Go back

Key Challenges & Context

Cyber threats are a growing concern for every organization, but for a European retirement fund responsible for sensitive financial and personal data, the stakes couldn’t be higher. With thousands of active members and pensioners relying on their services, the challenge was twofold: protect their systems from cyberattacks while ensuring smooth, uninterrupted service.

Their public-facing systems were at risk from external threats, while outdated protocols and weak access controls on their internal network posed hidden vulnerabilities. On top of that, employees – often the first target for phishing and other social engineering tricks – needed better training to become a stronger line of defense.

They came to us looking for solutions: a way to uncover the cracks in their defenses, strengthen their systems, and train their team to tackle cyber threats head-on.

Approach

To tackle the retirement fund’s cybersecurity challenges, we combined technical expertise with employee engagement. This strategy addressed infrastructure vulnerabilities while empowering the team to recognize and counter potential threats, creating a robust defense against both external and internal risks.

External Penetration Testing

We began by scrutinizing the organization’s public-facing systems to identify and fix potential weak points:

  • Mapping Exposed Services and Assets: Using advanced scanning tools, we mapped the organization’s digital footprint, uncovering exposed IP addresses, open ports, and active services that attackers could exploit.
  • Fixing Critical Vulnerabilities: We identified a critical flaw (CVE-2020-14092) that allowed access to sensitive user password hashes. We provided immediate remediation steps to address the vulnerability and prevent attackers from exploiting it.
  • Clear and Actionable Reporting: Our findings were compiled in a detailed report with step-by-step recommendations to strengthen public-facing systems, ensuring immediate and long-term security improvements.

Internal Penetration Testing

For the internal network, we adopted a black-box approach, simulating the perspective of an intruder with limited prior knowledge. Key activities included:

  • Network Configuration Review: We identified misconfigurations, such as improper access controls on shared resources and default credentials on critical servers, which posed significant risks.
  • Password Strength Analysis: Using password spraying techniques, we revealed weak credential patterns and recommended stronger password policies to protect against brute-force attacks.
  • Protocol and Service Updates: We flagged and updated outdated configurations, like SMBv1 and DNS zone transfers to reduce exposure to exploitation.

Phishing Campaigns

Employees play a crucial role in cybersecurity. To test and improve their awareness, we designed two simulated phishing campaigns:

  • Realistic Scenarios: Using relatable themes, such as contests and popular events, we tested how employees responded to phishing attempts.
  • Tracking Progress: The first campaign highlighted vulnerabilities, but the second showed remarkable improvement, with more employees identifying and reporting suspicious emails. This iterative process helped refine their training and boosted their vigilance.

Continuous Collaboration

Throughout the project, we acted as advisors, ensuring the client was equipped with practical knowledge and ongoing support.

Benefits

The cybersecurity initiative delivered tangible results, improving our client’s defenses against cyber threats and building a culture of security awareness. By addressing critical risks with clear, actionable solutions, the project set the stage for lasting resilience.

Enhanced Infrastructure Security

  • Eliminated Critical Vulnerabilities: We identified and resolved a severe flaw (CVE-2020-14092), protecting sensitive user password hashes and blocking potential exploitation.
  • Secured the Network: We fixed weak access controls, removed default credentials, and updated outdated protocols, drastically reducing internal attack surfaces.
  • Reinforced Password Policies: The organization implemented our recommendations for stronger password complexity and expiration policies, closing gaps that credential-based attacks could exploit.

Increased Employee Awareness

  • Boosted Phishing Vigilance: Employees improved their phishing detection skills, raising reporting rates from 10% to 40% within three months.
  • Delivered Hands-On Training: Through realistic phishing simulations, employees are now able to identify and counter social engineering attacks.