The European Commission is investigating a security incident in its cloud infrastructure following unauthorized access by a malicious actor to accounts hosted in Amazon Web Services, according to information collected by specialized media. Although the Community Executive has not yet issued an official communication in all the details, sources consulted by the press indicate that at least one management privilege account on this infrastructure was compromised.
The detection was quick and the executive's own cyber security response team is working on the case., say those who know the matter. At the same time, the group that is attributed to the intrusion informed journalists that it has downloaded more than 350 GB of data, among which, according to its claims, there would be several databases. As evidence, it provided screenshots that, according to the media that published them, show access to data from Commission employees and to a mail server used by its staff. The group also stated that it does not seek to extort for the moment, but plans to filter the information at a later date.

It is important to stress that these statements come from the actor who ascribed the attack and from news sources; the Commission has not yet publicly confirmed the scope and exact nature of the data committed. In similar situations, the lack of official information may complicate the assessment of the actual impact, so institutions often investigate first to contain the threat and verify the scope before giving a public version.
This episode occurs in a context of recent attacks on European entities that have taken advantage of failures in mobile device management platforms. At the end of January, an intrusion was detected that affected the mobile management platform used by some agencies, an incident that the Commission made public in February. This chain of incidents appears to be related to campaigns that exploited code injection vulnerabilities in the Ivanti Endpoint Manager Mobile (EPMM) software, and that affected other European bodies, including the Dutch data protection authority ( document published by the House of the Netherlands) and the Finnish agency Valtori ( communication from Valtori).
The recurrence of this type of gaps recalls that attackers do not just guess passwords: they often exploit software failures, exposed configurations or complex tool chains to move laterally within cloud infrastructure. Agencies and companies are constantly updating policies and defenses, but the shared infrastructure and complexity of cloud environments increase the attack surface.
The news, initially published by specialized security media, opens several practical and political questions. Technically, it is necessary to determine how access was obtained: if there were committed credentials, a failure in the configuration of permits, misuse of API keys, or holdings of vulnerabilities in third party software. It is also necessary to quantify which information was actually exfiltered and whether it includes sensitive personal data or critical systems. At the institutional level, transparency on the scale of the incident and mitigation measures is key to restoring confidence and coordinating the response with national and European authorities.
Just weeks ago, the Commission had put on the table new proposals to strengthen cybersecurity in critical infrastructure in Europe, an initiative that seeks to harden the defenses to state actors and criminal organizations that attack essential services. The rise in incidents against public administrations and services highlights the need to accelerate these reforms and improve international cooperation in detection and response ( European Commission press room and the work of the ENISA European Agency are reference resources for these policies).
At the same time, the Council of the European Union has also recently adopted sanctions against companies linked to computer attacks targeting infrastructure in Member States, a sign that the political response to digital threats is no longer just technical but geopolitical. The combination of sanctions, regulation and best technical practices aims to raise the cost and reduce the success of sophisticated campaigns.

For organizations and security officials that manage cloud environments, this episode serves as a reminder: continuous monitoring, privilege segmentation, rotation and protection of credentials, configuration audits and the ability to detect side movements within cloud environments are essential measures. It is also to keep software providers up to date and apply patches as soon as the corrections are published, especially when it comes to management solutions that have access to corporate devices and data.
We will follow developments in the investigation and official statements. For those who want to deepen the background and communications related to recent gaps to European institutions and crisis management, they can consult the specialized coverage of security means ( BleepingComputer - safety section), the communiqués of the agencies concerned mentioned above, and the institutional pages of the Commission and the Council for official communiqués and policy actions.
In an increasingly digitized world, incidents in the cloud make it clear that no organization is immune: the question is no longer whether an attack will occur, but when and how it will respond to minimize damage and restore normality.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...