European Commission Investigates Breach in Mobile Device Management Platform
Summary
Hide ▲
Show ▼
The European Commission is investigating a second breach affecting its Amazon cloud infrastructure hosting the Europa.eu platform, which occurred on March 24, 2026. A threat actor, identified as ShinyHunters, claims to have stolen over 350GB of data, including databases, confidential documents, employee PII, DKIM keys, internal admin URLs, NextCloud data, and military financing data. The attacker stated no intention to extort the Commission but warned of potential secondary impacts such as identity risk and spear-phishing attacks. The breach was contained within hours, and the Commission is notifying affected entities while investigating the full impact. This follows the January 30, 2026 breach of the Commission’s mobile device management platform, linked to Ivanti EPMM vulnerabilities, which exposed staff names, phone numbers, and business email addresses and was contained within 9 hours. Separately, ShinyHunters has recently targeted Instructure’s Canvas platform, breaching it a second time to deface login portals for approximately 330 educational institutions, replacing standard pages with an extortion message and threatening to leak data if a ransom is not paid by May 12, 2026. Instructure confirmed data theft during the attack but continues investigating the incident.
Timeline
-
09.02.2026 11:49 4 articles · 2mo ago
European Commission Detects Breach in Mobile Device Management Platform
On January 30, 2026, the European Commission detected a cyberattack on its mobile device management platform, which may have exposed staff personal information. The incident was contained and the system cleaned within 9 hours. The breach is linked to vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) software, similar to recent attacks on Dutch institutions. The compromised data includes names, phone numbers, and business email addresses of staff members. On March 24, 2026, the Commission confirmed a second breach targeting its Amazon cloud infrastructure hosting the Europa.eu platform. The attack was contained within hours, and the Commission took immediate steps to investigate and mitigate risks. The threat actor, ShinyHunters, claimed responsibility, alleging theft of over 350GB of data, including mail server dumps, databases, confidential documents, contracts, DKIM signing keys, internal admin URLs, NextCloud data, and military financing data. The Commission stated that its internal systems were not impacted and is notifying affected entities while analyzing the full impact. Early findings suggest data from the Europa websites may have been taken.
Show sources
- European Commission discloses breach that exposed staff data — www.bleepingcomputer.com — 09.02.2026 11:49
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
- Canvas login portals hacked in mass ShinyHunters extortion campaign — www.bleepingcomputer.com — 08.05.2026 01:36
Information Snippets
-
The European Commission detected a cyberattack on its mobile device management platform on January 30, 2026.
First reported: 09.02.2026 11:492 sources, 3 articlesShow sources
- European Commission discloses breach that exposed staff data — www.bleepingcomputer.com — 09.02.2026 11:49
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The breach may have exposed staff names and mobile numbers but did not compromise mobile devices.
First reported: 09.02.2026 11:492 sources, 3 articlesShow sources
- European Commission discloses breach that exposed staff data — www.bleepingcomputer.com — 09.02.2026 11:49
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The incident was contained and the system cleaned within 9 hours.
First reported: 09.02.2026 11:492 sources, 3 articlesShow sources
- European Commission discloses breach that exposed staff data — www.bleepingcomputer.com — 09.02.2026 11:49
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The attack is linked to vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) software.
First reported: 09.02.2026 11:492 sources, 3 articlesShow sources
- European Commission discloses breach that exposed staff data — www.bleepingcomputer.com — 09.02.2026 11:49
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
Similar breaches were reported by the Dutch Data Protection Authority and the Council for the Judiciary.
First reported: 09.02.2026 11:492 sources, 3 articlesShow sources
- European Commission discloses breach that exposed staff data — www.bleepingcomputer.com — 09.02.2026 11:49
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
Ivanti warned of two critical vulnerabilities (CVE-2026-1281 and CVE-2026-1340) in EPMM that were exploited in zero-day attacks.
First reported: 09.02.2026 11:492 sources, 2 articlesShow sources
- European Commission discloses breach that exposed staff data — www.bleepingcomputer.com — 09.02.2026 11:49
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The vulnerabilities allow remote attackers to execute arbitrary code on unpatched devices without authentication.
First reported: 09.02.2026 11:492 sources, 2 articlesShow sources
- European Commission discloses breach that exposed staff data — www.bleepingcomputer.com — 09.02.2026 11:49
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
A threat actor gained access to the European Commission's Amazon cloud infrastructure and stole over 350 GB of data, including databases belonging to Commission employees.
First reported: 27.03.2026 14:222 sources, 2 articlesShow sources
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The threat actor provided screenshots to BleepingComputer as proof of access to European Commission employee information and an internal email server.
First reported: 27.03.2026 14:222 sources, 2 articlesShow sources
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The actor claimed they will leak the stolen data online and have no intention of extorting the Commission.
First reported: 27.03.2026 14:222 sources, 2 articlesShow sources
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The threat actor did not disclose how they breached the affected accounts.
First reported: 27.03.2026 14:222 sources, 2 articlesShow sources
- European Commission investigating breach after Amazon cloud hack — www.bleepingcomputer.com — 27.03.2026 14:22
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
European Commission confirmed the cloud breach occurred on March 24, 2026, and took immediate steps to investigate and contain the incident.
First reported: 30.03.2026 11:151 source, 1 articleShow sources
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The attack targeted the cloud infrastructure hosting the Europa.eu platform but did not impact internal systems.
First reported: 30.03.2026 11:151 source, 1 articleShow sources
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
ShinyHunters claimed responsibility for the breach, alleging theft of over 350GB of data including mail server dumps, databases, confidential documents, contracts, DKIM signing keys, internal admin URLs, NextCloud data, and military financing mechanism Athena data.
First reported: 30.03.2026 11:151 source, 1 articleShow sources
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
Security researchers reported potential compromise of a full SSO user directory, PII of employees, and emails from the incident.
First reported: 30.03.2026 11:151 source, 1 articleShow sources
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
The threat actor stated no intention to extort the Commission, though researchers warned that a quiet leak could still cause significant damage.
First reported: 30.03.2026 11:151 source, 1 articleShow sources
- European Commission Confirms Cloud Data Breach — www.infosecurity-magazine.com — 30.03.2026 11:15
-
ShinyHunters breached education technology giant Instructure a second time by exploiting a vulnerability to deface Canvas login portals for approximately 330 colleges and universities.
First reported: 08.05.2026 01:361 source, 1 articleShow sources
- Canvas login portals hacked in mass ShinyHunters extortion campaign — www.bleepingcomputer.com — 08.05.2026 01:36
-
The defacements, visible for roughly 30 minutes, displayed a message claiming responsibility for the earlier Instructure breach and threatening to leak stolen data if a ransom is not paid by May 12, 2026.
First reported: 08.05.2026 01:361 source, 1 articleShow sources
- Canvas login portals hacked in mass ShinyHunters extortion campaign — www.bleepingcomputer.com — 08.05.2026 01:36
-
The threat actor alleged that the defacement was caused by a vulnerability in Instructure’s systems that allowed modification of login portals, with the Canvas app also displaying the extortion message.
First reported: 08.05.2026 01:361 source, 1 articleShow sources
- Canvas login portals hacked in mass ShinyHunters extortion campaign — www.bleepingcomputer.com — 08.05.2026 01:36
-
Instructure took Canvas offline while responding to the latest cyberattack after disclosing a prior incident where threat actors claimed to have stolen 280 million student and staff records tied to 8,809 schools.
First reported: 08.05.2026 01:361 source, 1 articleShow sources
- Canvas login portals hacked in mass ShinyHunters extortion campaign — www.bleepingcomputer.com — 08.05.2026 01:36
-
The stolen data allegedly included user records, private messages, enrollment data, and other information gathered through Canvas data export features and APIs.
First reported: 08.05.2026 01:361 source, 1 articleShow sources
- Canvas login portals hacked in mass ShinyHunters extortion campaign — www.bleepingcomputer.com — 08.05.2026 01:36
Similar Happenings
Instructure breach claimed by ShinyHunters results in theft of 280 million records from 8,809 schools and universities
Instructure confirmed a cybersecurity incident conducted by a criminal threat actor and is investigating the impact with external forensic experts. The ShinyHunters extortion gang has claimed responsibility and alleges theft of 280 million records tied to students and staff from 8,809 educational institutions, publishing detailed impact lists per institution. Multiple universities have acknowledged awareness of the breach and initiated internal reviews.
Medtronic corporate network breach exposes over 9 million records, confirmed by vendor
Medical device manufacturer Medtronic confirmed a breach of its corporate IT systems after the ShinyHunters extortion group claimed to have stolen over 9 million records containing personally identifiable information (PII) and terabytes of corporate data. Medtronic states there is no impact to medical products, patient safety, customer networks, manufacturing, distribution, financial reporting, or its ability to meet patient needs, and notes its networks are segmented. The company is investigating whether personal data was accessed and will notify affected individuals if confirmed. MiniMed, Medtronic's diabetes-focused subsidiary, reported its own IT systems were not affected. The threat actor listed Medtronic on its leak site on April 17, setting a ransom deadline of April 21, and was later removed from the site, which may indicate payment. Medtronic’s corporate IT, product, manufacturing, and distribution networks are segmented, and customer hospital networks remain separate and independently managed by customers’ IT teams.
Salesforce misconfiguration leads to non-sensitive data exposure at McGraw-Hill amid ShinyHunters extortion claims
McGraw-Hill confirmed a data breach affecting 13.5 million user accounts after ShinyHunters exploited a Salesforce environment misconfiguration to steal and leak non-sensitive data, including names, addresses, phone numbers, and email addresses. The company stated the breach did not impact its core Salesforce accounts, customer databases, courseware, or internal systems, though ShinyHunters claimed possession of 45 million records with PII. The affected webpages were secured promptly, and McGraw-Hill is collaborating with Salesforce to remediate the issue. Have I Been Pwned verified the leak of over 100GB of data tied to 13.5 million accounts. The incident remains distinct from a separate, unverified claim by a threat actor posing as ShinyHunters, who alleges breaching Vercel and selling stolen data, including API keys and employee records. Vercel has disclosed the incident and is investigating with law enforcement and incident response experts, while denying any impact to services.
Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach
The extortion group ShinyHunters has expanded its campaign tied to the Anodot breach, claiming unauthorized access to Vimeo’s systems and threatening to leak data unless a ransom is paid. The attack leverages authentication tokens stolen from Anodot to compromise downstream victims, including Vimeo and Rockstar Games. Vimeo confirmed that exposed data included email addresses, technical data, video titles, and metadata, but excluded video content, credentials, and payment information. Operations remained unaffected, and Vimeo disabled Anodot integration and launched an investigation with law enforcement. Rockstar Games previously acknowledged a limited breach linked to the same third-party incident, with ShinyHunters leaking approximately 78.6 million records of internal analytics data. The compromised datasets included in-game revenue metrics, player behavior tracking, and Zendesk support analytics, with Rockstar asserting no operational impact.
Telus Digital Breach by ShinyHunters
Telus Digital, the business process outsourcing (BPO) arm of Canadian telecommunications provider Telus, has confirmed a security breach after threat actors known as ShinyHunters claimed to have stolen nearly 1 petabyte of data. The breach, which involved unauthorized access to a limited number of Telus Digital's systems, is currently under investigation. ShinyHunters claims to have accessed a wide range of customer data related to Telus' BPO operations and call records for Telus' consumer telecommunications division. The threat actors reportedly used Google Cloud Platform credentials discovered in data stolen during the Salesloft Drift breach to gain initial access. Telus has engaged cyber forensics experts and is working with law enforcement to manage the situation.