European Commission ShinyHunters Cloud Breach via Trivy Supply Chain

Breach Date: 2026-03-19 Category: data-leak
View Source →

Details

On March 19, 2026, ShinyHunters obtained an AWS API key belonging to the European Commission’s cloud environment via a prior compromise of the open-source security tool Trivy. This enabled unauthorized access to the EC’s AWS infrastructure. CERT-EU confirmed the breach on March 30, 2026, reporting that over 350 GB of data was exfiltrated, including emails and attachments, SSO user directory dumps, DKIM signing keys, AWS configuration snapshots, NextCloud/Athena data, and internal admin URLs. Data of at least 29 other EU entities may have been affected. The DKIM key theft enables ShinyHunters to forge authenticated emails from EU Commission domains. The breach is part of a broader ShinyHunters campaign targeting cloud credentials in 2026.

Technical Details

Initial Attack Vector
Attackers compromised the open-source security tool Trivy in a supply chain attack; a secret AWS API key associated with the European Commission's account was embedded in Trivy data and extracted by ShinyHunters, enabling access to the EC's AWS cloud environment
Vendor/Product
Amazon Web Services; Trivy (open-source container scanner)
Software Package
Trivy
Supply Chain Claimed
Yes