Connect with us

CyberSecurity

Major EU Data Breach: How Hacking Gangs TeamPCP and ShinyHunters Compromised Commission’s Cloud

Published

on

Major EU Data Breach: How Hacking Gangs TeamPCP and ShinyHunters Compromised Commission’s Cloud

The European Union’s cybersecurity landscape has been rocked by a significant incident. In a detailed report, the EU’s Computer Emergency Response Team (CERT-EU) has formally attributed a massive data breach affecting the bloc’s executive body to coordinated actions by two distinct cybercriminal groups. This EU data breach underscores a growing trend of sophisticated, multi-stage attacks targeting critical infrastructure.

The Anatomy of the Attack: A Two-Gang Operation

According to the agency’s findings, the incident was not the work of a single entity. Instead, it involved a chain of events initiated by one group and capitalized on by another. The initial intrusion is credited to a group known as TeamPCP. This group managed to compromise a critical Amazon Web Services (AWS) account used by the European Commission. From this account, they exfiltrated approximately 92 gigabytes of compressed data.

This stolen data, which included sensitive personal information such as names, email addresses, and the contents of emails, was later published online. However, the publication was carried out by a separate, notorious entity: the ShinyHunters hacking group. This dual attribution for a single breach event is a notable development in cyber threat analysis, highlighting complex digital crime ecosystems. A member of ShinyHunters later claimed they had obtained and leaked data that TeamPCP had stolen in earlier operations.

Exploiting the Supply Chain: The Trivy Tool Compromise

So, how did the attackers gain their initial foothold? The breach traces back to March 19. CERT-EU’s investigation reveals that hackers first targeted an open-source security tool named Trivy. Following a compromise of the Trivy project itself, the European Commission inadvertently downloaded a tainted version of this very tool meant to protect its systems.

This compromised tool contained malicious code that allowed TeamPCP to steal a secret API key. Possession of this key was the master stroke. It granted the attackers direct access to the Commission’s AWS cloud infrastructure, specifically the Europa.eu platform used to host official websites and publications. Consequently, they could pivot freely within the system to locate and steal vast amounts of data. For more on securing development tools, read our guide on open-source security best practices.

The Scope and Impact of the Data Exposure

The ramifications of this EU data breach are extensive. The 92GB cache of data is just the starting point. CERT-EU warns that the breach potentially affects the cloud infrastructure of at least 29 other EU entities. Dozens of internal European Commission clients may also have had their data stolen.

Within the published data, analysts found close to 52,000 files containing sent email messages. While many of these are automated system emails with little sensitive content, a significant risk remains. Emails that bounced back with delivery errors likely contain the original user-submitted content in full. This poses a direct and serious risk of personal data exposure for countless individuals who interacted with EU institutions.

A Pattern of Malicious Activity

This incident is not an isolated event for the involved groups. Security researchers, including Aqua Security (the developer of Trivy) and Palo Alto Networks Unit 42, have linked TeamPCP to a broader campaign of supply chain attacks. Their modus operandi involves compromising open-source security projects to gain access to the developers and organizations that use them.

By stealing credentials and API keys from developers, these hackers gain keys to far more sensitive systems. As Unit 42 noted, this access provides them “the ability to hold compromised organizations for ransom, demanding extortion payments,” linking their activities to ransomware and crypto-mining campaigns. Understanding these supply chain threats is crucial for modern defense.

Response and Ongoing Analysis

In the wake of the breach, what is being done? CERT-EU has confirmed it is actively engaged with all affected organizations to manage the fallout and bolster defenses. The agency continues to analyze the full dataset that was leaked online to understand the complete scope of the exposure.

Meanwhile, a spokesperson for the European Commission stated the body was closed at the time of the report and would provide further comment later. This incident serves as a stark reminder of the vulnerabilities inherent in complex digital supply chains, where a single compromised tool can cascade into a continent-scale data disaster.

Ultimately, this breach illustrates a critical evolution in cyber threats. It’s no longer just about breaking in; it’s about manipulating the very tools of defense to enable the theft. For EU institutions and organizations worldwide, the lesson is clear: vigilance must extend beyond perimeter security to encompass every link in the software development and deployment chain.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

CyberSecurity

The Storm Infostealer: A New Era of Remote Credential Theft

Published

on

The Storm Infostealer: A New Era of Remote Credential Theft

A dangerous evolution in credential theft has emerged from the digital shadows. Security analysts at Varonis have identified a sophisticated new Storm infostealer that operates with a chilling efficiency. Instead of risking detection by decrypting stolen data on a victim’s computer, this malware quietly packages everything and ships it off to the attacker’s own servers. This fundamental shift makes traditional endpoint defenses far less effective, marking a significant escalation in the cybercrime arms race.

How Storm Infostealer Evades Detection

To understand Storm’s threat, we must first look at what came before. Historically, information stealers worked locally. They would infiltrate a system, load libraries to access browser databases, and decrypt saved passwords and cookies right there on the victim’s machine. This activity, however, left clear footprints—processes accessing sensitive files, unusual network calls—that modern security tools learned to recognize and block.

Then, the landscape changed. Building on this, major browsers like Google Chrome introduced stronger, app-bound encryption. This made local decryption incredibly difficult, forcing malware authors to find new methods. Initial workarounds involved complex code injection or abusing debugging features, but these too left traces for vigilant security software to find.

The Remote Decryption Advantage

Therefore, the creators of Storm adopted a radically different approach. The malware acts as a sophisticated collector. It harvests encrypted credential files, session cookies, autofill data, and even credit card information directly from the browser’s secure storage. Crucially, it does not attempt to crack them open locally. Instead, it transmits the encrypted loot back to a command server controlled by the attacker. The decryption happens safely in the attacker’s own environment, completely bypassing the victim’s antivirus and endpoint detection systems. This server-side processing is a core reason why the Storm infostealer is so concerning to experts.

What Does the Storm Infostealer Steal?

The breadth of data targeted by Storm is comprehensive, designed to give attackers maximum leverage. After infection, it systematically collects a victim’s entire digital identity. This includes saved passwords, active session cookies, browsing history, and Google account tokens. Furthermore, it captures autofill data and stored credit card details. One compromised browser can hand an attacker the keys to corporate SaaS platforms, internal tools, and cloud environments without ever triggering a single password alert.

In addition to browser data, Storm casts a wider net. It scours user directories for documents, captures system information and screenshots, and extracts session data from popular messaging apps like Telegram, Signal, and Discord. Perhaps most alarmingly for some, it specifically targets cryptocurrency wallets, pilfering data from both browser extensions and dedicated desktop applications. According to researchers, all this activity runs directly in the computer’s memory to minimize its footprint and further reduce the chance of detection.

Automated Session Hijacking and Criminal Economics

Beyond mere data collection, Storm automates the next critical step: exploitation. Most stealers simply dump raw logs into a buyer’s panel, requiring manual effort to sift through and use the stolen credentials. Storm changes this equation. It automatically feeds stolen Google Refresh Tokens into its operator panel. Simultaneously, it provides a geographically matched SOCKS5 proxy. This combination allows the criminal to silently restore the victim’s authenticated session from a location that appears legitimate, enabling seamless account takeover and fraud.

On the criminal marketplace, this capability comes at a price. Varonis reports that access to the Storm infostealer is sold for less than $1,000 per month, making it an accessible tool for a wide range of threat actors. During their investigation, the company’s threat intelligence team identified 1,715 victim entries in Storm’s panel, with connections originating from countries including the United States, India, Brazil, Indonesia, Vietnam, and Ecuador. The diversity of network sources suggests active, widespread malicious campaigns.

High-Value Targets and the Broader Threat

The credentials stolen by Storm are not random. They are focused on high-value platforms that offer direct financial or strategic payoff. This includes major social media and communication giants like Facebook and Twitter/X. On the financial front, the malware aggressively targets leading cryptocurrency exchanges and services such as Coinbase, Binance, Blockchain.com, and Crypto.com.

Consequently, this stolen data fuels a thriving underground economy. Credentials are packaged and sold on dark web marketplaces, where they are used for everything from straightforward financial fraud and account resale to serving as the initial foothold for more advanced, targeted attacks against individuals and organizations. For more on protecting against such initial access threats, read our guide on endpoint security best practices.

Ultimately, the emergence of Storm signals a troubling trend toward more resilient and automated cybercrime tools. By moving the decryption process off the victim’s machine, attackers have found a way to neutralize a key defensive detection method. This development underscores the need for a layered security approach that includes robust network monitoring, user education on phishing threats, and advanced threat-hunting capabilities to identify anomalous data exfiltration, even when it’s encrypted. For deeper insights into the malware landscape, explore our analysis of the evolution of information stealers.

Continue Reading

CyberSecurity

ICE Confirms Purchase and Use of Paragon Spyware in Drug Trafficking Investigations

Published

on

ICE Confirms Purchase and Use of Paragon Spyware in Drug Trafficking Investigations

In a significant disclosure, the acting director of U.S. Immigration and Customs Enforcement has confirmed the agency acquired and deployed spyware from Paragon Solutions for use in drug trafficking cases. This revelation, detailed in a letter to lawmakers, spotlights the ongoing tension between national security imperatives and the protection of civil liberties in the digital age.

Official Justification for Spyware Deployment

Acting Director Todd Lyons outlined the rationale in his correspondence. He stated he approved the use of “cutting-edge technological tools” by the Homeland Security Investigations (HSI) unit. The stated goal is to counter the exploitation of encrypted communication platforms by foreign terrorist organizations and criminal networks. Consequently, this official acknowledgment provides a rare window into the operational tactics employed by domestic law enforcement agencies.

Navigating the Encryption Dilemma

For years, law enforcement has argued that strong encryption creates insurmountable barriers to criminal investigations. Tools like those from Paragon Solutions offer a potential workaround by extracting data directly from a target’s device. However, this capability sits at the heart of a fierce debate. Critics consistently warn that such powerful surveillance technology, once acquired, is prone to misuse and threatens the privacy of journalists, activists, and political dissidents.

Constitutional Assurances and Mounting Skepticism

In his letter, Director Lyons sought to preempt concerns by asserting that ICE’s use of the spyware would “comply with constitutional requirements.” He further certified that the tool did not pose significant security risks or risks of improper use by foreign entities. Building on this, the agency appears to be framing the technology as a necessary and controlled instrument for high-stakes investigations.

Nevertheless, these assurances have failed to satisfy key lawmakers. Representative Summer Lee, who was among those requesting information from ICE, expressed deep skepticism. “Instead of answering the serious constitutional and civil rights concerns that we raised, DHS is asking the public to accept vague assurances and fear-based justifications,” Lee stated. This response indicates a clear disconnect between the agency’s internal risk assessment and the external scrutiny from legislative overseers.

A Contract Mired in Controversy and Scandal

The path to this deployment was neither straightforward nor without controversy. ICE initially signed a contract with the U.S.-Israeli spyware maker in 2024. Almost immediately, the Biden administration suspended the deal. This pause was to determine if it complied with an executive order restricting U.S. agencies from using spyware that could target Americans abroad or facilitate human rights abuses.

By September 2025, ICE had lifted the block and reactivated the contract. Until now, however, it was unclear whether the agency had moved beyond procurement to actual operational use. This confirmation from the acting director settles that question definitively. For more context on government surveillance tools, you can read our analysis on evolving surveillance trends.

Paragon’s Troubled International Profile

The decision to proceed with Paragon is notable given the company’s recent history. Paragon has been entangled in a major scandal in Italy, where its Graphite spyware was allegedly used to target journalists and pro-immigration activists. In reaction to the fallout, Paragon severed its ties with Italian intelligence agencies. This international context raises pertinent questions about vendor selection and the lifecycle accountability of surveillance technologies purchased by the U.S. government.

Civil Rights and Community Impact Concerns

The implications of domestic spyware use extend far beyond the specific drug cases cited by ICE. Representative Lee emphasized the broader threat, noting that the agency is moving forward “with invasive spyware technology inside the United States.” She highlighted the populations most vulnerable to potential overreach, including immigrants, Black and brown communities, journalists, and organizers.

“The people most at risk… deserve more than secrecy and deflection from an agency with a long record of overreach and abuse,” Lee argued. This perspective underscores a fundamental fear: that tools justified for targeting foreign terrorists and drug traffickers will inevitably be turned inward, chilling dissent and undermining trust. Our previous report on digital privacy rights explores these themes in greater depth.

Ultimately, the ICE letter does more than confirm a procurement detail; it reignites a critical conversation about the boundaries of state power in a digitally connected world. While the fight against transnational crime demands effective tools, the precedent set by deploying commercial spyware domestically carries profound and lasting consequences for civil liberties.

Continue Reading

CyberSecurity

Venom PhaaS: The New Phishing-as-a-Service Platform Behind Sophisticated Executive Credential Theft

Published

on

Venom PhaaS: The New Phishing-as-a-Service Platform Behind Sophisticated Executive Credential Theft

Security researchers have exposed a highly targeted credential theft campaign that operated for months, focusing on top-tier executives at major global corporations. This operation, analyzed by experts at Abnormal Security, was powered by a previously unseen and sophisticated phishing platform known as Venom.

This discovery signals a dangerous evolution in the cyber threat landscape. Building on this, the campaign’s success was not due to a single breakthrough but to the meticulous integration of multiple evasion and deception techniques.

The Anatomy of a Deceptive Phishing Campaign

The attackers employed a multi-layered approach to lure their high-value targets. Instead of generic spam, they crafted emails that appeared to be SharePoint document-sharing notifications. These messages were sent to a curated list of CEOs, CFOs, and other senior leaders across more than twenty different industries.

Personalized Lures and Evasion Tactics

To appear legitimate, the emails used financial report themes and contained a QR code directly in the body, urging the recipient to scan it. However, the deception went much deeper. Each email was uniquely structured with randomized HTML elements to avoid signature-based detection systems.

Furthermore, the phishing template automatically generated a fake, multi-message email thread. This thread was personalized with the target’s own email prefix and display name, complete with a fabricated signature containing their real details. A second, randomly generated persona was added as a correspondent, and the message bodies used multilingual text from fixed templates to mimic authentic corporate chatter.

Bypassing Human and Automated Defenses

Once a target scanned the QR code, they were taken to a landing page designed as a verification checkpoint. This page’s primary function was to filter out non-human visitors, such as security scanners, sandboxes, or automated analysis tools.

As a result, only visitors who passed these checks were directed to the actual credential-harvesting page. Everyone else was sent to a dead end, leaving no trace of malicious activity for security teams to find. This step was crucial for isolating real human targets from automated defenses.

How This Phishing Platform Neutralizes Multi-Factor Authentication

The campaign’s most alarming feature was its ability to render multifactor authentication (MFA) ineffective. Victims faced one of two sophisticated harvesting methods.

In the first, an adversary-in-the-middle (AiTM) setup perfectly cloned the victim’s real corporate login portal. It included company branding, a pre-filled email field, and even mimicked the organization’s actual identity provider. While the victim entered their credentials and MFA code, the platform silently relayed this information to the legitimate Microsoft servers, simultaneously giving the attacker access.

Alternatively, the second method avoided login forms altogether. It tricked the user into approving a device sign-in via Microsoft’s legitimate device code flow, which then handed access tokens directly to the attacker. This meant the attacker never needed to see the password at all.

Ensuring Persistent Access

In the AiTM mode, the attacker would quietly register a secondary MFA device on the compromised account, leaving the victim’s original authenticator untouched. In the device code mode, the stolen refresh token remained valid even after a password reset, unless an administrator manually revoked all active sessions—a step not commonly taken by default.

Therefore, the attack blended seamlessly into normal authentication flows, evaded detection, and maintained long-term access.

Venom PhaaS: A Force Multiplier for Cybercrime

The engine behind this operation was the Venom Phishing-as-a-Service platform. This platform featured a professional licensing model, structured token storage, and a full campaign management interface, indicating a high level of commercial development.

Critically, at the time of discovery, Venom had not appeared in any public threat intelligence feeds or open marketplaces, suggesting it is a closed-access, private service. This makes the phishing platform particularly dangerous, as its capabilities are not limited to a single operator but can be rented by others.

Researchers warn that the discovery of Venom acts as a force multiplier. The techniques documented are engineered to work together in an end-to-end pipeline where each stage actively protects the next. Consequently, defensive strategies that rely on MFA as an impenetrable final barrier require immediate reassessment. For more on evolving authentication threats, see our analysis on advanced MFA bypass techniques.

In summary, the Venom platform represents a significant shift towards industrialized, service-based cybercrime. Its focus on high-value targets, sophisticated evasion, and MFA circumvention means organizations must adopt more proactive, behavior-based security measures to defend their most critical accounts.

Continue Reading

Trending