Security & Infrastructure Tools
French govt agency confirms breach as hacker offers to sell data
France’s ANTS agency confirms a data breach after a threat actor claimed access to the ants.gouv.fr portal, potentially exposing up to 19 million records. Exposed data include login IDs, full names, emails, dates of birth, unique account IDs, and some postal addresses, places of birth, and phone numbers, with the breach not granting portal access but enabling phishing risks. Authorities CNIL, the Paris Public Prosecutor, and ANSSI are involved, and the attacker has offered the data for sale; users are advised to stay vigilant for suspicious messages, with no action required at this time.

French Government Agency ANTS Confirms Breach as Hacker Offers Data for Sale
- Incident Overview
- A security incident was disclosed by the French administrative agency responsible for secure documents, ANTS (Agence nationale des titres sécurisés), after a threat actor claimed access to sensitive citizen data.
- The announcement notes that the attack occurred in the previous week, with the agency starting the notification process for affected individuals as investigations continue.
- The incident involves the potential exposure of data associated with both individual and professional accounts on the ants.gouv.fr portal, according to ANTS.
- The Attacked Entity and Its Role
- ANTS operates under the French Ministry of the Interior and serves as the managing authority for official identity and registration documents in France.
- The agency’s remit includes issuance and management of driver’s licenses, national ID cards, passports, and immigration documents.
- The breach center’s public statement emphasizes that no unauthorized access to ANTS electronic portals is alleged, but the exposed data could be used for phishing or social engineering.
- Exposed Data Types
- The incident could have exposed the following data elements:
- Login ID
- Full name
- Email address
- Date of birth
- Unique account identifier
- Postal address (for some individuals)
- Place of birth (for some)
- Phone number (for some)
- ANTS notes that while the breached information may not grant direct access to the portals, the data could still be leveraged in deceptive communications targeting affected individuals.
- Timeline of Events
- April 15, 2026: ANTS detected a security incident that may involve disclosure of data from individual and professional accounts on the ants.gouv.fr portal.
- April 16, 2026: A threat actor using the moniker “breach3d” claimed the attack on hacker forums and asserted possession of up to 19 million records.
- April 21, 2026: ANTS publicly announced the incident and began notifying those identified as impacted; authorities were notified and involved in the response.
- Threat Actor and Claims
- The threat actor behind the claim is identified as “breach3d,” who asserted control of a large data set and offered it for sale.
- The actor’s public post references the scope of data including personal identifiers and contact details, with a claim of up to 19 million records in possession.
- The data allegedly encompasses full names, contact details, birth data, home addresses, account metadata, gender, and civil status.
- Official Response and Authorities Involved
- ANTS has engaged multiple authorities in its response, including:
- The Commission Nationale de l’Informatique et des Libertés (CNIL), the French data protection authority
- The Paris Public Prosecutor
- The national cybersecurity authority ANSSI
- In its communication, ANTS underscored that the sale or dissemination of the data is illegal and reiterated that the exposed information does not enable unauthorized access to ANTS portals.
- Data Sale and Ongoing Investigation
- The threat actor’s offer to sell the data has not led to a broad public leak of the records as of the published updates.
- The price for the stolen data has not been disclosed by the seller.
- ANTS and involved authorities continue the investigation, with ongoing efforts to determine the full scope and verify which records were exposed.
- Implications and Context
- Exposed data elements, even without portal access, create potential avenues for phishing, social engineering, and targeted scams that could impersonate ANTS communications.
- The disclosure highlights the risk posed by credential-like data such as login IDs, full names, and contact details, which can facilitate highly convincing fraud attempts.
- Involvement of CNIL and ANSSI signals a formal cross-agency response to assess regulatory implications and strengthen defensive measures.
- Current Status and Next Steps
- ANTS has begun notifying individuals identified as impacted and is continuing its incident response efforts.
- Authorities are reviewing the collected information and coordinating with international threat intelligence channels as needed.
- As the investigation progresses, further details about the full extent of the breach and any remediation actions are expected to be released by ANTS and the involved agencies.
- Related Context
- The incident is part of a broader pattern in which government or government-affiliated entities disclose data breaches and face public scrutiny over data handling practices.
- Similar cases reported in other sectors have included breaches where data was offered for sale or leaked to hacker forums, with varying degrees of confirmed exposure and ongoing investigations.
- The evolving landscape of data breach disclosures continues to emphasize the importance of monitoring for suspicious communications and understanding that even non-portal data can be used to target individuals.