ESA Investigates Cyber Incident as Hackers Allege Week-Long Access to Systems

European Space Agency Breached Again, Hackers Claim 200 GB Of Data For Sale

The420 Web Desk
4 Min Read

The European Space Agency (ESA) is investigating yet another cybersecurity incident after a group of threat actors claimed to have stolen more than 200 GB of internal data and put it up for sale online.

In a brief statement posted on X, ESA confirmed that it was aware of “a security incident” and said the breach appeared to affect only a very small number of external servers used for unclassified engineering and scientific collaboration.

“We have initiated a forensic security analysis and implemented measures to secure potentially affected devices,” ESA said, adding that stakeholders had been notified and further updates would follow as the investigation progresses.

FCRF Launches Flagship Compliance Certification (GRCP) as India Faces a New Era of Digital Regulation

Hackers claim week-long access

Their version, however, paints a far more damaging picture. On the cybercrime marketplace BreachForums, an alleged attacker claimed they accessed ESA-linked systems on December 18 and maintained a foothold for about a week. During that time, they say they exfiltrated:

  • source code and CI/CD pipelines
  • API keys and access tokens
  • confidential documents and configuration files
  • Terraform and SQL files
  • hardcoded credentials
  • “all private Bitbucket repositories” linked to the systems

Screenshots accompanying the listing suggest that the actors believe the stolen data has commercial and possibly strategic value. ESA did not respond to media questions seeking additional detail, with an automated reply noting offices were closed for the New Year holiday.

A worrying pattern

This incident adds to a growing list of ESA-related security lapses most of which the Agency has routinely described as isolated and limited to external systems.

In late 2024, ESA’s online merchandise store was compromised after attackers injected a fake payment page to harvest customer details. ESA distanced itself from the episode, saying it did not directly run the store. Go back further and the pattern continues:

  • In 2015, ESA domains were compromised via an SQL vulnerability, exposing subscriber and staff data.
  • In 2011, another breach led to administrative and server configuration credentials being dumped publicly again, ESA insisted internal networks remained untouched.

Individually, these incidents may seem contained. Taken together, they point toward recurring weaknesses in third-party systems, external integrations, and edge infrastructure — the very environments attackers increasingly target.

Limited impact or limited visibility?

ESA’s reassurance that internal systems remain safe mirrors standard crisis communication across government and space organizations. Protecting classified research and mission systems is, understandably, the priority.

Yet repeated compromises of “external” platforms still carry risk: exposed credentials, developer assets, configuration files, and partner data can all become stepping stones toward deeper intrusions. Supply chain breaches from SolarWinds to MOVEit have shown how attackers exploit the digital periphery to reach the core.

Until ESA publishes fuller forensic findings, the scale of the incident and the credibility of the hackers’ claims will remain uncertain. For now, the juxtaposition is striking: cybercriminals advertising a giant cache of sensitive agency data, and a space agency urging calm while investigations continue.

Stay Connected