What Happened at the European Commission?
The ShinyHunters hacker group — responsible for some of the largest data theft operations on record — has claimed to have exfiltrated more than 350GB of data from cloud systems belonging to the European Commission. The Commission has confirmed a cyber intrusion occurred and that an investigation is under way, according to reporting by SecurityWeek. ShinyHunters is not a new or unsophisticated actor. The group rose to prominence in 2020 after breaching more than 70 organisations, including Tokopedia, Wishbone, and Microsoft's GitHub repositories. Their operational approach is consistent: target cloud-hosted storage, exfiltrate at scale before detection, then use the stolen data as leverage or sell it on criminal marketplaces. A 350GB haul from a major governmental institution fits that model precisely. What makes this incident particularly significant is the target. The European Commission sits at the centre of EU policy, legislation, and intergovernmental coordination. The data it holds — internal communications, policy documents, personnel records, correspondence with member state governments — carries both intelligence value and the potential for political exploitation.
Why Cloud Environments Remain a Primary Target
Cloud adoption accelerated sharply across public sector organisations following the COVID-19 pandemic. The European Commission, like most large governmental bodies, migrated significant workloads to cloud infrastructure to support distributed working and improve operational resilience. That migration created new attack surface — and in many cases, security controls did not keep pace with the speed of deployment. Cloud environments are attractive to groups like ShinyHunters for several reasons. Misconfigured storage buckets, over-permissioned service accounts, and weak identity controls are common across organisations of all sizes. Once an attacker gains initial access — often through a compromised credential, a phishing campaign, or an exposed API key — lateral movement inside cloud environments can be swift and difficult to detect without purpose-built monitoring. The sheer volume of the alleged theft, 350GB, suggests the attackers had sustained access rather than a smash-and-grab intrusion. That kind of dwell time is rarely the result of a single misconfiguration. It typically points to a combination of factors: inadequate access controls, insufficient logging and alerting, and an absence of data movement monitoring that would flag large-scale exfiltration in progress. Organisations that want to understand their real exposure to this type of attack benefit from continuous attack surface monitoring. Hadrian, Kyanite Blue's AI-driven attack surface management platform, maps externally visible assets and identifies the kind of cloud misconfigurations and exposed interfaces that provide threat actors with their initial foothold. You can find out more at /products/hadrian.
The Data Exfiltration Problem Nobody Talks About Enough
Most organisations focus their security investment on keeping attackers out. Fewer invest proportionately in detecting and blocking data leaving the environment once a breach is under way. This is the gap that ShinyHunters consistently exploits. Data exfiltration — the unauthorised transfer of data out of an organisation's environment — is the point at which a cyber incident becomes a data breach. In many ransomware operations, exfiltration now precedes encryption. Attackers steal the data first, then encrypt systems, giving them two forms of leverage. Even where encryption never occurs, stolen data has commercial and strategic value. The critical window is between the moment exfiltration begins and the moment it is detected. The longer that window, the greater the volume of data lost. In the European Commission case, 350GB suggests that window was wide open for an extended period. BlackFog, Kyanite Blue's anti data exfiltration platform, is specifically built to close that window. It operates at the device level, monitoring outbound data flows in real time and blocking unauthorised transfers before they complete — regardless of whether the exfiltration attempt uses standard protocols, encrypted channels, or obfuscated methods. For any organisation handling sensitive data in cloud or hybrid environments, ADX capability is no longer optional. More information is available at /products/blackfog.
What This Means for UK and European Organisations
UK public sector bodies and private organisations working with EU institutions face a direct lesson from this incident. If ShinyHunters successfully extracted 350GB from the European Commission, the same group — and others operating at similar capability levels — will apply the same techniques against less well-resourced targets. UK organisations subject to the UK GDPR have a legal obligation to report personal data breaches to the Information Commissioner's Office within 72 hours of becoming aware of a breach. That obligation assumes you can detect a breach when it happens. If you lack the monitoring and alerting infrastructure to identify large-scale data movement, the 72-hour clock may start running long after you have any hope of meeting it. Beyond compliance, there is the reputational and operational question. Organisations that supply services to government bodies, handle citizen data, or operate in regulated sectors — financial services, healthcare, legal, critical national infrastructure — hold data that carries real value to criminal and state-sponsored actors alike. The European Commission breach is a reminder that no organisation is too prominent, too well-resourced, or too politically sensitive to be targeted. For organisations using Sophos MDR, 24/7 managed detection and response means that unusual data movement patterns are identified and escalated by human analysts around the clock, not left to automated rules that sophisticated actors know how to evade. Find out more at /products/sophos.
How Could This Attack Have Been Prevented or Contained?
Without full visibility into the technical specifics of how ShinyHunters gained access to Commission systems, it would be inaccurate to prescribe a definitive prevention playbook. What the available evidence does allow is an assessment of the controls that would have limited the damage. First, credential and identity hygiene. ShinyHunters have historically obtained initial access through phishing, credential stuffing against exposed services, and compromised third-party accounts. Strong multi-factor authentication across all cloud access points, combined with privileged access management, reduces the likelihood that a single compromised credential enables broad cloud access. Second, least-privilege access controls. A 350GB exfiltration requires either a single account with access to a very large data store, or multiple accounts with access to different repositories. Strict least-privilege policies — where each account or service principal can access only what it specifically needs — contain the blast radius of any single compromised credential. Third, real-time data movement monitoring. This is where many organisations have a gap. Standard SIEM logging captures events, but does not necessarily alert on the behavioural pattern of large-scale data staging and transfer. Purpose-built ADX tools close this gap. Fourth, third-party access review. ShinyHunters have previously accessed target environments through compromised supply chain partners rather than direct attack. Any organisation connected to EU institutions — or operating in ecosystems with shared cloud tenancies — should audit what third-party access exists and whether it is still necessary. Panorays, Kyanite Blue's third-party risk management platform, provides continuous monitoring of supply chain partner security posture, so that a vendor compromise does not become your breach. See /products/panorays for details.
- Enforce MFA on all cloud access points, including service accounts and API integrations
- Apply least-privilege principles to cloud storage permissions and audit them quarterly
- Deploy real-time data exfiltration monitoring, not just perimeter controls
- Review and restrict third-party access to cloud environments on a continuous basis
- Ensure endpoint protection covers any device that can access cloud-hosted data
ShinyHunters: Understanding the Threat Actor
ShinyHunters first appeared publicly in 2020 and quickly became one of the most prolific data theft operations active on criminal forums. The group is believed to operate across multiple individuals rather than as a single actor, and has been linked to breaches affecting hundreds of millions of individual records across sectors including retail, telecoms, healthcare, and now government. In May 2023, the US Department of Justice indicted Sebastien Raoult, a French national, on charges connected to ShinyHunters operations, and he was subsequently extradited from Morocco and sentenced in the US. The indictment and sentencing did not end ShinyHunters activity. The group, or those operating under its banner, has continued to claim breaches, including the high-profile Ticketmaster breach in 2024 in which data on an estimated 560 million customers was allegedly stolen (reported by multiple sources including Wired and BBC News). This persistence matters. Law enforcement action disrupts threat groups but rarely eliminates them. Organisations cannot rely on the assumption that a named threat actor has been neutralised. The techniques ShinyHunters employs — targeting cloud storage, exploiting identity weaknesses, exfiltrating at volume — are not unique to this group. They are widely documented and actively used across criminal and state-sponsored actors globally.
The Pattern This Incident Reveals
The European Commission breach is not an isolated event. It is the latest in a sustained pattern in which well-resourced threat actors successfully extract large volumes of data from organisations that have invested heavily in perimeter security but have gaps in their cloud security posture, identity controls, and data movement monitoring. The pattern is consistent across the ShinyHunters portfolio and across the broader threat landscape: attackers move faster than defenders when defenders rely on static controls and periodic reviews. The organisations that contain breaches before they become headline events tend to share common characteristics — continuous monitoring, behavioural detection rather than signature-based controls, and a clear understanding of where their sensitive data lives and how it moves. For UK and Australasian organisations assessing their own posture in light of this breach, the starting point is knowing what your external attack surface looks like to a motivated threat actor. From there, the question becomes whether your controls would detect and block data leaving your environment at volume, and whether your incident response capability is fast enough to matter. Kyanite Blue works with organisations across the UK, New Zealand, and Australia to answer those questions with evidence rather than assumption. If you want an objective view of your current exposure, our team is the right starting point.
Frequently Asked Questions
Who are ShinyHunters and why are they dangerous?
ShinyHunters is a criminal threat group responsible for some of the largest data theft operations since 2020, with alleged victims including Ticketmaster, Microsoft GitHub repositories, and now the European Commission. They target cloud-hosted data at scale, typically exploiting weak credentials or misconfigured storage. Their activity continued despite a 2023 US Department of Justice prosecution and indictment.
How can organisations prevent large-scale data exfiltration like the European Commission breach?
Preventing large-scale exfiltration requires layered controls: multi-factor authentication on all cloud access, least-privilege storage permissions, real-time anti data exfiltration (ADX) monitoring to block unauthorised outbound transfers, and continuous attack surface management to identify exposed cloud assets before attackers do. No single control is sufficient — the combination closes the gaps attackers rely on.
What are UK organisations' legal obligations if they suffer a data breach?
Under UK GDPR, organisations must report personal data breaches to the Information Commissioner's Office within 72 hours of becoming aware of the breach. This means detection capability is a compliance requirement, not just a security best practice. Organisations without real-time monitoring may not become aware of a breach until well after the reporting window has closed.