Get In Touch
541 Melville Ave, Palo Alto, CA 94301,
ask@ohio.clbthemes.com
Ph: +1.831.705.5448
Work Inquiries
work@ohio.clbthemes.com
Ph: +1.831.306.6725
Back

Lapsus$, Claude Code, and the European Commission: Every Major Breach From April 1, 2026

Security & Privacy

Lapsus$, Claude Code, and the European Commission: Every Major Breach From April 1, 2026

S
Sara Voss
Security & Privacy  ·  April 1, 2026

Five separate security incidents landed on April 1, 2026 — and none of them were jokes. Lapsus$ executed a supply chain attack on LiteLLM, ShinyHunters exfiltrated 350GB from the European Commission, Anthropic confirmed a source code leak, Apple shipped an emergency patch, and Hasbro filed an SEC 8-K breach disclosure. The pattern is clear: no sector, no organisation, no codebase is off the table.

Anthropic Claude Code: 1,900 Files, 512,000 Lines Exposed

Cybersecurity threat landscape 2026
Cybersecurity threats continue to evolve rapidly

Anthropic confirmed that a release packaging misconfiguration exposed the source tree for Claude Code — 1,900 files and 512,000 lines of internal production tooling. The company characterised it as a build pipeline error rather than an intrusion, noting no model weights or customer data were accessed.

From a security standpoint, the distinction matters less than the exposure. 512,000 lines of production code for a frontier AI system hands adversaries a detailed map of prompt handling, toolchain architecture, and internal scaffolding. Even without weights, that intelligence is valuable. KrebsOnSecurity’s analysis of the Claude Code leak.

The Pattern Is Clear
Build Pipelines Are the New Attack Surface

Supply chain and build pipeline security failures — from SolarWinds to XZ Utils to this Claude Code leak — are now a recurring pattern. The code that ships is only as secure as the infrastructure that builds and packages it. Anthropic’s error is a reminder: internal tooling needs the same security scrutiny as externally facing systems.

Lapsus$ Hits Mercor and LiteLLM Supply Chain

The notorious Lapsus$ hacking collective executed a supply chain attack targeting Mercor (an AI hiring platform) and LiteLLM (an open-source LLM proxy library). The attackers exfiltrated Slack workspace data and AI contractor interview videos — sensitive material that could expose client companies, candidate identities, and internal AI evaluation processes.

LiteLLM is widely used across the AI developer ecosystem as a unified interface to multiple LLM APIs. A supply chain compromise at LiteLLM is not an isolated incident — it is a vector into every organisation that depends on it. Lapsus$ has historically used social engineering and SIM swapping rather than purely technical exploits, suggesting insider access or credential theft may have played a role. The Record’s reporting on the LiteLLM supply chain attack.

European Commission: 350GB Stolen by ShinyHunters

Data breach security alert
Major data breaches expose millions of records

The ShinyHunters threat actor group claimed responsibility for exfiltrating 350GB of data from the European Commission. ShinyHunters is a prolific data theft group known for large-scale breaches — past targets include Ticketmaster, Santander, and AT&T. A 350GB EC breach, if confirmed, would represent one of the most significant incursions into EU institutional infrastructure on record.

The European Commission had not issued an official statement confirming the breach at time of publication. ShinyHunters has a history of publicising breaches before organisations acknowledge them, often using the disclosure as leverage. BleepingComputer’s coverage of the ShinyHunters EC claim.

The Pattern Is Clear
No Institution Is Too Large or Too Regulated

The European Commission governs GDPR enforcement — the world’s most consequential data protection regulation. If ShinyHunters’ 350GB claim holds up, it will be the most ironic breach in regulatory history. Large institutions are not more secure; they are larger attack surfaces with more complex, harder-to-monitor systems.

QualDerm Partners: 3.1 Million Patient Records Exposed

Security vulnerability attack vector
Attackers exploit new vulnerability vectors in 2026

QualDerm Partners, a dermatology practice management company, disclosed a breach exposing 3.1 million patient records. The exposed data includes protected health information (PHI) — names, dates of birth, Social Security numbers, insurance details, and medical records. This is a HIPAA-covered breach requiring formal notification to affected individuals and HHS. Additionally, Hasbro filed an SEC 8-K breach disclosure, joining the growing list of public companies required to report material cybersecurity incidents under the SEC’s 2023 cyber disclosure rules.

Apple Emergency Patch: iOS 18.7.7 for DarkSword Exploit

Apple released iOS 18.7.7 as an emergency out-of-band patch targeting the DarkSword exploit — a zero-click vulnerability being actively exploited in the wild. DarkSword reportedly allows remote code execution without user interaction, placing it in the highest severity tier. Apple’s rapid response — an emergency patch outside its normal release schedule — indicates intelligence suggesting active use by sophisticated threat actors, potentially state-sponsored. Update immediately.

April 1, 2026 — Breach Summary

Target Actor Impact Status
Anthropic Claude Code Packaging Error 512K lines exposed Confirmed
Mercor / LiteLLM Lapsus$ Slack data + contractor videos Confirmed
European Commission ShinyHunters 350GB stolen Claimed
QualDerm Partners Unknown 3.1M patient records Disclosed
iOS DarkSword Active exploitation Zero-click RCE Patched iOS 18.7.7

Frequently Asked Questions

Should I update to iOS 18.7.7 immediately?

Yes. The DarkSword exploit is a zero-click vulnerability under active exploitation, meaning no user interaction is required for an attacker to execute code on your device. Apply the iOS 18.7.7 update immediately. Settings → General → Software Update.

What is a supply chain attack?

A supply chain attack targets the software, libraries, or services that an organisation depends on — rather than the organisation directly. By compromising a widely-used dependency like LiteLLM, attackers can propagate malicious code or exfiltrate data from every downstream user of that dependency.

Are QualDerm Partners patients at risk?

Yes. 3.1 million patient records including PHI, SSNs, and medical data were exposed. QualDerm Partners is required by HIPAA to notify affected individuals. Affected patients should monitor credit reports and consider identity protection services.

Is Lapsus$ a state-sponsored group?

No. Lapsus$ is believed to be a financially motivated cybercriminal collective with members predominantly in their teens and early twenties. Past members have been arrested in the UK and Brazil. Their methods rely heavily on social engineering, SIM swapping, and insider access rather than sophisticated zero-days.

What is Hasbro’s SEC 8-K breach filing?

Under SEC rules effective since 2023, publicly traded companies must disclose material cybersecurity incidents within four business days via an 8-K filing. Hasbro’s 8-K indicates the company determined its breach met the materiality threshold — suggesting significant operational, financial, or reputational impact.

Stay Threat-Aware
Sara Voss covers the breaches, exploits, and privacy failures that matter.

Breaking security news with clear analysis — no FUD, no filler.

Browse All Security & Privacy Posts →

Sara Voss
https://networkcraft.net/author/sara-voss/
Investigative Tech Reporter at Networkcraft. The most important security story is usually the one nobody's covering yet. Specialises in cybersecurity, digital privacy, data breaches, and the policy decisions that shape how technology affects civil liberties.