European Commission breached after hackers poisoned open-source security tool Trivy


CERT-EU has attributed a major data breach at the European Commission to cybercrime group TeamPCP, which exploited a supply chain attack on the open-source security tool Trivy to steal 92 GB of compressed data from the Commission’s AWS infrastructure. The notorious ShinyHunters gang then published the data, which included emails and personal details from up to 71 clients across EU institutions. The breach exposes the fragility of the open-source software supply chain that underpins the security tools governments rely on.

The European Union’s computer emergency response team said on Thursday that a supply chain attack on an open-source security scanner gave hackers the keys to the European Commission’s cloud infrastructure, resulting in the theft and public leak of approximately 92 gigabytes of compressed data including the personal information and email contents of staff across dozens of EU institutions.

CERT-EU attributed the breach to TeamPCP, a cybercrime group that has spent the past six weeks systematically compromising the very tools organisations use to defend themselves. The data was subsequently published online by ShinyHunters, the notorious extortion gang responsible for breaches at Ticketmaster, AT&T, and more than 60 other companies. The dual attribution, one group for the hack, another for the leak, is unusual in cybercrime investigations and suggests a growing ecosystem of specialisation among criminal operators.

The attack began on 19 March when the European Commission unknowingly downloaded a compromised version of Trivy, a widely used open-source vulnerability scanner maintained by Aqua Security. TeamPCP had exploited an incomplete credential rotation following an earlier breach of Trivy’s GitHub repository in late February, retaining residual access to force-push malicious code to 76 of 77 version tags in the trivy-action repository. When the Commission’s automated security pipeline pulled the poisoned update, the malware harvested an AWS API key that gave the attackers access to the Commission’s cloud account on Amazon Web Services.

The 💜 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol’ founder Boris, and some questionable AI art. It’s free, every week, in your inbox. Sign up now!

From there, the intrusion followed what Unit 42 at Palo Alto Networks described as a methodical reconnaissance campaign. The attackers used TruffleHog, a tool designed for scanning cloud credentials, to search for additional secrets. They then attached a newly created access key to an existing user to evade detection before enumerating IAM users and roles, EC2 instances, Lambda functions, RDS databases, S3 buckets, and Route 53 hosted zones. The focus was on ECS clusters, mapping task definitions to find targets for direct container access and bulk exfiltration from AWS Secrets Manager.

The European Commission’s Cybersecurity Operations Centre did not detect the anomalous activity until 24 March, five days after the initial compromise, when alerts flagged potential misuse of Amazon APIs and an abnormal increase in network traffic. The Commission publicly disclosed the incident on 27 March. One day later, ShinyHunters published the dataset on their dark web leak site.

The scale of exposure is substantial. The stolen data relates to websites hosted for up to 71 clients of the Europa.eu web hosting service: 42 internal European Commission clients and at least 29 other EU entities. CERT-EU confirmed the published dataset, approximately 340 GB uncompressed, contained nearly 52,000 files of outbound email communications, along with lists of names, usernames, and email addresses. Agencies potentially affected include the European Medicines Agency, the European Banking Authority, ENISA itself, and Frontex, the EU’s border and coast guard agency.

The Trivy compromise was not an isolated incident. Between 19 and 27 March, TeamPCP conducted what Palo Alto Networks called a systematic campaign against open-source security infrastructure. After Trivy, the group targeted Checkmarx KICS, an infrastructure-as-code scanner, force-pushing malicious commits to all 35 version tags on 21 March. They then pivoted to LiteLLM, an AI gateway tool, because BerriAI’s CI/CD pipeline used Trivy for scanning, and the poisoned trivy-action harvested a PyPI publishing token that allowed the attackers to push malicious packages directly to the Python Package Index. Each compromised tool became a vector for reaching the next target, creating a cascading supply chain attack that affected organisations far beyond the European Commission.

The implications for the governance frameworks Europe has spent years building are uncomfortable. The EU’s Cybersecurity Regulation, adopted in 2023, was designed to ensure institutional resilience against precisely this kind of attack. The NIS2 Directive holds board-level executives directly accountable for cybersecurity failures, with penalties including fines and disqualification. Yet the Commission’s own infrastructure was compromised through a vector, a poisoned update to a security scanning tool, that falls squarely in the blind spot between supply chain management and runtime protection.

TeamPCP, also tracked as DeadCatx3, PCPcat, and ShellForce, has been documented by CrowdStrike, Wiz, and SANS as a cloud-native threat actor that exploits misconfigured Docker APIs, Kubernetes clusters, and Redis servers. The group has been linked to ransomware, data exfiltration, and cryptomining campaigns, and recently announced a partnership with CipherForce, another ransomware group, to co-publish breach data. The professionalisaton of cybercriminal operations, where specialists in initial access, lateral movement, and data extortion collaborate across organisational boundaries, mirrors the division of labour that makes legitimate cybersecurity companies scale rapidly.

ShinyHunters, for its part, is a known quantity. The syndicate has been operating since 2020 and owns Breach Forums, one of the dark web’s most active marketplaces for stolen data. French national Sebastien Raoult was sentenced to three years in prison in Seattle for his role in the group’s earlier operations, but the organisation has continued to operate. Its involvement in publishing the Commission’s data suggests either a direct relationship with TeamPCP or a marketplace dynamic in which stolen data finds its way to the most effective distributor.

The breach arrives at a particularly sensitive moment for EU digital sovereignty. The Commission relies on AWS for parts of its web infrastructure, a dependency that has drawn scrutiny from European legislators who argue that critical government systems should run on European cloud providers. A breach that traces from a compromised open-source tool to an American cloud platform to a dark web leak site operated by an international criminal syndicate will do nothing to quiet those concerns. It will, however, intensify the debate about whether the EU’s regulatory ambitions are matched by the operational security of its own institutions.

For the broader technology industry, the lesson is more immediate. The open-source security tools that organisations use to scan their code, audit their infrastructure, and validate their compliance, the tools that are supposed to be the last line of defence, have become the attack surface. Trivy alone is used by thousands of organisations worldwide. When the scanner becomes the weapon, the entire model of automated security breaks down, and the trust assumptions underpinning modern software infrastructure collapse with it.

CERT-EU is coordinating the incident response under the EU’s Cybersecurity Regulation and continues to analyse the published dataset. For the 71 clients whose data may have been compromised, the remediation process is only beginning. For the European technology ecosystem that relies on the same open-source tools and cloud infrastructure, the breach is a warning that has already arrived too late.



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


spring-sale-imagery

DeWalt/ZDNET

Spring means lawn and garden prep and DIY projects around the house. And if you’ve been looking for a handy gadget to help you with small repairs and crafts, you can pick up the DeWalt MT21 11-in-1 multitool at Amazon ahead of its Big Spring Sale for 25% off, bringing the price down to $30 (matching the lowest price of the year so far). It also comes with a belt sheath to keep it close by on jobsites.

Also: 10 DIY gadgets I never leave out of my toolkit

The MT21 has a compact design, measuring just 4 inches when fully folded and expanding to 6 inches when the pliers are deployed. The hinged handle is made of durable steel with a rubberized grip in iconic DeWalt yellow and black, adding a bit of visual flair while making the multitool more comfortable to use. Each of the included tools is also made of stainless steel for strength and reliability on jobsites and in the garage.

Also: The best Amazon Spring Sale DeWalt deals

The 11 featured tools include: regular and needlenose pliers, wire cutters, two flathead screwdrivers, a Phillips screwdriver, a file, a can and bottle opener, a saw blade, a straight-edge blade, and an awl tool. Each tool folds into the handle to keep them out of the way until needed and to protect your hands while using the multitool. 

We’re big fans of multitools here at ZDNET, and definitely recommend this highly rated one from DeWalt.

How I rated this deal 

DeWalt is one of the leading names in power tools, and if you’re looking for a handy EDC gadget or just need something for occasional DIY repairs, the MT21 multitool is a great choice. With 11 tools in a single gadget, you can do everything from assembling flat-pack furniture to minor electrical repairs. While not the steepest discount, getting your hands on a high-quality multitool for 25% off is still a great value. That’s why I gave this deal a 3/5 Editor’s rating.

Amazon’s Big Spring Sale runs March 25-31, 2026. 


Show more

Deals are subject to sell out or expire anytime, though ZDNET remains committed to finding, sharing, and updating the best product deals for you to score the best savings. Our team of experts regularly checks in on the deals we share to ensure they are still live and obtainable. We’re sorry if you’ve missed out on this deal, but don’t fret — we’re constantly finding new chances to save and sharing them with you at ZDNET.com


Show more

We aim to deliver the most accurate advice to help you shop smarter. ZDNET offers 33 years of experience, 30 hands-on product reviewers, and 10,000 square feet of lab space to ensure we bring you the best of tech. 

In 2025, we refined our approach to deals, developing a measurable system for sharing savings with readers like you. Our editor’s deal rating badges are affixed to most of our deal content, making it easy to interpret our expertise to help you make the best purchase decision.

At the core of this approach is a percentage-off-based system to classify savings offered on top-tech products, combined with a sliding-scale system based on our team members’ expertise and several factors like frequency, brand or product recognition, and more. The result? Hand-crafted deals chosen specifically for ZDNET readers like you, fully backed by our experts. 

Also: How we rate deals at ZDNET in 2026


Show more





Source link