Loading...
Loading...
How nCrypt ran a three-year intelligence-led pentest and red-team programme covering the launch and continuous assurance of a Top-5 Malaysian bank's digital channel. Client identifying details have been anonymised under the engagement non-disclosure agreement.
The client is a Top-5 Malaysian universal bank with a domestic branch network of several hundred locations and a regional presence across ASEAN. The institution operates a traditional core banking platform alongside a newly launched digital channel intended to serve a younger demographic with mobile-first onboarding, instant card issuance and embedded investment products.
The engagement spanned the run-up to the digital-channel launch and the two years that followed, covering the launch readiness assessment, an intelligence-led red-team exercise prior to general availability, quarterly application retests after launch and a SOC capability uplift designed to compress mean-time-to-detect on the new channel.
The board had given the technology executive a clear instruction: the bank would not go live without independent evidence that an attacker could not move from the external internet through to a customer impact, and that the SOC could detect a realistic intrusion within minutes rather than days. nCrypt was selected as the independent testing partner against a competitive panel of CREST member firms.
The bank's digital channel was being launched into a market where two licensed digital banks were already live and several incumbents had publicly stumbled on production incidents during their own launches. The reputational risk of a material security event in the first six months of operation was assessed by the board as one of the principal risks on the corporate risk register.
On a technical level, the new channel sat alongside a long-established core banking estate with twenty years of accumulated complexity, including legacy mainframe integrations, several generations of middleware and a corporate Active Directory forest that had grown organically through three previous acquisitions. The principal challenge was to demonstrate that the new channel could be operated safely without a full and disruptive rebuild of the surrounding estate.
The SOC team had been stood up alongside the new channel and was running on a ninety-day-old SIEM deployment with limited tuning. Mean time to detect a realistic intrusion, when measured against an internal purple-team exercise prior to nCrypt's engagement, sat at approximately seventy-two hours — well outside the bank's own operational risk appetite for the new channel.
Finally, the engagement had to operate inside the bank's established RMiT governance framework. Every test had to be documented, every change had to flow through the standard change advisory process and every finding had to map back to a specific RMiT control objective for the board sub-committee that owned technology risk.
nCrypt structured the engagement as a continuous programme rather than a series of point assessments. The first ninety days delivered a launch-readiness assessment covering all seven application surfaces of the new channel and a focused infrastructure review of the cloud account, the integration middleware and the relevant slice of the corporate forest.
The second phase, immediately prior to general availability, was a six-week intelligence-led red-team exercise. nCrypt's threat-intelligence cell developed a bespoke profile of three plausible adversaries — a financially motivated cybercrime group, a regional state-aligned actor and an insider-assisted scenario — and the red team executed against the full estate from initial reconnaissance through to objective achievement, with the bank's SOC unaware of the timing.
Post-launch, the programme transitioned into a quarterly cadence. Each quarter included a focused web and API retest of the digital channel, a SOC purple-team exercise to validate that detection coverage had not regressed, and a rolling thematic review of one adjacent risk area such as third-party API integrations, privileged-access management or change-management hygiene.
The SOC uplift workstream ran in parallel and was the single biggest contributor to the mean-time-to-detect improvement. nCrypt's detection engineers worked alongside the in-house team to build behavioural detections mapped to MITRE ATT&CK techniques relevant to the bank's estate, and to instrument every red-team operation as a ground-truth dataset for future tuning.
Two service accounts with weak passphrases and elevated privileges in the corporate forest could be cracked offline within hours. The same forest had a one-way trust into the digital-banking estate that allowed lateral movement into pre-production core banking.
The new digital-banking onboarding flow trusted client-supplied identifiers in the final approval call. A modified mobile client could promote a pending applicant to approved without triggering the second-factor reviewer step.
Network segmentation testing showed a partial exposure of SWIFT-CSP operator workstations from the standard corporate user VLAN, in conflict with CSCF segregation control 1.1.
An analytics replica of the core ledger had been exposed to a broader read-only audience than the original RMiT data-classification permitted, including a third-party BI consultancy.
Push-based MFA was the default for administrators of the new digital channel. A targeted social-engineering operation by the red team successfully phished one administrator using an adversary-in-the-middle proxy.
The digital channel went live on its committed launch date with unanimous board approval following an executive briefing of the red-team results and the remediation evidence pack. All seven end-to-end attack paths demonstrated during the intelligence-led exercise were closed before launch, and the final retest produced zero critical findings and only two medium-severity items, both of which were accepted with documented compensating controls.
The SOC capability uplift compressed mean time to detect on a realistic intrusion from approximately seventy-two hours at the start of the engagement to roughly fourteen minutes by the end of the second year, measured against repeated purple-team exercises. The bank's board-level risk appetite statement for the digital channel was met for the first time.
Two years into the programme, the bank has not experienced a material security incident on the new channel. The continuous-assurance model has been adopted by the parent group and is now being extended to the bank's regional ASEAN subsidiaries under a harmonised RMiT-equivalent framework.
Share your scope. We'll respond within 24 hours.
Share your scope. We'll respond within 24 hours.
Talk to nCrypt about an intelligence-led pentest programme scoped to your RMiT obligations and your release timeline.