Executive summary Executive summary

Client background

Our client is a leading player in mobile telecommunications, catering to a customer base with millions of individuals and holding a significant market share in Azerbaijan's mobile market.

Business challenge

Our client was expanding their service offering by adding a new fintech component to their existing telecom solution. The company needed to ensure that it had robust security to protect sensitive financial customer data.

Value delivered

N-iX has performed an extensive cybersecurity assessment and provided a detailed security report. It helped the client identify and mitigate vulnerabilities before launching their fintech service. This, in turn, removed the risk of security breaches, service disruptions, and financial or reputational damages.

Check
15+
years on the market
Check
Millions
of customers
Check
Major share
of local telecom market owned
Location:
Azerbaijan, Baku
Industry:
Telecom
Partnership period:
March 2022 - present
Expertise delivered:
Cybersecurity services
Technologies:
Flutter, Android, iOS, Burp Suite, Frida, ADB, MobSF, ApkTool, DEXTools, Eclipse Memory Analyzer.
Check
Comprehensive
cybersecurity assessment
Check
Proof of concept exploits
for more effective security testing
Check
Detailed security report
with solutions for mitigating vulnerabilities

Success story in detail

Business challenge: establishing high customer data security within the new fintech service Business challenge

Our customer wanted to expand the functionality of their telecom application with a fintech component and needed to ensure that it provides sufficient security for customer data. The company decided to conduct comprehensive security testing of the entire solution to identify any security vulnerabilities and ensure the safety of user personal data and financial transactions.

Telecom cybersecurity
Implementation: conducting a comprehensive security assessment of the fintech serviceImplementation

N-iX began by ensuring seamless coordination with the customer's security team to prevent service disruptions during testing. Our cybersecurity experts defined the areas to be tested and outlined the most effective testing methodologies.

Certain technological specifics of the client's application made the testing process more challenging. In particular, the application consisted of a shared front-end component and two distinct back-end components, each with its separate infrastructure and technologies. Also, the application did not support the installation of proxies. Therefore, we had to build a new version of the iOS application to overcome this challenge and intercept traffic during testing.

By conducting a thorough assessment and analysis of access handling, input handling, device storage, logic, and more, we have helped the client identify vulnerabilities within their mobile solution. As a result, we have prepared and executed a PoC exploit for the identified vulnerabilities and provided a security report.

Value delivered by N-iX: preventing security breaches and disruptions of the new fintech service Value delivered

The comprehensive cybersecurity assessment performed by N-iX has benefited the client in several significant ways:

  • Identified and mitigated security risks before launching the new fintech service;
  • Boosted the solution’s security to prevent unauthorized access and use;
  • Eliminated the risks of financial and reputational damages caused by data breaches and other malicious cyber activities;
  • Mitigated issues that could potentially lead to service disruptions or downtime.
Check
15+
years on the market
Check
Millions
of customers
Check
Major share
of local telecom market owned
Location:
Azerbaijan, Baku
Industry:
Telecom
Partnership period:
March 2022 - present
Expertise delivered:
Cybersecurity services
Technologies:
Flutter, Android, iOS, Burp Suite, Frida, ADB, MobSF, ApkTool, DEXTools, Eclipse Memory Analyzer.
Check
Comprehensive
cybersecurity assessment
Check
Proof of concept exploits
for more effective security testing
Check
Detailed security report
with solutions for mitigating vulnerabilities
Connect with our experts
Get in touch