Contact us

BOOK A PRESENTATION

Enterprise MFA, eIDAS-Compliant Digital Signing, and OTP Spoofing Protection: How ASEE Secured Its Own Infrastructure

NO NAME
ASEE Solutions is a cybersecurity and digital identity company serving banks, telecom operators, and government institutions across Central and Eastern Europe.

As the company scaled its internal infrastructure, three interconnected vulnerabilities emerged:

  • single-factor authentication exposing critical systems to credential theft and phishing,
  • slow and legally uncertain document signing processes,
  • and a live OTP spoofing risk within its mobile authentication channel.

ASEE Solutions addressed all three by deploying its own enterprise security products internally:  Authentication Server, Secure Sign, and Spoofing Protector.

The result: zero successful spoofing incidents, a completely digitized and legally valid document signing workflow, and phishing-resistant authentication across all critical systems — all running on internally owned and controlled technology.

About ASEE

ASEE Solutions is a regional technology leader specializing in cybersecurity, digital identity, and strong authentication solutions, a member of ASEE Group. Our client base includes major financial institutions, telecom operators, and public sector organizations that operate under strict regulatory frameworks, including PSD2, eIDAS, and NIS2. With hundreds of employees distributed across multiple business units, ASEE's own internal infrastructure carries the same security requirements it imposes on its enterprise clients, making it an ideal proving ground for its own product portfolio.

The Challenge

As a company that builds and sells security products, ASEE's internal practices must reflect the same standards it demands of its clients. An internal audit identified three distinct but structurally related vulnerabilities.

Weak authentication and phishing exposure

Employees were accessing critical internal systems, including VPN, file transfer services, a password manager, and a self-service portal using single-factor authentication. In an environment where phishing attacks, credential theft, and identity spoofing are daily operational risks, static passwords alone represented an unacceptable exposure. Beyond the immediate risk, the company also needed to ensure that internal authentication practices reflected the same standards it applies when deploying solutions for its enterprise clients, without degrading productivity for hundreds of daily users.

Slow, non-compliant document signing.

Internal contracts, compliance agreements, board reports, and partner documents were being processed through physical signing or third-party platforms that lacked full eIDAS compliance. Every document requiring a formal signature introduced days of friction: printing, scanning, physical archiving, and courier coordination. Each delay was a direct cost to operational velocity. Each third-party dependency was a compliance liability and a point of potential data exposure.

OTP channel vulnerable to spoofing.

ASEE employees rely on the ASEE OTP mobile application for daily authentication. This introduced a real operational risk: spoofing attacks capable of intercepting OTP codes, impersonating legitimate authentication server requests, and bypassing access controls entirely. Standard OTP protects the code in transit but not the integrity of the communication channel through which it travels. For a company whose enterprise clients include regulated financial institutions, this was not a theoretical gap. It was a live vulnerability requiring immediate remediation.

The Solution

Rather than sourcing third-party tools, ASEE deployed its own enterprise security stack maintaining full ownership of the source code and the ability to adapt rapidly to evolving regulatory requirements without dependency on external vendor roadmaps.

Authentication Server was implemented as the central identity and access management layer across all employees and internal applications. The platform supports phishing-resistant multi-factor authentication via OTP through a single integration point, with native connectivity to Active Directory.

Unlike generic MFA solutions, ASEE retains full control over the source code, enabling deep customization to internal security policies and rapid response to evolving security requirements, including NIS2 and other emerging standards. This is the same platform ASEE deploys for banks and government institutions operating under PSD2, eIDAS, and NIS2 frameworks.

Secure Sign replaced all physical and third-party signing workflows with a fully eIDAS-compliant digital document signing platform. Every internal document requiring a formal signature (contracts, NDAs, compliance reports, consent forms) now passes through Secure Sign. The platform integrates natively with ASEE's internal ERP and document management systems. Qualified electronic signatures generated through Secure Sign carry full legal validity across EU member states, providing non-repudiation and document integrity guarantees that physical signatures cannot match at scale.

Spoofing Protector was embedded directly into the ASEE OTP mobile application as a native architectural component, not as an external add-on layer, but as an integral part of the authentication flow, active from the first to the last step of every session. The solution continuously verifies OTP channel integrity, detects anomalies characteristic of real-world spoofing and man-in-the-middle attacks, and blocks suspicious requests in real time without friction for legitimate users. To understand how these solutions work together in enterprise environments, explore our full digital identity and authentication security portfolio.

Implementation

All three solutions were deployed using ASEE's standard five-phase methodology, rolled out in parallel across business units with minimal disruption to ongoing operations.

Phase 1: Analysis and diagnostics

All internal systems and critical access points were mapped for Authentication Server. Document flows requiring formal signatures were catalogued, and transaction volumes assessed for Secure Sign. For Spoofing Protector, attack vectors specific to OTP mobile authentication were analyzed and vulnerability points identified within the existing application architecture.

Phase 2: Planning and system design

Authentication Server integration was architected around ASEE's Active Directory infrastructure, with user scenarios defined and a phased migration plan developed. Secure Sign was integrated with internal ERP and document management systems, with role-based permissions and approval flows established. Spoofing Protector's architectural integration was designed from scratch as a native component built into the OTP application's core, not bolted onto it.

Phase 3: Implementation and onboarding

All three solutions were rolled out progressively across business units to maintain operational continuity. Secure Sign ran in parallel with legacy signing processes during the transition period. Spoofing Protector was embedded into the production OTP application and gradually activated across the full employee base.

Phase 4: Testing and optimization

Authentication Server underwent penetration testing and full attack scenario simulations to validate system resilience against credential theft and phishing vectors. Secure Sign signatures were verified for legal validity under eIDAS, and document integrity was stress-tested. Spoofing Protector was subjected to red team exercises and live spoofing simulations, including man-in-the-middle and OTP interception scenarios to validate real-world detection and blocking effectiveness.

Phase 5: User education

Structured training sessions were conducted across all three deployments. Employees were trained to recognize phishing and social engineering attempts, to correctly initiate and verify digitally signed documents, and to identify and report spoofing attempts within the OTP application workflow.

Results

AreaBeforeAfter
Authentication methodSingle-factor, static passwordsPhishing-resistant MFA via Authentication Server
Spoofing incidents Active operational vulnerability Zero successful attacks post-deployment
Document signing processPhysical or non-compliant third-party tools100% digitized, eIDAS-compliant via Secure Sign
Qualified electronic signature validityNot guaranteedFull legal validity across EU member states
Third-party vendor dependenciesMultiple external vendorsZero — full source code ownership across all three solutions
Spoofing incidentsActive operational vulnerabilityZero successful attacks post-deployment
OTP channel integrityUnprotected communication channelReal-time anomaly detection and channel verification
Employee security awarenessAd hocStructured training across authentication, signing, and spoofing domains
Qualified electronic signature validityNot guaranteedFull legal validity across EU member states

Testimonial

Authentication Server, Secure Sign, and Spoofing Protector are not just products we offer to clients.  They are the foundation on which we protect our own digital identity. Every employee who logs into our systems, signs a document, or authenticates via mobile goes through the same security layer we recommend to banks and government institutions. When we embedded Spoofing Protector into ASEE OTP, we confirmed something important: what we sell actually works under the harshest conditions, in our own backyard." Boro Marelja, ICT Support Manager, ASEE Solutions

Ready to apply the same security stack to your infrastructure?

Book a consultation with ASEE's enterprise security team and see how Authentication Server, Secure Sign, and Spoofing Protector work together as a unified identity and access security platform that is built, tested, and battle-hardened in-house.

FAQ

Standard MFA adds a second verification step, typically an OTP sent via SMS or email, but it remains vulnerable to real-time phishing attacks where attackers intercept codes as they are entered. Phishing-resistant MFA uses cryptographic methods that prevent code interception entirely, as the authentication response is bound to the specific session and cannot be reused. ASEE Authentication Server supports phishing-resistant authentication methods aligned with PSD2 and eIDAS requirements, making it suitable for regulated industries including banking and public administration.

A standard electronic signature may be as simple as a typed name or a scanned image it carries minimal legal weight and provides no guarantee of document integrity. An eIDAS-compliant qualified electronic signature is cryptographically bound to the signer's verified identity, guarantees that the document has not been altered after signing, and provides legal non-repudiation equivalent to a handwritten signature under EU law. ASEE Secure Sign generates qualified electronic signatures that are legally valid across all EU member states without additional validation steps.

Yes, with the right deployment methodology. ASEE uses a five-phase approach (analysis, planning, implementation, testing, user education) that includes parallel operation periods and gradual business-unit rollouts. All three solutions, Authentication Server, Secure Sign, and Spoofing Protector, were deployed internally at ASEE without significant operational disruption, serving as a direct proof of concept for enterprise deployments in regulated environments.

TP spoofing is an attack in which a malicious actor intercepts or impersonates the communication channel between a user and an authentication server capturing one-time codes before they are validated, or injecting fraudulent authentication requests that appear legitimate. Standard OTP protection secures the code itself but leaves the channel unprotected. ASEE Spoofing Protector addresses this by continuously verifying channel integrity throughout the authentication session and blocking anomalous requests in real time, before any spoofed interaction can succeed.

Want to learn more about cybersecurity trends and industry news?

SUBSCRIBE TO OUR NEWSLETTER

CyberSecurityhub

chevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram