ShinyHunters Breaches European Commission: 350GB of Sensitive Data Exfiltrated from AWS Cloud

The European Commission has confirmed a significant data breach after its Europa.eu web platform was compromised in a cyberattack claimed by the notorious ShinyHunters extortion gang. The attackers allegedly exfiltrated over 350GB of sensitive data from the Commission’s Amazon Web Services (AWS) cloud environment.

Breach Discovery and Response

The intrusion was detected on March 24, 2026, targeting cloud systems hosting the Commission’s Europa websites—the primary public interface for EU policy pages, institutional information, and citizen services. According to the Commission’s official statement, staff moved quickly to contain the incident, and the affected websites remained online throughout.

“Early findings of our ongoing investigation suggest that data have been taken from those websites,” the European Commission stated. “The Commission is duly notifying the Union entities who might have been affected by the incident.”

Scope of Stolen Data

ShinyHunters, a prolific data extortion group, has added a European Commission entry to its dark web leak site, claiming responsibility for the theft of:

  • Mail server data dumps
  • Multiple databases
  • Confidential documents
  • Internal contracts
  • Employee information

The group has already released approximately 90GB of files allegedly stolen from the Commission’s compromised cloud environment. Screenshots provided by the attackers reportedly show access to European Commission employee data, though the full scope of compromised information remains under investigation.

AWS Cloud Environment Targeted

While the Commission has not disclosed the specific attack vector, the breach is confirmed to have affected at least one of the Commission’s AWS accounts. The attackers claimed their access was eventually blocked, but not before they had exfiltrated the massive dataset.

Notably, the Commission emphasized that internal systems were not affected—suggesting reasonable network segmentation between public-facing services and core infrastructure. However, the extent of sensitive data accessible through the compromised cloud environment raises serious concerns about potential intelligence value to malicious actors.

ShinyHunters’ Ongoing Campaign

This breach adds to ShinyHunters’ extensive 2026 campaign, which has targeted numerous high-profile organizations including:

  • Infinite Campus (education platform)
  • CarGurus (automotive marketplace)
  • Canada Goose (retail)
  • Panera Bread (restaurant chain)
  • Betterment (fintech)
  • SoundCloud (music streaming)
  • Match Group (dating apps including Tinder, Hinge, OkCupid)

Many of these breaches originated from a large-scale voice phishing (vishing) campaign targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google across more than 100 organizations.

Second EU Security Incident in Two Months

This marks the European Commission’s second major security incident in quick succession. In February 2026, Brussels disclosed that the mobile device management (MDM) platform used to manage staff devices had been compromised, potentially exposing staff names and mobile numbers.

Why It Matters

The European Commission breach carries significant implications:

  • Diplomatic sensitivity: Stolen documents and contracts could reveal sensitive EU policy positions, negotiations, and internal deliberations
  • Supply chain risk: Compromised vendor contracts may expose third-party relationships
  • Intelligence value: Email dumps and employee data provide valuable targeting information for nation-state actors
  • Cloud security concerns: The breach highlights ongoing challenges in securing government cloud infrastructure

Recommendations

Organizations should take this as a reminder to:

  • Implement robust cloud security monitoring and anomaly detection
  • Enforce least-privilege access across cloud environments
  • Enable comprehensive logging for all cloud administrative actions
  • Conduct regular security assessments of AWS IAM configurations
  • Train staff on vishing and social engineering tactics targeting SSO credentials

The European Commission says it will continue monitoring the situation and use the incident findings to enhance its cybersecurity capabilities.

Source: BleepingComputer