The European Commission (EC) has acknowledged a significant data breach affecting its public-facing web infrastructure after the notorious cyber extortion group ShinyHunters claimed responsibility. The threat actor alleges the theft of over 350GB of sensitive data from the Commission's Europa.eu web portal, hosted on Amazon Web Services (AWS). The breach, detected around March 24, 2026, reportedly stemmed from a compromised AWS account. ShinyHunters has attempted to substantiate its claims by releasing a 90GB data sample on the dark web. The EC has confirmed that data was exfiltrated but maintains that the attack was contained to public websites and did not impact core internal systems. This incident highlights the persistent threat that sophisticated hacking groups pose to high-profile government entities and the critical importance of securing cloud environments.
The attack was claimed by ShinyHunters, a well-known threat group with a history of large-scale data breaches targeting prominent organizations. The group's modus operandi typically involves gaining access to a target's infrastructure, exfiltrating large volumes of valuable data, and then attempting to extort the victim or sell the data on dark web forums.
In this case, the initial access vector appears to be a compromised AWS account, a common tactic that falls under T1078.004 - Cloud Accounts. Once inside the EC's cloud environment, the attackers claim to have accessed and exfiltrated a wide variety of data, including:
This activity aligns with the MITRE ATT&CK tactic of Collection (TA0009) and Exfiltration (TA0010), specifically T1530 - Data from Cloud Storage Object. The release of a 90GB sample is a classic pressure tactic used to force a response or payment from the victim.
While the EC has not released detailed technical forensics, the attack pattern is consistent with ShinyHunters' previous operations:
Europa.eu portal.T1041 - Exfiltration Over C2 Channel).The EC's response, stating that "internal systems were not affected," suggests the compromised environment was likely segmented from the core administrative network, a crucial security practice.
Despite the EC's attempts to downplay the severity, the breach carries significant potential impact:
For organizations managing AWS environments, the following observables are key to detecting similar attacks:
AWS CloudTrailListBuckets, GetObject, or CreateUser from unusual IP ranges or user agents.sts:AssumeRoleAssumeRole activity, especially if roles are assumed by external accounts or from unexpected locations.High-volume egressIAM User LoginD3-DAM: Domain Account Monitoring principles applied to cloud accounts.M1032 - Multi-factor Authentication).*) permissions.ShinyHunters provided screenshots showing employee data and email server access as proof of 350GB data theft from EC's Europa.eu portal.
CERT-EU attributes EC data breach to TeamPCP, detailing a 92GB exfiltration via compromised Trivy scanner and stolen API key, impacting 29 EU entities.
Enforce MFA on all cloud accounts, especially administrative and root accounts, to prevent takeovers via compromised credentials.
Mapped D3FEND Techniques:
Implement the principle of least privilege for all IAM users and roles. Regularly audit permissions and remove unnecessary access.
Use VPCs, subnets, and security groups to create segmented network zones that isolate public-facing applications from internal systems and sensitive data stores.
Mapped D3FEND Techniques:
The European Commission detects malicious activity on its network.
ShinyHunters claims responsibility for the attack and the EC confirms the intrusion.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.