The European Commission's AWS environment was compromised through a phishing email delivered to an employee. Not a zero-day. Not a novel exploit chain. A credential harvest. I have executed this exact pattern against corporate cloud environments. The sequence is: craft a pretext, deliver the payload to an identity with elevated access, capture credentials, authenticate as the target. The mechanism