European Space Agency confirms breach of external servers

pVMware ESXi zerodays likely exploited a year before disclosureppCalifornia bans data broker reselling health data of millionsppHackers target misconfigured proxies to access paid LLM servicesppMicrosoft may soon allow IT admins to uninstall CopilotppInstagram denies breach amid claims of 17 million account data leakppCalifornia bans data broker reselling health data of millionsppThis 2in1 Chromebook is on sale for just 160 with free shippingppMicrosoft is retiring Send to Kindle in WordppHow to access the Dark Web using the Tor BrowserppHow to enable Kernelmode Hardwareenforced Stack Protection in Windows 11ppHow to use the Windows Registry EditorppHow to backup and restore the Windows RegistryppHow to start Windows in Safe ModeppHow to remove a Trojan Virus Worm or other MalwareppHow to show hidden files in Windows 7ppHow to see hidden files in WindowsppQualys BrowserCheckppSTOPDecrypterppAuroraDecrypterppFilesLockerDecrypterppAdwCleanerppComboFixppRKillppJunkware Removal ToolppeLearningppIT Certification CoursesppGear GadgetsppSecurityppBest VPNsppHow to change IP addressppAccess the dark web safelyppBest VPN for YouTubeppppThe European Space Agency ESA confirmed that attackers recently breached servers outside its corporate network which contained what it described as unclassified information on collaborative engineering activitiesppFounded 50 years ago and headquartered in Paris ESA is an intergovernmental organization that coordinates the space activities of 23 member states ESA has around 3000 staff and had a budget of 768 billion 9 billion in 2025ppToday the space agency issued a statement confirming a breach following claims by a threat actor on the BreachForums hacking forum that they had breached some of ESAs serversppThe threat actor also leaked some screenshots as proof that theyve had access to ESAs JIRA and Bitbucket servers for an entire weekppESA is aware of a recent cybersecurity issue involving servers located outside the ESA corporate network We have initiated a forensic security analysiscurrently in progressand implemented measures to secure any potentially affected devices the space agency said on TuesdayppOur analysis so far indicates that only a very small number of external servers may have been impacted These servers support unclassified collaborative engineering activities within the scientific communityppESA says it has already notified all relevant stakeholders of the security breach and will provide further updates as soon as more information becomes availableppWhile ESA didnt provide any other details about which servers were breached the threat actors claim they stole over 200GB of data after breaching the European Space Agencys systems and private Bitbucket repositoriesppThey said that the allegedly stolen data includes source code CICD pipelines API tokens access tokens confidential documents configuration files Terraform files SQL files hardcoded credentials and moreppIve been connecting to some of their services for about a week now and have stolen over 200gb of data Including dumping all their private Bitbucket repositories as well the threat actors saidppAn ESA spokesperson told BleepingComputer that the agency maintains a robust framework and governance structure to address such incidents effectively when asked to confirm the threat actors claimsppThis is not the first time the European Space Agency has had its systems breached in recent yearsppOne year ago right before Christmas the European agencys official web shop was hacked with malicious JavaScript code inserted to steal customer information and payment card data provided during checkoutppUpdate January 02 1237 EST Added ESA statementppAs MCP Model Context Protocol becomes the standard for connecting LLMs to tools and data security teams are moving fast to keep these new services safeppThis free cheat sheet outlines 7 best practices you can start using todayppIllinois Department of Human Services data breach affects 700K peopleppJaguar Land Rover wholesale volumes down 43 after cyberattackppSedgwick confirms breach at government contractor subsidiaryppUS broadband provider Brightspeed investigates breach claimsppNordVPN denies breach claims says attackers have dummy datappNot a member yet Register NowppMicrosoft may soon allow IT admins to uninstall CopilotppHackers target misconfigured proxies to access paid LLM servicesppBreachForums hacking forum database leaked exposing 324000 accountsppDiscover how elite SOCs use NDR to protect their networksppTrack AIpowered cyber threats in real time Start a free Flare trialppDo you know how secure your Google Workspace really is Get your Security Scorecard and see what to fix firstppOverdue a password healthcheck Audit your Active Directory for freeppSecuring Agentic AI Redefine permissions for the next era of accessppTerms of Use Privacy Policy Ethics Statement Affiliate DisclosureppCopyright 2003 2026 Bleeping Computer LLC All Rights ReservedppNot a member yet Register NowppRead our posting guidelinese to learn what content is prohibitedp