EU cyber agency attributes major data breach to TeamPCP hacking group
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住关键点。 文章主要讲的是欧盟网络安全机构CERT-EU指出,黑客组织TeamPCP入侵了欧盟委员会的亚马逊网络服务账户,窃取了大量数据,包括个人信息和邮件内容。这次攻击利用了被滥用的亚马逊API密钥,并且最初是通过Trivy供应链漏洞进入的。被窃数据后来出现在暗网网站ShinyHunters上。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖主要事件:入侵、数据泄露、黑客组织、入侵方式、影响范围以及后果。 可能的结构是:欧盟网络安全机构指出黑客组织TeamPCP入侵欧盟委员会的AWS账户,窃取大量数据包括个人信息和邮件内容。利用被滥用的API密钥,并通过Trivy供应链漏洞进入。数据出现在暗网网站ShinyHunters上。 检查一下字数是否符合要求,大约在100字左右。这样用户就能快速了解文章的核心内容了。 </think> 欧盟网络安全机构CERT-EU指出,黑客组织TeamPCP入侵欧盟委员会亚马逊网络服务账户,窃取约92GB压缩数据,包括姓名、邮箱及邮件内容。此次攻击利用被滥用的亚马逊API密钥,并通过Trivy供应链漏洞进入。被窃数据随后出现在暗网网站ShinyHunters上。 2026-4-3 18:30:48 Author: therecord.media(查看原文) 阅读量:6 收藏

The European Union’s cybersecurity agency (CERT-EU) said Thursday that the hacking group TeamPCP was behind a massive recent data breach at the European Commission.

CERT-EU said the hackers broke into the bloc’s Amazon Web Services (AWS) account and took about 92 gigabytes of compressed data used by the Commission. The data included names, email addresses and some email content, according to the new report from the agency, which said the breach took place on March 19.

The hack, which relied on the misuse of a secret Amazon API key, involved the Commission’s Europa.eu platform, which lives on AWS cloud infrastructure and is used by EU states to host websites belonging to bloc entities. Data belonging to 42 internal clients and at least 29 EU entities may have been stolen, according to the report.

The dataset contained at least nearly 52,000 files “related to outbound email communications” totaling 2.2 gigabytes, the report said. CERT-EU believes most of those messages were automated and had little or no content , but in some cases bounceback notifications may pose a risk of personal data exposure. 

The Commission’s cyber officials became aware of the breach on March 24 when they received notifications about “potential misuse of Amazon APIs, potential account compromise, and an abnormal increase in network traffic,” according to the report.

CERT-EU believes with high confidence that the hackers initially gained access through the Trivy supply chain compromise, which has been attributed to the hacking group TeamPCP.

The threat actor also gained “management rights” for the compromised AWS API key, which could have “allowed them to move laterally to other AWS accounts belonging to the European Commission,” the report said, adding that there is currently no sign of such movement.

On March 28, the stolen data turned up on the ShinyHunters’ dark web site. The incident is likely the latest example of cybercriminal organizations working together to make money off of hacks.

ShinyHunters claimed to have stolen “data dumps of mail servers, datavases [sic], confidential documents, contracts, and much more sensitive material,” according to CERT-EU. 

The researchers believe the hack can be attributed to the Trivy compromise because of its timing, the resources that were targeted and the fact that the Commission was “unwittingly using a compromised version of Trivy during the relevant timeframe, having received it through normal software update channels.”

TeamPCP is also believed to have been behind the recent LiteLLM cyberattack, which affected Mercor and thousands of other organizations, according to a Mercor spokesperson.

The hacking group also has been tied to “worm-driven ransomware, data exfiltration, and cryptomining campaigns,” according to Aqua Security.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering digital privacy, surveillance technologies and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.


文章来源: https://therecord.media/european-commission-cyberattack-teampcp
如有侵权请联系:admin#unsafe.sh