TODAY: 1 NEW BREACH·LAST 30 DAYS: 4·RECORDS THIS YEAR: 5.6M·MOST TARGETED: GOVERNMENT·TOP ORIGIN: France·LARGEST BREACH: MedCore Systems — S3 Bucket Exposure (4.2M)·GLOBAL THREAT LEVEL: NORMAL·TODAY: 1 NEW BREACH·LAST 30 DAYS: 4·RECORDS THIS YEAR: 5.6M·MOST TARGETED: GOVERNMENT·TOP ORIGIN: France·LARGEST BREACH: MedCore Systems — S3 Bucket Exposure (4.2M)·GLOBAL THREAT LEVEL: NORMAL
BR-2024-12-0901[INFO][GOVERNMENT]FOR SALESOURCE

GovPortal Identity Database Exposure

Records: 3K
Date: 2024-12-01
Origin: France
Author: SYSADMIN

INCIDENT REPORT

A partial identity database from a French government digital services portal was briefly accessible via a misconfigured CDN cache. The exposure lasted approximately 90 minutes before automated anomaly detection flagged the issue.

The dataset contained 3,100 records from a citizen services pilot program, including anonymized case IDs, partial postal codes, and service category labels. No full names, national IDs, or contact information were included in the exposed subset.

ANSSI (the French national cybersecurity agency) confirmed the incident was contained and that the exposure risk was classified as informational.

EXPOSED DATA TYPES

Anonymized Case IDs
Partial Postal Codes
Service Category Labels

RAW LOG EXTRACTION [TRUNCATED]

// CDN CACHE MISCONFIGURATION — CACHE-CONTROL: public, max-age=86400

GET /api/citizens/pilot-export.json — cached response served to 847 unique IPs

[INFO: No PII in strict sense — anonymized pilot data only]

Were you impacted?

Help the community understand the real-world impact of this breach.

ACTIONS // BR-SYS

SHARE2 SHARES