Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Trivy supply chain attack enabled European Commission cloud breach
    Cybersecurity

    Trivy supply chain attack enabled European Commission cloud breach

    adminBy adminApril 4, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Trivy supply chain attack enabled European Commission cloud breach
    Share
    Facebook Twitter LinkedIn Pinterest Email

    CERT-EU confirmed that ShinyHunters are behind the recent breach of the cloud infrastructure underpinning websites of the European Commission, and that they stole and subsequently leaked approximately 340 GB of data.

    European Commission cloud breach

    “Analysis of the published dataset has so far confirmed the presence of personal data, including lists of names, last names, usernames, and email addresses, predominantly from the European Commission’s websites but potentially pertaining to users across multiple Union entities,” European Union’s CERT said.

    “The dataset also contains at least 51,992 files related to outbound email communications, totalling 2.22 GB. The majority of these are automated notifications with little to no content. However, ‘bounce-back’ notifications, which are responses to incoming messages from users, may contain the original user-submitted content, posing a risk of personal data exposure.”

    Initial access tied to Trivy supply chain attack

    The breach was detected by EC’s SOC on March 24 and CERT-EU was notified on March 25.

    Based on the fact that the initial access happened on March 19, 2026, the misuse of AWS credentials, the targeting of cloud infrastructure, and the EC using a compromised version of AquaSec’s Trivy security scanner at the time of the attack, CERT-EU and the EC believe that the initial access vector was the Trivy supply-chain compromise.

    The attackers acquired an AWS API key, which granted them control over other EC’s AWS accounts.

    Then they used TruffleHog to scan for secrets and validate AWS credentials by calling the Security Token Service, and used the compromised AWS secret to create and attach a new access key to an existing user. Finally, then started reconnaissance.

    This modus operandi has also been observed by Wiz researchers and has been tied to TeamPCP, the group linked to the recent Trivy, KICS, LiteLLM and Telnyx supply chain attacks.

    Whether the achieved access was then handed off to ShinyHunters or ShinyHunters is only involved in the cyber extortion part of the attack is currently unknown. The group published the stolen data on their dark web leak site on March 28.

    No lateral movement detected

    “The threat actor obtained management rights for the compromised AWS secret, which could have allowed them to move laterally to other AWS accounts belonging to the European Commission. However, no indication of such movement has been uncovered so far,” CERT-EU noted.

    “The European Commission swiftly revoked the compromised account’s rights to block any illegitimate access. All compromised access keys have been deactivated or deleted.”

    The europa.eu websites and the services provided by the platform were not affected by the security incident.

    The institutions are still analyzing the leaked databases, and it’s possible they will discover other types of data that have been compromised. The affected clients of the Europa web hosting service have been notified and so have the appropriate data protection agencies across the EU.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Attack Breach Chain Cloud Commission Enabled European Supply Trivy
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleDie Linke German political party confirms data stolen by Qilin ransomware
    Next Article 10 Hacks Every Apple Vision Pro User Should Know
    admin
    • Website

    Related Posts

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026

    Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild

    April 18, 2026

    CISA flags Apache ActiveMQ flaw as actively exploited in attacks

    April 18, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    AI traffic converts better than non-AI visits for U.S. retailers: Report

    April 18, 2026

    Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare

    April 18, 2026

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026

    This hidden Samsung Galaxy S26 feature has changed how I watch Netflix and YouTube on the move

    April 18, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,382)
    • Privacy & Online Earning (171)
    • SEO & Digital Marketing (846)
    • Tech Tools & Mobile / Apps (1,651)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    AI traffic converts better than non-AI visits for U.S. retailers: Report

    April 18, 2026

    Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare

    April 18, 2026

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026
    Most Popular
    • AI traffic converts better than non-AI visits for U.S. retailers: Report
    • Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare
    • $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
    • This hidden Samsung Galaxy S26 feature has changed how I watch Netflix and YouTube on the move
    • Equinix offering targets automated AI-centric network operations
    • Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild
    • 5 things Claude’s free tier does better than Gemini, ChatGPT, and Perplexity for productivity users who live in documents
    • CISA flags Apache ActiveMQ flaw as actively exploited in attacks
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.