On April 3, 2026, the European Union's cybersecurity agency, CERT-EU, confirmed that the hacking group TeamPCP was responsible for a major data breach at the European Commission. The attack, which occurred on March 19, was a sophisticated supply chain compromise involving a malicious version of the Trivy open-source security scanner. Attackers used the compromised tool to steal an Amazon Web Services (AWS) API key, leading to the exfiltration of 91.7 GB of compressed data. The data, containing personal information and internal communications from numerous EU entities, was later advertised for sale by the notorious data broker **ShinyHunters. This incident highlights the critical risk of supply chain vulnerabilities and the cascading impact of a single compromised tool within a complex IT environment.
The attack chain began with the European Commission ingesting a compromised version of the Trivy vulnerability scanner, likely through a standard software update channel. TeamPCP, a threat group that emerged in late 2025, is credited with orchestrating this initial compromise. Once the malicious scanner was active within the Commission's environment, it located and exfiltrated a secret AWS API key.
With this key, the attackers gained "management rights" to the Commission's AWS account. They established persistence by creating a new access key attached to an existing user, a common technique to evade detection. This privileged access allowed them to infiltrate the cloud infrastructure hosting the Europa.eu web platform. The breach affected not only the European Commission but also potentially 29 other EU entities and 42 internal clients utilizing the platform. The attackers exfiltrated a total of 91.7 GB of compressed data, including a 2.2 GB subset containing nearly 52,000 files related to email communications, which exposed personal names and email addresses.
The attack demonstrates a multi-stage operation leveraging several advanced TTPs. The initial access vector was a classic supply chain attack.
T1195.001 - Compromise Software Supply Chain. The attackers compromised the Trivy scanner, a trusted tool, to infiltrate the target network.T1528 - Steal Application Access Token. The primary goal of the malicious Trivy binary was to find and steal the AWS API key.T1078.004 - Cloud Accounts. The stolen API key was used to gain administrative access. The attackers then created a new access key for an existing user (T1098.004 - Web Services ) to maintain their foothold.T1580 - Cloud Infrastructure Discovery. Once inside the AWS environment, the attackers performed reconnaissance to identify valuable data and systems, such as the Europa.eu platform infrastructure.T1537 - Transfer Data to Cloud Account. The attackers used their privileged access to exfiltrate 92 GB of data from the Commission's S3 buckets or other storage services.The final stage involved monetization, where ShinyHunters listed the stolen data for sale, indicating a potential partnership or a transaction between TeamPCP and the data broker.
The business impact of this breach is substantial, affecting the operational security and reputation of the European Commission and numerous other EU bodies. The exfiltration of 92 GB of data, including email communications, names, and addresses, constitutes a significant data privacy incident with potential regulatory consequences under GDPR. The exposure of internal documents, contracts, and database information could compromise ongoing projects, reveal sensitive negotiations, and expose internal vulnerabilities. The reliance on the Europa.eu platform by 29 other EU entities means the blast radius is wide, requiring a coordinated incident response effort across multiple agencies. Restoring trust in the Commission's digital infrastructure and its software supply chain will require significant time and investment.
Security teams should hunt for signs of a similar compromise by monitoring for the following:
| Type | Value | Description |
|---|---|---|
| log_source | AWS CloudTrail | Monitor for anomalous API calls, especially from unfamiliar IP ranges or user agents. |
| event_id | CreateAccessKey | Scrutinize all CreateAccessKey events, especially if initiated by a service account or an automated tool. |
| network_traffic_pattern | Outbound traffic from security tools | Monitor network connections from internal security scanners (like Trivy) to external endpoints. Any data transfer beyond metadata or definition updates is highly suspicious. |
| command_line_pattern | trivy with unusual flags |
Monitor execution of trivy or similar tools for unexpected command-line arguments that might indicate a malicious version. |
Detecting this attack requires a defense-in-depth approach focused on both supply chain and cloud security.
trivy.exe) makes an anomalous network connection and is followed by AWS API activity like CreateAccessKey or AttachUserPolicy from an unexpected source IP.Organizations should take the following steps to mitigate the risk of similar attacks:
New details on EU Commission breach: Trivy compromised via GitHub CI/CD, 340GB uncompressed data exfiltrated, leak confirmed March 28.
While the attack came through an update, maintaining patched and verified software from trusted sources is crucial. This includes verifying update integrity.
Strictly manage user accounts and permissions in cloud environments, adhering to the principle of least privilege.
Enforce MFA on all cloud administrative accounts to prevent takeovers even if credentials are stolen.
Run security tools and other third-party applications in isolated environments with restricted network access to limit their potential blast radius.
Enforce policies that require all third-party software and updates to be properly signed by the vendor, and verify these signatures before deployment.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats