{"id":13438,"date":"2026-04-05T04:50:21","date_gmt":"2026-04-05T04:50:21","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13438"},"modified":"2026-04-05T04:50:21","modified_gmt":"2026-04-05T04:50:21","slug":"european-fee-confirms-information-breach-linked-to-trivy-provide-chain-assault","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13438","title":{"rendered":"European Fee Confirms Information Breach Linked to Trivy Provide Chain Assault"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>The European Fee (EC) has confirmed that hackers stole over 300GB of information from its AWS setting utilizing an API key compromised within the Trivy provide chain assault.<\/strong><\/p>\n<p>The incident occurred on March 24 and was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/european-commission-reports-cyber-intrusion-and-data-theft\/\">initially disclosed<\/a> on March 27, when the EC warned that cloud infrastructure internet hosting its assets for the Europa.eu platform had been breached.<\/p>\n<p>Now, CERT-EU reveals that the hack concerned an AWS cloud account that&#8217;s a part of the backend for the Europa.eu internet hosting service, which helps public web sites for the EC and different European Union entities.<\/p>\n<p>Hackers gained entry to the AWS account utilizing an API key compromised on March 19 within the provide chain assault on Aqua Safety\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/aquas-trivy-vulnerability-scanner-hit-by-supply-chain-attack\/\">Trivy vulnerability scanner<\/a>, carried out by the TeamPCP hacking group.<\/p>\n<p>\u201cThe European Fee was unwittingly utilizing a compromised model of Trivy in the course of the related timeframe, having obtained it by way of regular software program replace channels,\u201d <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.europa.eu\/blog\/european-commission-cloud-breach-trivy-supply-chain\">CERT-EU explains<\/a>.<\/p>\n<p>Utilizing the compromised AWS key, the attackers created and connected a brand new entry key to a person account and carried out reconnaissance, in line with the EU\u2019s cybersecurity crew.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p>\u201cThis key granted management over different AWS accounts affiliated with the European Fee. On the identical day, the risk actor tried to find further secrets and techniques by launching TruffleHog, a device generally used for scanning secrets and techniques and validating AWS credentials by calling the Safety Token Service (STS),\u201d CERT-EU says.<\/p>\n<p>Wiz not too long ago defined that <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/teampcp-moves-from-oss-to-aws-environments\/\">TeamPCP wasted no time<\/a> validating stolen credentials, launching discovery operations, exfiltrating extra knowledge, and making an attempt lateral motion.<\/p>\n<p>\u201cThe risk actor used the compromised AWS secret to exfiltrate knowledge from the affected cloud setting. The exfiltrated knowledge pertains to web sites hosted for as much as 71 purchasers of the Europa internet hosting service: 42 inside purchasers of the European Fee, and not less than 29 different Union entities,\u201d CERT-EU notes.<\/p>\n<p>On March 28, the notorious <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/topics\/ShinyHunters\/\">ShinyHunters<\/a> extortion group added the stolen info to its Tor-based leak web site.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"308\" height=\"333\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/03\/European-Commission.png\" alt=\"European Commission data leak\" class=\"wp-image-45894\"\/><\/figure>\n<\/div>\n<p>The 340GB of uncompressed knowledge contains private info comparable to names, e-mail addresses, and usernames, primarily from the EC\u2019s web sites. Customers throughout a number of EU entities had been doubtless affected as nicely, CERT-EU says.<\/p>\n<p>Roughly 2.22GB of the information, or 51,992 information, represents automated notifications, together with bounce-back messages containing authentic user-submitted content material, which might embrace private info.<\/p>\n<p>\u201cThe evaluation of the databases linked to the hosted web sites is underway. Given the amount and complicated nature of the information concerned, this course of requires a substantial period of time,\u201d CERT-EU notes.<\/p>\n<p>Upon studying of the compromise, the EC revoked the compromised account\u2019s rights, deactivated and rotated the compromised credentials, and notified the related knowledge safety our bodies. The Fee additionally confirmed that the incident didn&#8217;t have an effect on its inside techniques.<\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/react2shell-exploited-in-large-scale-credential-harvesting-campaign\/\">React2Shell Exploited in Massive-Scale Credential Harvesting Marketing campaign<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/t-mobile-sets-the-record-straight-on-latest-data-breach-filing\/\">T-Cell Units the Document Straight on Newest Information Breach Submitting<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/250000-affected-by-data-breach-at-nacogdoches-memorial-hospital\/\">250,000 Affected by Information Breach at Nacogdoches Memorial Hospital<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/mercor-hit-by-litellm-supply-chain-attack\/\">Mercor Hit by LiteLLM Provide Chain Assault<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>The European Fee (EC) has confirmed that hackers stole over 300GB of information from its AWS setting utilizing an API key compromised within the Trivy provide chain assault. The incident occurred on March 24 and was initially disclosed on March 27, when the EC warned that cloud infrastructure internet hosting its assets for the Europa.eu [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13440,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[717,641,241,8521,2174,157,4012,3556,240,8522],"class_list":["post-13438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attack","tag-breach","tag-chain","tag-commission","tag-confirms","tag-data","tag-european","tag-linked","tag-supply","tag-trivy"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13438"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13438\/revisions"}],"predecessor-version":[{"id":13439,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13438\/revisions\/13439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13440"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-05 20:53:38 UTC -->