from both authorized (authenticated) and anonymous (unauthenticated) user perspectives. After the testing, the client received a comprehensive report detailing the testing process, findings, and improvement recommendations.

Mobile Application Vulnerability Assessment Results

The security review covered three mobile applications on both Android and iOS platforms.
Testing involved a combination of automated tools and manual techniques to thoroughly evaluate the security posture of the apps.
Featured icon.png

A total of 46 vulnerabilities were found, categorized by risk from Informational to Critical.

Featured icon.png

16 informational issues

Featured icon.png

The most severe issue was a medium-risk vulnerability allowing modification of connection data within the app.

Featured icon.png

29 low-risk issues

Featured icon.png

1 medium-risk issue

Methodologies we use
logo owasp.png
osstmm-blue-500px-300dpi-444x468.png
NIST_logo.svg.png
647f9245052fea000e98e957_optimized_259_e295x222-18x13.png
Recommendations
Fill 1.png

Implement protections to prevent screenshot capture in the app gallery by blurring the screen or showing a static image.

Fill 1 (1).png

Review biometric authentication logic and implement best practices using cryptographic objects and keystores.

Fill 1 (2).png

Add integrity checks of application files before launch to reduce risk of malicious app versions.

Fill 1 (3).png

Remove all debug code before app release.

Fill 1 (4).png

Encrypt stored sensitive information additionally to ensure a higher level of protection.

Corporate Email Security Testing

During the phishing assessment, our team designed several phishing attack scenarios to evaluate employees' readiness to respond to potential threats. We applied a Grey Box approach: the client provided email addresses of employees, and we gathered additional information via open-source intelligence (OSINT).

It is important to note that no personal attacks were performed on employees via personal messengers, private emails, personal mobile phones, or social media. The phishing scenarios did not use information about employees' personal interests or hobbies.

Attacks targeted only work email addresses. Our goal was to assess staff vigilance, responsiveness to phishing attempts, and the effectiveness of organizational security measures.

Are you interested in learning more about this case or do you have similar security needs?

Our team of experts at ESKA conducted a comprehensive penetration test for a bank, uncovering significant issues and weaknesses within their systems. The identification and resolution of these vulnerabilities are vital in preventing potential data breaches and safeguarding sensitive information.

1 (8).png
bottom of page