trivy-supply-chain-attack-breach-of-european-commission-cloud-environment
Breach of European Commission Cloud Infrastructure
The European Commission’s cloud infrastructure suffered a significant breach in 2026, facilitated by a supply chain attack involving the Trivy security scanner.
Initial Access
On March 19, 2026, attackers gained initial access to the system through a compromised version of the Trivy tool, which is used for vulnerability scanning. This tool allowed them to acquire an AWS API key, giving them control over other European Commission AWS accounts and enabling reconnaissance capabilities.
Data Theft and Leakage
The breach resulted in the theft and subsequent leakage of approximately 340 GB of data, including personal data from European Commission websites and potentially from users across multiple Union entities. The dataset contains at least 51,992 files related to outbound communications, totaling 2.22 GB, and may pose a risk of personal data exposure due to the potential presence of user-submitted content in bounce-back notifications.
Response and Mitigation
The European Commission and CERT-EU believe that the initial access vector was the Trivy supply-chain compromise, and the attack has been tied to the group linked to recent supply chain attacks, including those against Trivy, KICS, LiteLLM, and Telnyx. The affected clients of the Europa web hosting service have been notified, as well as the appropriate data protection agencies across the EU. The European Commission is still analyzing the leaked databases, and it is possible that they will discover additional types of compromised data.
