HackingGovernment / International·European Union

European Commission

Analysis of the European Commission staff data exposure via exploited Ivanti Endpoint Manager Mobile vulnerability.

Published by the Scrutex.ai Research Team | February 2026

Disclaimer

This advisory is provided for informational and educational purposes only by the Scrutex research team. It is based entirely on publicly available reporting from the sources cited below. Where details are unconfirmed or disputed by the affected organisation, this is noted explicitly. Scrutex does not independently verify internal claims made by affected organisations or threat actors. This advisory should not be interpreted as a confirmed statement of fact regarding any organisation's security posture. Organisations concerned about their own exposure should conduct independent assessments and seek professional legal advice.

At a Glance

Organisation

European Commission

Executive branch of the European Union, responsible for proposing legislation, enforcing EU law, and managing the day-to-day business of the EU.

Sector

Government / International

Region

European Union

Date of Incident

Prior to February 2026 (exploitation of Ivanti vulnerability)

Date Disclosed

February 2026

Estimated Impact

Unknown

Data Types Exposed

Names, mobile phone numbers of European Commission staff

Attack Type

Hacking

Attack Vector

Exploitation of vulnerability in Ivanti Endpoint Manager Mobile

Current Status

Vulnerability patched. Staff notified. Investigation ongoing in coordination with CERT-EU.

Severity Assessment

High due to target significance. While the volume of data may be limited, the exposure of European Commission staff contact details has diplomatic and national security implications.

What Happened

In February 2026, the European Commission disclosed that staff data was exposed through an exploited vulnerability in Ivanti Endpoint Manager Mobile.

The compromised data includes names and mobile numbers of EC staff. The same Ivanti vulnerability also affected the Dutch Data Protection Authority.

Timeline

February 2026

European Commission discloses staff data exposure via Ivanti Endpoint Manager Mobile vulnerability

February 2026

Dutch Data Protection Authority also confirmed affected by the same vulnerability

Impact and Risk Assessment

For Affected Individuals

European Commission staff had their names and mobile phone numbers exposed, potentially enabling targeted phishing and social engineering of EU officials.

For Organisations

The exposure of EU official contact details has implications for EU institutional security and diplomatic communications.

Multiple organisations were affected by the same Ivanti vulnerability, demonstrating systemic risk from unpatched endpoint management platforms.

Regulatory Context

EU institutions are subject to Regulation (EU) 2018/1725 on data protection. CERT-EU coordinates cybersecurity incident response for EU institutions.

What Should You Do?

If You Are a Potentially Affected Individual

EU institutional staff should be particularly vigilant about phishing attempts via their mobile devices following this exposure.

If You Are a Security or Risk Professional

Prioritise patching of endpoint management platforms, which have broad access across device fleets and represent high-value targets.

The same vulnerability affecting multiple government organisations demonstrates the need for coordinated vulnerability management across institutions.

Learnings and Recommendations

The exploitation of the same Ivanti vulnerability across multiple high-profile government organisations demonstrates how unpatched software vulnerabilities can create systemic risk.

Endpoint management platforms are particularly attractive targets because they often have broad access across an organisation's device fleet.

Sources

    This advisory is provided for informational purposes by the Scrutex.ai research team. It is based on publicly available reporting from the sources cited above. Where details are unconfirmed or disputed, we have noted this accordingly. Scrutex.ai does not independently verify internal claims made by affected organisations. Organisations concerned about their own exposure are encouraged to conduct their own assessments and seek professional advice where needed.

    Stay ahead of the next breach

    Scrutex monitors dark web sources, breach databases, and threat actor activity continuously, detecting exposure that affects your organisation before it becomes a headline.