<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Aws on cybercrime.club</title><link>https://cybercrime.club/tags/aws/</link><description>Recent content in Aws on cybercrime.club</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 04 Apr 2026 06:09:10 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/aws/index.xml" rel="self" type="application/rss+xml"/><item><title>European Commission Confirms Cloud Breach — Trivy Supply Chain Attack Cascades Into 30+ EU Entities</title><link>https://cybercrime.club/posts/european-commission-trivy-supply-chain-breach/</link><pubDate>Sat, 04 Apr 2026 06:09:10 -0400</pubDate><guid>https://cybercrime.club/posts/european-commission-trivy-supply-chain-breach/</guid><description>&lt;h2 id="what-happened">What Happened&lt;/h2>
&lt;p>The European Commission has confirmed a significant data breach originating from the &lt;a href="https://cybercrime.club/posts/teampcp-supply-chain-cascade-vect-ransomware/">TeamPCP supply chain attack&lt;/a> we covered earlier this week. CERT-EU published findings on April 3 attributing the intrusion to TeamPCP for the initial access and ShinyHunters for the subsequent data exfiltration and public leak.&lt;/p>
&lt;p>The bottom line: the Commission&amp;rsquo;s CI/CD infrastructure downloaded a poisoned copy of the Trivy vulnerability scanner after the March 19 compromise. That gave TeamPCP an AWS API key, which they used to pivot into the Commission&amp;rsquo;s cloud accounts and extract approximately 92 GB of compressed data. ShinyHunters then published the dump online after extortion demands went unanswered.&lt;/p></description></item></channel></rss>