{"id":45091,"date":"2026-04-03T15:25:18","date_gmt":"2026-04-03T07:25:18","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/03\/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities\/"},"modified":"2026-04-03T15:25:18","modified_gmt":"2026-04-03T07:25:18","slug":"cert-eu-european-commission-hack-exposes-data-of-30-eu-entities","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/03\/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities\/","title":{"rendered":"CERT-EU: European Commission hack exposes data of 30 EU entities"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/03\/0_European_Union_flag.jpg\" width=\"1600\" alt=\"CERT-EU: European Commission hack exposes data of 30 EU entities\"><\/p>\n<p>The European Union&#8217;s Cybersecurity Service (CERT-EU) has attributed the European Commission cloud hack to the TeamPCP threat group, saying the resulting breach exposed the data of at least 29 other Union entities.<\/p>\n<p>The European Commission <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-confirms-data-breach-after-europaeu-hack\/\" target=\"_blank\" rel=\"nofollow noopener\">publicly disclosed the incident<\/a> on March 27 after <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-investigating-breach-after-amazon-cloud-account-hack\/\" target=\"_blank\" rel=\"nofollow noopener\">BleepingComputer reached out for confirmation<\/a> that the Amazon cloud environment of the European Union&#8217;s main executive body had been breached.<\/p>\n<p>Two days earlier, the Commission notified&nbsp;CERT-EU&nbsp;of the hack, saying that its&nbsp;Cybersecurity Operations Center was not alerted to API misuse, potential account compromise, or any abnormal network traffic until March 24, five days after the initial intrusion.<\/p>\n<p>On March 10, TeamPCP used a compromised Amazon Web Services API key with management rights over other European Commission AWS accounts (stolen&nbsp;in the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions\/\" target=\"_blank\" rel=\"nofollow noopener\">Trivy supply-chain attack<\/a>) to breach the&nbsp;Commission&#8217;s&nbsp;Amazon cloud environment.<\/p>\n<p>In the next stage of the attack, they used TruffleHog (a tool for scanning&nbsp;and validating cloud credentials)&nbsp;to search for additional secrets, then attached a newly created access key to an existing user to evade detection before conducting further reconnaissance and stealing data.<\/p>\n<p>TeamPCP has been linked to supply-chain attacks targeting multiple other developer code platforms, such as GitHub,&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio\/\" rel=\"nofollow noopener\" target=\"_blank\">PyPi<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks\/\" rel=\"nofollow noopener\" target=\"_blank\">NPM<\/a>, and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trivy-supply-chain-attack-spreads-to-docker-github-repos\/\" rel=\"nofollow noopener\" target=\"_blank\">Docker<\/a>.<\/p>\n<p>The cybercrime gang has also compromised the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack\/\" rel=\"nofollow noopener\" target=\"_blank\">LiteLLM PyPI package<\/a>&nbsp;in an attack that&nbsp;impacted tens of thousands of devices using its&nbsp;&#8220;TeamPCP Cloud Stealer&#8221; information-stealing malware.<\/p>\n<h2>Data leaked on the dark web&nbsp;by&nbsp;ShinyHunters<\/h2>\n<p>On March 28, data extortion group ShinyHunters published the stolen dataset&nbsp;on their dark web leak site as a 90GB archive of documents (approximately 340GB&nbsp;uncompressed), containing&nbsp;names, email addresses, and email content.<\/p>\n<p>CERT-EU&#8217;s analysis confirmed that the threat actors have stolen tens of thousands of files containing&nbsp;personal information,&nbsp;usernames, email addresses, and email content, and that the resulting data&nbsp;breach potentially affects 42 internal European Commission clients and at least 29 other Union entities using the europa.eu web hosting service.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"400\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1109292\/2026\/ShinyHunters-EC-leak.jpg\" width=\"672\" alt=\"CERT-EU: European Commission hack exposes data of 30 EU entities\"><figcaption><em>ShinyHunters European Commission data leak (BleepingComputer)<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&#8220;The threat actor used the compromised AWS secret to exfiltrate data from the affected cloud environment. The exfiltrated data relates to websites hosted for up to 71 clients of the Europa web hosting service: 42 internal clients of the European Commission, and at least 29 other Union entities,&#8221;&nbsp;<a href=\"https:\/\/cert.europa.eu\/blog\/european-commission-cloud-breach-trivy-supply-chain\" target=\"_blank\" rel=\"nofollow noopener\">CERT-EU said<\/a> on Thursday.<\/p>\n<p>&#8220;Analysis of the published dataset has so far confirmed the presence of personal data, including lists of names, last names, usernames, and email addresses, predominantly from the European Commission&rsquo;s websites but potentially pertaining to users across multiple Union entities,&#8221; it added.<\/p>\n<p>&#8220;The dataset also contains at least 51,992 files related to outbound email communications, totalling 2.22 GB. The majority of these are automated notifications with little to no content. However, &#8216;bounce-back&#8217; notifications, which are responses to incoming messages from users, may contain the original user-submitted content, posing a risk of personal data exposure.&#8221;<\/p>\n<p>CERT-EU added that&nbsp;no websites were taken offline as a result of this incident or tampered with, and no lateral movement to other Commission AWS&nbsp;accounts has been detected.<\/p>\n<p>While the analysis of exfiltrated databases and files is ongoing and will likely require &#8220;a considerable amount of time,&#8221;&nbsp;the Commission has notified relevant data protection authorities and is in direct communication with affected entities.<\/p>\n<p>In February, the European Commission&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-discloses-breach-that-exposed-staff-data\/\" rel=\"nofollow noopener\" target=\"_blank\">disclosed another data breach<\/a>&nbsp;after discovering that a mobile device management platform used to manage staff&#8217;s devices had been hacked.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"CERT-EU: European Commission hack exposes data of 30 EU entities\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-confirms-data-breach-after-europaeu-hack\/\">European Commission confirms data breach after Europa.eu hack<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-investigating-breach-after-amazon-cloud-account-hack\/\">European Commission investigating breach after Amazon cloud account hack<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-discloses-breach-that-exposed-staff-data\/\">European Commission discloses breach that exposed staff data<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts\/\">Data breach at fintech firm Figure affects nearly 1 million accounts<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/shinyhunters-starts-leaking-data-stolen-in-salesforce-attacks\/\">ShinyHunters launches Salesforce data leak site to extort 39 victims<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The European Union&#8217;s Cybersecurity Service (CERT- [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45091","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45091"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45091\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}