Company Details
european-commission
41,562
2,433,673
92
europa.eu
0
EUR_2644357
In-progress


European Commission Vendor Cyber Rating & Cyber Score
europa.euThe Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budget and the policy programmes (agriculture, fisheries, research etc.) in cooperation with authorities in the member countries. Visit http://www.europa.eu/ if you want to learn more about the EU, or call the free service number 00 800 6789 10 11 from anywhere in the EU, they speak all 24 official languages. Disclaimer: The European Commission is working to ensure that social networks respect the highest standards of data protection. All users of social networks should be particularly careful about how they disclose their personal information and about how it may be used by third parties and the social network themselves. The presence of the European Commission on LinkedIn does not mean that we endorse or in any way agree with the privacy policy or practices of this professional social media network. Read more about our social media policy → europa.eu/!dyJq74
Company Details
european-commission
41,562
2,433,673
92
europa.eu
0
EUR_2644357
In-progress
Between 700 and 749

European Commission Global Score (TPRM)XXXX

Description: EU Commission’s Europa Web Platform Hit by Cyberattack, Data Likely Stolen On March 24, the European Commission confirmed a cyberattack targeting its cloud infrastructure hosting the Europa web platform, a key portal for EU communications and services. The incident, detected and contained swiftly, is under investigation, with early findings indicating that data was exfiltrated from affected websites. The Commission stated that internal systems remained unaffected, though it did not disclose the scope of the stolen data or attribute the attack to any group or individual. The breach follows a pattern of rising cyber threats against EU institutions, with no further details provided on potential motives or methods used. The attack was publicly disclosed on March 27, as the Commission continues to assess the full impact. No disruption to critical operations has been reported. The incident underscores ongoing vulnerabilities in public-sector digital infrastructure amid geopolitical tensions.
Description: EU Commission Investigates Cloud Breach After Threat Actor Steals 350GB of Data The European Commission is probing a security breach after a threat actor infiltrated its Amazon cloud infrastructure, gaining access to sensitive employee data. While the EU’s executive body has not publicly acknowledged the incident, sources confirmed to *BleepingComputer* that at least one account managing the compromised cloud environment was affected. The attack was swiftly detected, prompting the Commission’s cybersecurity incident response team to launch an investigation. The threat actor, who claimed responsibility, told *BleepingComputer* they exfiltrated over 350GB of data including multiple databases and provided screenshots as proof of access to employee information and an internal email server. Unlike typical ransomware attacks, the actor stated they have no plans to extort the Commission but intend to leak the data online at a later date. This breach follows a separate incident in January, when the Commission disclosed a hack of its mobile device management platform, linked to vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) software. Similar attacks targeted other European institutions, including Finland’s Valtori and the Dutch Data Protection Authority. The incidents coincide with heightened cybersecurity concerns in the EU. In January, the Commission proposed new legislation to bolster defenses against state-backed cyber threats, while the Council of the European Union recently sanctioned three Chinese and Iranian firms for cyberattacks on critical infrastructure.
Description: EU Commission Detects Cyberattack on Mobile Device Management Systems On January 30, CERT-EU, the European Commission’s cybersecurity team, identified a cyberattack targeting the Commission’s IT infrastructure, specifically systems used for mobile device management. The incident was swiftly contained, with affected systems restored within nine hours. While no mobile devices were compromised, CERT-EU confirmed that hackers may have accessed personal data of some European Commission staff, including names and phone numbers. The agency is conducting a full review to strengthen cybersecurity measures and prevent future breaches. The European Commission emphasized its commitment to securing internal systems, framing the response as part of a broader EU initiative to bolster cybersecurity across all institutions. This effort aligns with the recently introduced Cybersecurity Package, announced on January 20, aimed at enhancing resilience against growing cyber and hybrid threats targeting critical services and democratic institutions. The incident follows recent cybersecurity breaches affecting other European entities, including the European Space Agency and major firms targeted by access system vulnerabilities.
Description: The European Parliament website faced a sophisticated cyber attack. It disrupted its services moments after members voted to declare Russia a state sponsor of terrorism. They have a strong indication that it is from Killnet, the hackers with links to Russia indeed..


European Commission has 94.81% more incidents than the average of same-industry companies with at least one recorded incident.
European Commission has 156.41% more incidents than the average of all companies with at least one recorded incident.
European Commission reported 3 incidents this year: 2 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
European Commission cyber incidents detection timeline including parent company and subsidiaries

The Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budget and the policy programmes (agriculture, fisheries, research etc.) in cooperation with authorities in the member countries. Visit http://www.europa.eu/ if you want to learn more about the EU, or call the free service number 00 800 6789 10 11 from anywhere in the EU, they speak all 24 official languages. Disclaimer: The European Commission is working to ensure that social networks respect the highest standards of data protection. All users of social networks should be particularly careful about how they disclose their personal information and about how it may be used by third parties and the social network themselves. The presence of the European Commission on LinkedIn does not mean that we endorse or in any way agree with the privacy policy or practices of this professional social media network. Read more about our social media policy → europa.eu/!dyJq74


Join Florida’s talented workforce to fulfill your professional goals and achieve a meaningful career. Our talented public servants work hard to serve more than 19 million residents across Florida, and you, too, can realize success in the Sunshine State. Working in Florida’s state government mean
Official LinkedIn page for the state of Oregon. Oregon is a state in the Pacific Northwest region of the United States. It is located on the Pacific coast, with Washington to the north, California to the south, Nevada on the southeast and Idaho to the east. The Columbia and Snake rivers delineate mu

O Instituto Nacional do Seguro Social (INSS) é uma autarquia do Governo Federal do Brasil que recebe as contribuições para a manutenção do Regime Geral da Previdência Social, sendo responsável pelo pagamento da aposentadoria, pensão por morte, auxílio-doença, auxílio-acidente, entre outros benefício

Cape Town, or the Mother City, is South Africa’s oldest city, its second-most populous and the legislative capital. It is made up of a diverse population, a rich history, world-famous tourist attractions and an exciting calendar of international and local events. More than 231 councillors and 26 22

Maryland is on the path to becoming the best state in the nation. Referred to as “America in Miniature”, Maryland embodies the very spirit of the United States. Maryland is home to ethnic groups of every origin, just about every natural feature, and much like our country, opportunity! If you are

#MeTeemmeHelsingin Helsingin kaupunki on Suomen suurin työnantaja, jonka palveluksessa on lähes 39 000 ammattilaista ja asiantuntijaa. Helsingin kaupunki tarjoaa henkilöstölle monipuolisia, mielenkiintoisia ja yhteiskunnallisesti merkittäviä työtehtäviä, hyvät mahdollisuudet kehittymiseen, ammatti

Working for Amsterdam means working for the most beautiful city in the world. Think of its rich history, the role Amsterdam plays internationally, and events such as Sail, Gay Pride and King’s Day. Of course everybody wants to visit Amsterdam, or work or live here. As you can probably imagine, work

Work with the Alberta government to build a stronger province for current and future generations. We offer diverse and rewarding employment opportunities in an environment that encourages continuous learning and career growth. We are one of the largest employers in Alberta with over 27,000 empl

EThekwini Municipality is a Metropolitan Municipality found in the South African province of KwaZulu-Natal. Home to the world-famous city of Durban. EThekwini is the largest City in the province and the third largest city in the country. It is a sophisticated cosmopolitan city of over 3 468 088 peop
.png)
The European Union's key data privacy regulators have said that they support streamlining compliance and reporting requirements under plans...
The EU Commission warns of rising state‑backed cyber threats and proposes strict new CSA2 supply chain rules requiring scrutiny of vendors'...
A security breach at the European Commission has enabled a threat actor to steal hundreds of gigabytes of data from its Amazon cloud...
European Commission department chiefs and their deputies were told to stop gabbing on the encrypted app following a series of cyberattacks...
The European Commission has announced it will help fund Ukrainian innovation with €20 million for 41 promising start-ups and small and...
If you want to make further contribution, you can do so until 28 November 2023 on the Have your Say portal. Have your Say. On the 13th of September 2023,...
European Commission suffered a cyberattack targeting the cloud infrastructure behind its Europa.eu platform, data was stolen and...
The European Commission – the same regulatory body that slaps big fines on tech heavyweights like Apple and Meta and issues AI safety...
The European Commission has launched an investigation into a breach of its AWS cloud environment after a threat actor claimed to have stolen...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of European Commission is https://commission.europa.eu.
According to Rankiteo, European Commission’s AI-generated cybersecurity score is 747, reflecting their Moderate security posture.
According to Rankiteo, European Commission currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, European Commission has been affected by multiple supply chain cyber incidents. The affected supply chain sources and their corresponding incident IDs are:
According to Rankiteo, European Commission is not certified under SOC 2 Type 1.
According to Rankiteo, European Commission does not hold a SOC 2 Type 2 certification.
According to Rankiteo, European Commission is not listed as GDPR compliant.
According to Rankiteo, European Commission does not currently maintain PCI DSS compliance.
According to Rankiteo, European Commission is not compliant with HIPAA regulations.
According to Rankiteo,European Commission is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
European Commission operates primarily in the Government Administration industry.
European Commission employs approximately 41,562 people worldwide.
European Commission presently has no subsidiaries across any sectors.
European Commission’s official LinkedIn profile has approximately 2,433,673 followers.
European Commission is classified under the NAICS code 92, which corresponds to Public Administration.
No, European Commission does not have a profile on Crunchbase.
Yes, European Commission maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/european-commission.
As of April 02, 2026, Rankiteo reports that European Commission has experienced 4 cybersecurity incidents.
European Commission has an estimated 12,424 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and containment measures with incident swiftly contained, and remediation measures with affected systems restored, and recovery measures with systems restored within nine hours, and enhanced monitoring with full review to strengthen cybersecurity measures, and incident response plan activated with yes, and communication strategy with limited public acknowledgment, and incident response plan activated with yes, and containment measures with swift containment..
Title: Cyber Attack on European Parliament Website
Description: The European Parliament website faced a sophisticated cyber attack. It disrupted its services moments after members voted to declare Russia a state sponsor of terrorism. There is a strong indication that it is from Killnet, the hackers with links to Russia.
Type: Cyber Attack
Threat Actor: Killnet
Motivation: Political
Title: Cyberattack on EU Commission Mobile Device Management Systems
Description: CERT-EU detected a cyberattack targeting the European Commission’s IT infrastructure, specifically systems used for mobile device management. The incident was contained, and affected systems were restored within nine hours. Hackers may have accessed personal data of some European Commission staff, including names and phone numbers.
Date Detected: 2024-01-30
Date Publicly Disclosed: 2024-01-30
Type: Cyberattack
Title: EU Commission Cloud Breach: Threat Actor Steals 350GB of Data
Description: The European Commission is investigating a security breach after a threat actor infiltrated its Amazon cloud infrastructure, gaining access to sensitive employee data. The threat actor exfiltrated over 350GB of data, including multiple databases and employee information, with plans to leak it online.
Type: Data Breach
Attack Vector: Cloud Infrastructure Compromise
Motivation: Data Exfiltration (Non-Ransomware)
Title: EU Commission’s Europa Web Platform Hit by Cyberattack, Data Likely Stolen
Description: On March 24, the European Commission confirmed a cyberattack targeting its cloud infrastructure hosting the Europa web platform, a key portal for EU communications and services. The incident, detected and contained swiftly, is under investigation, with early findings indicating that data was exfiltrated from affected websites. The Commission stated that internal systems remained unaffected, though it did not disclose the scope of the stolen data or attribute the attack to any group or individual. The breach follows a pattern of rising cyber threats against EU institutions, with no further details provided on potential motives or methods used.
Date Detected: 2024-03-24
Date Publicly Disclosed: 2024-03-27
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: European Parliament website

Data Compromised: Personal data of some European Commission staff, including names and phone numbers
Systems Affected: Mobile device management systems
Downtime: 9 hours
Operational Impact: Systems restored within nine hours
Identity Theft Risk: Potential risk due to exposure of personal data

Data Compromised: 350GB of data, including databases and employee information
Systems Affected: Amazon cloud infrastructure, internal email server
Brand Reputation Impact: Potential reputational damage to the European Commission
Identity Theft Risk: High (employee data exposed)

Data Compromised: Yes
Systems Affected: Europa web platform (cloud infrastructure)
Operational Impact: No disruption to critical operations reported
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal data, Databases, Employee Information, Internal Email Server Data and .

Entity Name: European Parliament
Entity Type: Government
Industry: Governmental
Location: Europe

Entity Name: European Commission
Entity Type: Government
Industry: Public Sector
Location: European Union
Customers Affected: European Commission staff

Entity Name: European Commission
Entity Type: Government Institution
Industry: Public Sector
Location: European Union
Size: Large
Customers Affected: Employees

Entity Name: European Commission
Entity Type: Government
Industry: Public Sector
Location: European Union

Incident Response Plan Activated: Yes
Containment Measures: Incident swiftly contained
Remediation Measures: Affected systems restored
Recovery Measures: Systems restored within nine hours
Enhanced Monitoring: Full review to strengthen cybersecurity measures

Incident Response Plan Activated: Yes
Communication Strategy: Limited public acknowledgment

Incident Response Plan Activated: Yes
Containment Measures: Swift containment
Incident Response Plan: The company's incident response plan is described as Yes, Yes, Yes.

Type of Data Compromised: Personal data
Sensitivity of Data: Names and phone numbers
Personally Identifiable Information: Names and phone numbers

Type of Data Compromised: Databases, Employee information, Internal email server data
Sensitivity of Data: High (employee data, internal communications)
Data Exfiltration: Yes (350GB exfiltrated)
Personally Identifiable Information: Yes

Data Exfiltration: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Affected systems restored.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by incident swiftly contained and swift containment.

Ransom Demanded: No
Ransom Paid: No
Data Encryption: No
Data Exfiltration: Yes
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Systems restored within nine hours.

Lessons Learned: Need to strengthen cybersecurity measures to prevent future breaches

Recommendations: Enhance resilience against growing cyber and hybrid threats targeting critical services and democratic institutions
Key Lessons Learned: The key lessons learned from past incidents are Need to strengthen cybersecurity measures to prevent future breaches.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Enhance resilience against growing cyber and hybrid threats targeting critical services and democratic institutions.

Source: CERT-EU

Source: BleepingComputer

Source: European Commission
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CERT-EU, and Source: BleepingComputer, and Source: European Commission.

Investigation Status: Ongoing

Investigation Status: Ongoing

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Limited public acknowledgment.

Stakeholder Advisories: Commitment to securing internal systems as part of broader EU cybersecurity initiatives
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Commitment to securing internal systems as part of broader EU cybersecurity initiatives.

Corrective Actions: Full review to strengthen cybersecurity measures
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Full review to strengthen cybersecurity measures.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Full review to strengthen cybersecurity measures.
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was No.
Last Attacking Group: The attacking group in the last incident was an Killnet.
Most Recent Incident Detected: The most recent incident detected was on 2024-01-30.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-03-27.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal data of some European Commission staff, including names and phone numbers, 350GB of data, including databases and employee information and Yes.
Most Significant System Affected: The most significant system affected in an incident was European Parliament website and and and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Incident swiftly contained and Swift containment.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Yes, Personal data of some European Commission staff, including names and phone numbers, 350GB of data and including databases and employee information.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was No.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Need to strengthen cybersecurity measures to prevent future breaches.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance resilience against growing cyber and hybrid threats targeting critical services and democratic institutions.
Most Recent Source: The most recent source of information about an incident are CERT-EU, BleepingComputer and European Commission.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Commitment to securing internal systems as part of broader EU cybersecurity initiatives, .
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.