On March 27, 2026, the European Commission publicly confirmed what a threat actor had already told reporters: its Amazon Web Services cloud environment had been compromised, and data had been stolen from the Europa.eu platform.
This is not the Commission’s first cybersecurity incident this year. It is not even its second in the calendar quarter. Less than two months ago, CERT-EU detected and contained a breach of the Commission’s mobile device management infrastructure — an attack linked to Ivanti zero-day vulnerabilities. That incident was cleaned up in nine hours. This one will not be so tidy.
The breach affects the institution that coordinates cybersecurity policy for 27 EU member states and 450 million citizens. The institution that authored the General Data Protection Regulation. The institution that championed the NIS2 Directive. The institution that, ten days before its first breach this year, unveiled a sweeping Cybersecurity Package addressing supply chain risks and member state resilience protocols.
The irony is not subtle. It does not need to be.
What Happened
On March 24, 2026, the Commission’s IT security team detected unauthorized access to at least one AWS account managing the cloud infrastructure that hosts the Europa.eu web platform. Within 48 hours, a threat actor contacted BleepingComputer directly, claiming to have exfiltrated more than 350 gigabytes of data from the environment. The attacker provided screenshots as proof, including evidence of access to an email server used by Commission employees and multiple databases from the Europa.eu platform.
The Commission confirmed the breach on March 27 with a carefully worded statement: “Early findings of our ongoing investigation suggest that data have been taken from [Europa] websites.” It added that “the Commission’s internal systems were not affected by the cyber-attack” — a distinction that may prove more semantic than substantive as the investigation matures.
AWS, for its part, issued its own clarification: “AWS did not experience a security event, and our services operated as designed.”
Translation: this was the customer’s problem, not ours.
Timeline
| Date | Event |
|---|---|
| January 20, 2026 | European Commission unveils its Cybersecurity Package addressing supply chain risks and telecom security |
| January 30, 2026 | CERT-EU detects breach of the Commission’s mobile device management infrastructure (first breach) |
| February 6, 2026 | Public disclosure of the January MDM breach; later linked to Ivanti EPMM zero-days (CVE-2026-1281, CVE-2026-1340) |
| March 24, 2026 | Second breach discovered — unauthorized access to AWS cloud environment hosting Europa.eu |
| March 25–26, 2026 | Threat actor contacts BleepingComputer, claims 350+ GB exfiltrated, provides screenshots |
| March 27, 2026 | European Commission publicly confirms the AWS cloud breach |
| March 28, 2026 | Investigation ongoing; notification of affected EU entities underway |
What Was Taken
The full scope of exfiltration remains under investigation, but here is what we know so far:
- Multiple databases from the Europa.eu platform — contents not yet publicly specified, but the platform serves as the primary digital interface for EU institutions, agencies, and public-facing policy communication
- Employee data including names and contact information
- Email server access — the attacker demonstrated access to a Commission email server via screenshots shared with media
- Internal files and documents — nature and classification unknown
The Commission has stated it is notifying affected EU entities. The attacker’s claimed volume — 350 GB — has not been independently verified by the Commission, but has not been disputed either.
Notably, the threat actor told reporters they are not pursuing extortion. Instead, they indicated plans to publish the stolen data at a later date. This behavioral pattern — breach, exfiltrate, publicize — is more consistent with hacktivism or state-sponsored operations than with financially motivated cybercrime. No ransomware group has claimed the attack, and no ransom demand has been reported.
The GDPR and NIS2 Irony
There is no diplomatic way to frame this: the European Commission is the author and primary enforcer of the most consequential data protection regulation in modern history. GDPR mandates that organizations implement “appropriate technical and organisational measures” to protect personal data. It requires breach notification to supervisory authorities within 72 hours. It imposes fines of up to 4% of global annual turnover for non-compliance.
The Commission now finds itself subject to its own framework. It must notify the European Data Protection Supervisor (EDPS) — the body it created — about a breach of its own systems. It must demonstrate that its technical and organizational measures were, in fact, appropriate. Given that this is the second breach in eight weeks, that argument will require some creativity.
The NIS2 Directive compounds the problem. Championed by the Commission and currently being transposed into national law across member states, NIS2 establishes mandatory incident reporting requirements, risk management obligations, and supply chain security standards for essential entities. The European Commission is, by any reasonable interpretation, an essential entity. NIS2 requires that such entities implement “state of the art” cybersecurity measures proportionate to the risk.
Two breaches in under sixty days raises a reasonable question: were the measures proportionate?
The timing is almost theatrical. On January 20, 2026 — ten days before the first breach — the Commission held a press conference to announce its new Cybersecurity Package, emphasizing the need for stronger supply chain protections and enhanced incident response across member states. The Commission positioned itself as the authority on how European institutions should defend themselves against exactly the kind of attacks it has now suffered. Twice.
Security professionals will recognize this pattern. The organization that sets the standard is often the last to meet it. Regulatory bodies invest in policy development, compliance frameworks, and enforcement mechanisms. They invest less consistently in their own operational security. The cobbler’s children, as the saying goes, go barefoot.
But there is a more structural reading. The Commission’s breach may actually accelerate its own legislative agenda. Multiple member state policymakers are already citing the incident in support of NIS2 amendments and the proposed Cybersecurity Act 2.0. The victim’s breach is becoming ammunition for the victim’s own policy platform. European cloud providers — OVHcloud, Deutsche Telekom’s T-Systems — are positioning sovereignty-first messaging in the breach’s immediate wake, and Gaia-X, the EU’s long-stalled cloud sovereignty initiative, may finally get the political urgency it has lacked.
The Shared Responsibility Model, Revisited
AWS’s statement — “our services operated as designed” — is technically precise and operationally revealing. It invokes the cloud shared responsibility model, which draws a clear line: AWS secures the infrastructure of the cloud; the customer secures what they put in the cloud.
In this case, the compromise occurred at the identity and access management (IAM) layer — the customer side of the line. At least one AWS account managing the Commission’s cloud infrastructure was compromised. The forensic investigation is ongoing, but the working hypothesis points to credential compromise or misconfigured access controls, not a vulnerability in AWS’s platform.
This is not a novel attack pattern. It is, in fact, the single most common vector for cloud breaches. The specifics vary — phished credentials, leaked API keys, overly permissive IAM policies, lack of multi-factor authentication on privileged accounts — but the underlying failure is the same: organizations migrate workloads to the cloud and assume the provider handles security end-to-end. They do not.
Kellman Meghu, CTO of DeepCove Cybersecurity, framed the challenge directly: “Identity access management (IAM) is hard…the same challenge with all infrastructure.” His recommendations for securing cloud environments at this scale are instructive:
- Use AWS Identity Center for sign-on — eliminate standalone IAM-generated access keys
- Implement “break glass” dual-authentication for administrative accounts, requiring approval from two senior officials
- Maintain multiple isolated AWS Organizations accounts to limit lateral movement
- Store credentials outside AWS using hardware security tokens
These are not exotic controls. They are well-documented best practices that the Commission either did not implement or implemented incompletely. The distinction matters less than the outcome: 350 GB of data walking out the door.
Two Breaches, Two Vectors, One Pattern
The January and March incidents exploited different attack surfaces — Ivanti EPMM zero-days in the first case, likely IAM credential compromise in the second — but they share a common root cause: insufficient defense-in-depth across the Commission’s digital estate.
The January MDM breach was contained in nine hours, which is genuinely fast response work by CERT-EU. But containment speed does not compensate for the fact that the Commission’s mobile device management infrastructure was running software with exploitable zero-day vulnerabilities — the same Ivanti EPMM flaws that simultaneously hit the Dutch Data Protection Authority, the Dutch Council for the Judiciary, and Finland’s Valtori. The same vendor whose products have been the entry point for government breaches dating back to the Norwegian government incident in 2023.
The March AWS breach suggests that the post-incident review from January either did not extend to the Commission’s cloud infrastructure or did not move fast enough. An organization that has just been breached through its MDM layer should immediately audit all adjacent attack surfaces — cloud accounts, identity providers, API keys, service accounts. If that audit occurred, it did not catch whatever weakness the March attacker exploited.
Whether the two incidents are connected — same threat actor, shared reconnaissance, or coordinated campaign — remains unknown. But the operational implication is the same regardless: the Commission’s security posture has systemic gaps that individual incident response cannot close.
What CISOs Should Take From This
If the European Commission — with its institutional resources, access to CERT-EU, and proximity to the continent’s top cybersecurity policy minds — can be breached twice in two months through well-understood attack vectors, every CISO should recalibrate their assumptions about their own exposure.
Immediate Actions
- Audit cloud IAM configurations now. Enumerate all access keys, service accounts, and privileged roles in your cloud environments. Identify any accounts without MFA enforcement. Revoke unused credentials. This is not optional hygiene — it is the most likely vector for your next breach.
- Review your Ivanti deployment. If you run Ivanti EPMM or any Ivanti edge device, confirm you are patched against CVE-2026-1281 and CVE-2026-1340. Check audit logs for anomalous authentication attempts and unusual API calls dating back to at least January.
- Validate your breach response playbook covers cloud-specific scenarios. Traditional IR playbooks built for on-premise environments often miss cloud-native attack patterns — IAM key abuse, cross-account pivoting, S3 exfiltration. If your playbook does not address these, it is incomplete.
Medium-Term Priorities
- Implement cloud account segmentation. The shared responsibility model means your cloud provider will not stop lateral movement within your own accounts. Use separate AWS Organizations (or Azure Management Groups, or GCP Projects) to isolate workloads by sensitivity and function.
- Deploy cloud-native detection. AWS CloudTrail, GuardDuty, and Security Hub are necessary but not sufficient. Invest in behavioral analytics that can identify abnormal data access patterns — particularly bulk exfiltration from databases and storage services.
- Pressure-test your identity stack. Credential compromise is the top cloud attack vector. If you are still relying on long-lived access keys, static credentials, or single-factor authentication for any privileged account, treat that as an open finding in your next risk assessment.
Structural Considerations
- Zero trust is no longer aspirational. The Commission’s breach demonstrates that perimeter-based security — even when that perimeter is a cloud provider’s infrastructure — is insufficient. Every access request must be verified, every session must be scoped, and every privilege must be time-limited.
- Government institutions are high-value targets with private-sector attack surfaces. The Commission runs cloud workloads on the same platforms as every other AWS customer. It faces the same misconfiguration risks, the same credential management challenges, and the same shared responsibility obligations. Sovereign cloud initiatives will not change this fundamental dynamic — they will simply move the responsibility line without eliminating it.
The Bigger Picture
Ilia Kolochenko, CEO of ImmuniWeb, called the breach “a grim warning” and predicted that “politically motivated attacks with highly destructive consequences” will surge through 2026. Analysis from The Meridiem described it as “the highest-level government cloud breach in European history” and drew parallels to the 2015 US Office of Personnel Management breach — the incident that exposed 21.5 million federal employee records and triggered a decade of federal cybersecurity overhauls.
The comparison is apt. The OPM breach became a forcing function for US federal security modernization — FISMA reform, CDM deployment, zero trust mandates. The Commission breach may serve the same role for European institutions, with a compressed timeline. Analysts expect emergency EU cybersecurity directives by Q2 2026, accelerated Cybersecurity Act requirements, and renewed political will behind European cloud sovereignty programs.
Whether that political will translates into operational security improvement is a different question. The Commission has demonstrated, twice now, that writing the rules and following them are different competencies. The GDPR and NIS2 frameworks are sound policy instruments. But policy does not patch servers, rotate credentials, or enforce least-privilege access controls. Operations do.
The investigation continues. The attacker has indicated plans to publish the stolen data. And somewhere in Brussels, the institution that tells the rest of Europe how to handle data breaches is learning what it feels like to be on the receiving end of a notification obligation.
We will update this article as the investigation develops.



