European Commission breached after hackers poisoned open-source security tool Trivy


CERT-EU has attributed a major data breach at the European Commission to cybercrime group TeamPCP, which exploited a supply chain attack on the open-source security tool Trivy to steal 92 GB of compressed data from the Commission’s AWS infrastructure. The notorious ShinyHunters gang then published the data, which included emails and personal details from up to 71 clients across EU institutions. The breach exposes the fragility of the open-source software supply chain that underpins the security tools governments rely on.

The European Union’s computer emergency response team said on Thursday that a supply chain attack on an open-source security scanner gave hackers the keys to the European Commission’s cloud infrastructure, resulting in the theft and public leak of approximately 92 gigabytes of compressed data including the personal information and email contents of staff across dozens of EU institutions.

CERT-EU attributed the breach to TeamPCP, a cybercrime group that has spent the past six weeks systematically compromising the very tools organisations use to defend themselves. The data was subsequently published online by ShinyHunters, the notorious extortion gang responsible for breaches at Ticketmaster, AT&T, and more than 60 other companies. The dual attribution, one group for the hack, another for the leak, is unusual in cybercrime investigations and suggests a growing ecosystem of specialisation among criminal operators.

The attack began on 19 March when the European Commission unknowingly downloaded a compromised version of Trivy, a widely used open-source vulnerability scanner maintained by Aqua Security. TeamPCP had exploited an incomplete credential rotation following an earlier breach of Trivy’s GitHub repository in late February, retaining residual access to force-push malicious code to 76 of 77 version tags in the trivy-action repository. When the Commission’s automated security pipeline pulled the poisoned update, the malware harvested an AWS API key that gave the attackers access to the Commission’s cloud account on Amazon Web Services.

The 💜 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol’ founder Boris, and some questionable AI art. It’s free, every week, in your inbox. Sign up now!

From there, the intrusion followed what Unit 42 at Palo Alto Networks described as a methodical reconnaissance campaign. The attackers used TruffleHog, a tool designed for scanning cloud credentials, to search for additional secrets. They then attached a newly created access key to an existing user to evade detection before enumerating IAM users and roles, EC2 instances, Lambda functions, RDS databases, S3 buckets, and Route 53 hosted zones. The focus was on ECS clusters, mapping task definitions to find targets for direct container access and bulk exfiltration from AWS Secrets Manager.

The European Commission’s Cybersecurity Operations Centre did not detect the anomalous activity until 24 March, five days after the initial compromise, when alerts flagged potential misuse of Amazon APIs and an abnormal increase in network traffic. The Commission publicly disclosed the incident on 27 March. One day later, ShinyHunters published the dataset on their dark web leak site.

The scale of exposure is substantial. The stolen data relates to websites hosted for up to 71 clients of the Europa.eu web hosting service: 42 internal European Commission clients and at least 29 other EU entities. CERT-EU confirmed the published dataset, approximately 340 GB uncompressed, contained nearly 52,000 files of outbound email communications, along with lists of names, usernames, and email addresses. Agencies potentially affected include the European Medicines Agency, the European Banking Authority, ENISA itself, and Frontex, the EU’s border and coast guard agency.

The Trivy compromise was not an isolated incident. Between 19 and 27 March, TeamPCP conducted what Palo Alto Networks called a systematic campaign against open-source security infrastructure. After Trivy, the group targeted Checkmarx KICS, an infrastructure-as-code scanner, force-pushing malicious commits to all 35 version tags on 21 March. They then pivoted to LiteLLM, an AI gateway tool, because BerriAI’s CI/CD pipeline used Trivy for scanning, and the poisoned trivy-action harvested a PyPI publishing token that allowed the attackers to push malicious packages directly to the Python Package Index. Each compromised tool became a vector for reaching the next target, creating a cascading supply chain attack that affected organisations far beyond the European Commission.

The implications for the governance frameworks Europe has spent years building are uncomfortable. The EU’s Cybersecurity Regulation, adopted in 2023, was designed to ensure institutional resilience against precisely this kind of attack. The NIS2 Directive holds board-level executives directly accountable for cybersecurity failures, with penalties including fines and disqualification. Yet the Commission’s own infrastructure was compromised through a vector, a poisoned update to a security scanning tool, that falls squarely in the blind spot between supply chain management and runtime protection.

TeamPCP, also tracked as DeadCatx3, PCPcat, and ShellForce, has been documented by CrowdStrike, Wiz, and SANS as a cloud-native threat actor that exploits misconfigured Docker APIs, Kubernetes clusters, and Redis servers. The group has been linked to ransomware, data exfiltration, and cryptomining campaigns, and recently announced a partnership with CipherForce, another ransomware group, to co-publish breach data. The professionalisaton of cybercriminal operations, where specialists in initial access, lateral movement, and data extortion collaborate across organisational boundaries, mirrors the division of labour that makes legitimate cybersecurity companies scale rapidly.

ShinyHunters, for its part, is a known quantity. The syndicate has been operating since 2020 and owns Breach Forums, one of the dark web’s most active marketplaces for stolen data. French national Sebastien Raoult was sentenced to three years in prison in Seattle for his role in the group’s earlier operations, but the organisation has continued to operate. Its involvement in publishing the Commission’s data suggests either a direct relationship with TeamPCP or a marketplace dynamic in which stolen data finds its way to the most effective distributor.

The breach arrives at a particularly sensitive moment for EU digital sovereignty. The Commission relies on AWS for parts of its web infrastructure, a dependency that has drawn scrutiny from European legislators who argue that critical government systems should run on European cloud providers. A breach that traces from a compromised open-source tool to an American cloud platform to a dark web leak site operated by an international criminal syndicate will do nothing to quiet those concerns. It will, however, intensify the debate about whether the EU’s regulatory ambitions are matched by the operational security of its own institutions.

For the broader technology industry, the lesson is more immediate. The open-source security tools that organisations use to scan their code, audit their infrastructure, and validate their compliance, the tools that are supposed to be the last line of defence, have become the attack surface. Trivy alone is used by thousands of organisations worldwide. When the scanner becomes the weapon, the entire model of automated security breaks down, and the trust assumptions underpinning modern software infrastructure collapse with it.

CERT-EU is coordinating the incident response under the EU’s Cybersecurity Regulation and continues to analyse the published dataset. For the 71 clients whose data may have been compromised, the remediation process is only beginning. For the European technology ecosystem that relies on the same open-source tools and cloud infrastructure, the breach is a warning that has already arrived too late.



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Google Maps has a long list of hidden (and sometimes, just underrated) features that help you navigate seamlessly. But I was not a big fan of using Google Maps for walking: that is, until I started using the right set of features that helped me navigate better.

Add layers to your map

See more information on the screen

Layers are an incredibly useful yet underrated feature that can be utilized for all modes of transport. These help add more details to your map beyond the default view, so you can plan your journey better.

To use layers, open your Google Maps app (Android, iPhone). Tap the layer icon on the upper right side (under your profile picture and nearby attractions options). You can switch your map type from default to satellite or terrain, and overlay your map with details, such as traffic, transit, biking, street view (perfect for walking), and 3D (Android)/raised buildings (iPhone) (for buildings). To turn off map details, go back to Layers and tap again on the details you want to disable.

In particular, adding a street view and 3D/raised buildings layer can help you gauge the terrain and get more information about the landscape, so you can avoid tricky paths and discover shortcuts.

Set up Live View

Just hold up your phone

A feature that can help you set out on walks with good navigation is Google Maps’ Live View. This lets you use augmented reality (AR) technology to see real-time navigation: beyond the directions you see on your map, you are able to see directions in your live view through your camera, overlaying instructions with your real view. This feature is very useful for travel and new areas, since it gives you navigational insights for walking that go beyond a 2D map.

To use Live View, search for a location on Google Maps, then tap “Directions.” Once the route appears, tap “Walk,” then tap “Live View” in the navigation options. You will be prompted to point your camera at things like buildings, stores, and signs around you, so Google Maps can analyze your surroundings and give you accurate directions.

Download maps offline

Google Maps without an internet connection

Whether you’re on a hiking trip in a low-connectivity area or want offline maps for your favorite walking destinations, having specific map routes downloaded can be a great help. Google Maps lets you download maps to your device while you’re connected to Wi-Fi or mobile data, and use them when your device is offline.

For Android, open Google Maps and search for a specific place or location. In the placesheet, swipe right, then tap More > Download offline map > Download. For iPhone, search for a location on Google Maps, then, at the bottom of your screen, tap the name or address of the place. Tap More > Download offline map > Download.

After you download an area, use Google Maps as you normally would. If you go offline, your offline maps will guide you to your destination as long as the entire route is within the offline map.

Enable Detailed Voice Guidance

Get better instructions

Voice guidance is a basic yet powerful navigation tool that can come in handy during walks in unfamiliar locations and can be used to ensure your journey is on the right path. To ensure guidance audio is enabled, go to your Google Maps profile (upper right corner), then tap Settings > Navigation > Sound and Voice. Here, tap “Unmute” on “Guidance Audio.”

Apart from this, you can also use Google Assistant to help you along your journey, asking questions about your destination, nearby sights, detours, additional stops, etc. To use this feature on iPhone, map a walking route to a destination, then tap the mic icon in the upper-right corner. For Android, you can also say “Hey Google” after mapping your destination to activate the assistant.

Voice guidance is handy for both new and old places, like when you’re running errands and need to navigate hands-free.

Add multiple stops

Keep your trip going

If you walk regularly to run errands, Google Maps has a simple yet effective feature that can help you plan your route in a better way. With Maps’ multiple stop feature, you can add several stops between your current and final destination to minimize any wasted time and unnecessary detours.

To add multiple stops on Google Maps, search for a destination, then tap “Directions.” Select the walking option, then click the three dots on top (next to “Your Location”), and tap “Edit Stops.” You can now add a stop by searching for it and tapping “Add Stop,” and swap the stops at your convenience. Repeat this process by tapping “Add Stops” until your route is complete, then tap “Start” to begin your journey.

You can add up to ten stops in a single route on both mobile and desktop, and use the journey for multiple modes (walking, driving, and cycling) except public transport and flights. I find this Google Maps feature to be an essential tool for travel to walkable cities, especially when I’m planning a route I am unfamiliar with.


More to discover

A new feature to keep an eye out for, especially if you use Google Maps for walking and cycling, is Google’s Gemini boost, which will allow you to navigate hands-free and get real-time information about your journey. This feature has been rolling out for both Android and iOS users.



Source link