CERT-EU, the Computer Emergency Response Team for the EU institutions, agencies and bodies, has officially attributed a major data breach at the European Commission to the hacking group TeamPCP. The incident, which took place on March 19, 2026, resulted in the exfiltration of approximately 92 gigabytes of compressed data from the Commission's Amazon Web Services (AWS) environment. The attackers reportedly gained access by misusing a secret Amazon API key. The breach is linked to the Commission's use of a compromised version of the open-source scanner Trivy, highlighting significant supply chain risks. The stolen data includes names, email addresses, and email content, potentially affecting 29 EU entities and 42 internal clients.
The attack was sophisticated, leveraging a supply chain compromise to gain initial access to the victim's cloud environment. The threat actor, TeamPCP, is a known hacking group associated with ransomware, data exfiltration, and cryptomining campaigns. Another group, ShinyHunters, had previously claimed an attack on the EU, though the connection to this specific incident is being investigated.
The attack chain appears to be as follows:
The core of this attack was the exploitation of a trusted relationship and a compromised software tool, a classic supply chain attack. This maps to MITRE ATT&CK technique T1195.001 - Compromise Software Dependencies and Development Tools. By compromising an open-source tool like Trivy, the attackers could embed malicious logic to steal credentials.
Once the API key was obtained, the attackers leveraged T1078.004 - Cloud Accounts for initial access and persistence within the AWS environment. The subsequent exfiltration of 92 GB of data aligns with T1530 - Data from Cloud Storage Object. The attackers targeted email communications, indicating a focus on intelligence gathering or harvesting personal data for future attacks.
The breach has significant operational and reputational implications for the European Commission. The exfiltration of 92 GB of data, including names, email addresses, and potentially sensitive email content, poses a serious privacy risk to individuals and a security risk to the affected EU entities. The data could be used for spear-phishing campaigns, blackmail, or be sold on dark web forums. The exposure of bounceback notifications, while seemingly minor, can reveal internal email structures and personal data, violating GDPR principles. The reliance on a compromised open-source tool also exposes a critical gap in the Commission's software supply chain security, eroding trust in its cybersecurity posture.
s3:GetObject calls indicating large-scale data access. D3FEND's Cloud Storage Access Logging is essential.sts:GetSessionToken from suspicious sources.Decoy File can be used to plant fake credentials and detect their usage.Application Configuration Hardening should be applied.M1032 - Multi-factor Authentication).Stolen EU Commission data, exfiltrated by TeamPCP via compromised Trivy scanner, now being sold on dark web by ShinyHunters.
Enforcing MFA on all cloud console user accounts and for sensitive API operations can prevent access even if credentials are stolen.
Mapped D3FEND Techniques:
Continuously audit cloud logs (e.g., AWS CloudTrail) for anomalous API calls, access from unusual locations, or large-scale data access patterns to detect compromise.
Mapped D3FEND Techniques:
Implement strict controls over the software development lifecycle, including vetting open-source components and ensuring that sensitive credentials like API keys are not hardcoded or accessible to build tools.
Mapped D3FEND Techniques:
To prevent supply chain attacks like the one involving the compromised Trivy scanner, organizations must implement rigorous application configuration hardening, specifically for their CI/CD pipeline and developer tools. First, establish a strict vetting process for all third-party and open-source tools. Use Software Composition Analysis (SCA) scanners to create a Software Bill of Materials (SBOM) for all applications, and continuously monitor for vulnerabilities in these components. For tools like Trivy, ensure they are downloaded from official, verified sources and check their cryptographic hashes against published values. Second, never store long-lived credentials like AWS API keys in configuration files or environment variables accessible by these tools. Instead, leverage short-lived tokens and IAM roles for service accounts (e.g., IAM Roles for Service Accounts in EKS or EC2 Instance Profiles) that grant temporary, least-privilege access. This ensures that even if a tool is compromised, it does not possess powerful, persistent credentials.
To detect the misuse of stolen cloud credentials, security teams must perform Resource Access Pattern Analysis on their cloud logs (e.g., AWS CloudTrail). In the context of the European Commission breach, this involves establishing a baseline of normal API activity for service accounts and users. A compromised API key used by TeamPCP would likely exhibit anomalous behavior. Configure alerts for access from unusual IP addresses, geographic locations, or autonomous systems (ASNs) not associated with your organization. Monitor for a sudden spike in s3:GetObject or s3:ListBucket calls, especially against buckets that are not typically accessed by the compromised account's role. Furthermore, analyze the sequence and timing of API calls. An attacker enumerating resources and then exfiltrating data will create a different pattern than a legitimate automated process. Tools like Amazon GuardDuty can automate some of this analysis, but custom SIEM rules are essential for detecting context-specific anomalies.
To mitigate the impact of data exfiltration from a compromised cloud environment, implement strict outbound traffic filtering. In an AWS environment, this can be achieved using a combination of Security Groups, Network ACLs, and VPC Endpoints. For the Europa.eu platform, all outbound internet access from application servers and databases should be denied by default. If external access is required, it should be routed through a NAT Gateway with strict egress rules or a proxy that inspects and logs all traffic. To prevent data from being exfiltrated directly to an attacker's S3 bucket or other cloud service, use VPC Gateway Endpoints for S3. This forces all S3 traffic to stay within the AWS network, allowing you to create bucket policies that deny access to any principal outside your AWS Organization. This control would have made it significantly harder for TeamPCP to exfiltrate the 92GB of data.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats