EU investigating Breach of Cybersecurity Atlas Project


Staff member
Malware Hunter
Jul 27, 2015
The European Commission is investigating a breach of its Cybersecurity Atlas project after a copy of the site’s backend database was put up for sale on an underground cybercrime forum on Monday.

Launched in 2018, the Cybersecurity Atlas is a Yellow-Pages-like contact list of European organizations with cybersecurity expertise. Described on its website as a “knowledge management platform to map, categorise and stimulate collaboration between European cybersecurity experts,” the Cybersecurity Atlas project allows cybersecurity experts to sign up and list their contact details on the EC web portal. The Commission claims that “organisations participating in the Atlas have the opportunity to enlarge their research network, to get in contact with relevant peers, and to improve the organisation visibility.

On Monday, a threat actor posted a thread on an underground cybercrime forum claiming to have obtained access to the entire Cybersecurity Atlas database, which they were willing to sell via Discord. The Record obtained a copy of this database for reporting purposes with the help of an individual know as Kelvin Security. We were quickly able to confirm that the database contained authentic details for cybersecurity companies, universities, research centers, and government organizations across Europe. This included details such as site usernames, email addresses, institution details, full names of contact persons, and organization addresses and geolocation points that the Atlas project used to plot member details on a map.
While by the nature of being a public inventory of contacts details, the data in the Cybersecurity Atlas and its members was supposed to be public and accessible by design, The Record was able to confirm that this information was an SQL database dump of the project’s Drupal website rather than being a scrape of data listed on the official site. This meant that a threat actor breached the Commission’s database servers and gained access to the Cybersecurity Atlas backend. The sale of already-publicly-listed data was not of concern to The Record. Instead, we were interested in how the threat actor could have abused access to this portal to carry out phishing or watering hole attacks against cybersecurity experts directly from the European Commission’s website, attacks that would have a big chance of succeeding.