Company Details
caf-allocations-familiales
4,219
121,334
92
caf.fr
0
CAI_2209050
In-progress

Caisse nationale des allocations familiales - Cnaf Company CyberSecurity Posture
caf.frLes Allocations familiales, c’est d’abord un réseau composé de la Caisse nationale d’Allocations familiales (Cnaf),composée de 11 sites, et de 101 Caf réparties sur tout le territoire français (Métropole et Outre-Mer). Les Caisses d’allocations familiales, plus connues par le grand public sous l’appellation Caf, sont des organismes de droit privé, investis d’une mission de service public. Aux côtés des familles, des couples et des personnes seules, notre ambition est de participer à la solidarité nationale et combattre la précarité. Nos missions : - Assister toutes les familles pour concilier vie familiale, professionnelle et sociale - Œuvrer pour un meilleur accès aux droits - Lutter contre les inégalités sociales et territoriales - Contribuer au développement de nouvelles structures - Favoriser la mixité sociale et lutter contre toute forme de discrimination Les Allocations familiales, ce sont aussi plus de 35 000 collaborateurs et une cinquantaine de métiers différents. Jeunes diplômés ou professionnels plus expérimentés, nous accueillons des profils aussi divers que variés. Nous croyons au talent et à la force collective de nos collaborateurs. En tant qu’employeur socialement responsable, nous mettons en œuvre des actions pour : - Garantir l’équité de traitement et l’égalité des chances - Donner du sens et améliorer les conditions de travail - Favoriser la conciliation vie professionnelle / vie personnelle - Assurer l’accès à la formation professionnelle tout au long de la carrière... Venez nous découvrir : politique employeur, diversité de nos métiers, actualités locales, conseils RH aux candidats... Les réseaux sociaux de la Caisse Nationale des Allocations Familiales et de l’ensemble des Caf, ne sont pas des relais d’échange sur vos dossiers d’allocataires. Nous vous prions donc, de ne transmettre aucun document ou information comprenant vos données personnelles.
Company Details
caf-allocations-familiales
4,219
121,334
92
caf.fr
0
CAI_2209050
In-progress
Between 700 and 749

CNDAFC Global Score (TPRM)XXXX

Description: **Cyberattack Claim Targets French Family Benefits Agency (CAF) Amid Hacker’s Escalating Threats** A hacker known as *Indra*, who previously claimed responsibility for a cyberattack on France’s Interior Ministry, has now alleged a breach of the *Caisse d’Allocations Familiales* (CAF), the national family benefits agency. In a post on the cybercriminal forum *Breachforums* late yesterday, the hacker asserted access to 15 GB of data—reportedly containing 22 million lines of personal information on nearly 4 million beneficiaries. The leaked files, reviewed by *BFMTV*, include names, birthdates, email addresses, and phone numbers of individuals registered with the CAF between September 2022 and November 2025. Indra framed the attack as a "Christmas gift to France." The CAF swiftly denied the claims, stating that no intrusion or vulnerability had been detected in its systems. In an official response, the agency insisted its infrastructure remains secure and that the exposed data did not originate from its own databases. Instead, the CAF suggested the information may have been sourced from other public services with which it exchanges data, though it confirmed no technical breach of its information flows. Notably, the agency emphasized that no banking details or passwords were included in the leaked files. The same *Indra* account had earlier claimed responsibility for compromising the Interior Ministry’s systems, including sensitive police databases like the *Traitement des Antécédents Judiciaires* (TAJ) and the *Fichier des Personnes Recherchées* (FPR). That attack was reportedly executed by hijacking personal email accounts of ministry employees. Authorities arrested a 22-year-old suspect in connection with the Interior Ministry breach just hours before the CAF-related post appeared, though the origin of the CAF data remains unconfirmed. While the CAF maintains its systems were not breached, the authenticity of the leaked data raises questions about the broader security of interconnected public-sector networks. Investigations into both incidents are ongoing.


Caisse nationale des allocations familiales - Cnaf has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.
Caisse nationale des allocations familiales - Cnaf has 28.21% more incidents than the average of all companies with at least one recorded incident.
Caisse nationale des allocations familiales - Cnaf reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
CNDAFC cyber incidents detection timeline including parent company and subsidiaries

Les Allocations familiales, c’est d’abord un réseau composé de la Caisse nationale d’Allocations familiales (Cnaf),composée de 11 sites, et de 101 Caf réparties sur tout le territoire français (Métropole et Outre-Mer). Les Caisses d’allocations familiales, plus connues par le grand public sous l’appellation Caf, sont des organismes de droit privé, investis d’une mission de service public. Aux côtés des familles, des couples et des personnes seules, notre ambition est de participer à la solidarité nationale et combattre la précarité. Nos missions : - Assister toutes les familles pour concilier vie familiale, professionnelle et sociale - Œuvrer pour un meilleur accès aux droits - Lutter contre les inégalités sociales et territoriales - Contribuer au développement de nouvelles structures - Favoriser la mixité sociale et lutter contre toute forme de discrimination Les Allocations familiales, ce sont aussi plus de 35 000 collaborateurs et une cinquantaine de métiers différents. Jeunes diplômés ou professionnels plus expérimentés, nous accueillons des profils aussi divers que variés. Nous croyons au talent et à la force collective de nos collaborateurs. En tant qu’employeur socialement responsable, nous mettons en œuvre des actions pour : - Garantir l’équité de traitement et l’égalité des chances - Donner du sens et améliorer les conditions de travail - Favoriser la conciliation vie professionnelle / vie personnelle - Assurer l’accès à la formation professionnelle tout au long de la carrière... Venez nous découvrir : politique employeur, diversité de nos métiers, actualités locales, conseils RH aux candidats... Les réseaux sociaux de la Caisse Nationale des Allocations Familiales et de l’ensemble des Caf, ne sont pas des relais d’échange sur vos dossiers d’allocataires. Nous vous prions donc, de ne transmettre aucun document ou information comprenant vos données personnelles.


Welcome to the United States Department of Veterans Affairs (VA) Official LinkedIn page. We're recruiting the finest employees to care for our #Veterans. Following/engagement ≠ signify VA endorsement. This is a moderated page, meaning that all comments will be reviewed for appropriate content. Ple

Home to a respected and energetic cultural arts scene, celebrated restaurants featuring flavors from 35 countries, world-renowned theater groups and the brains behind U.S. space exploration, Houston is a diverse metropolis brimming with personality. With nearly 21,000 concerts, plays, exhibition

Bli en samhällsbyggare – jobba i Malmö stad! Genom att arbeta i Malmö stad får du möjlighet att arbeta med hållbar samhällsutveckling. Som en samhällsbyggare spelar du en viktig roll i Malmös utveckling och därför ser vi oss som framtidens arbetsplats. Människors lika värde är en förutsättning fö

The Treasury Department is the executive agency responsible for promoting economic prosperity and ensuring the financial security of the United States. The Department is responsible for a wide range of activities such as advising the President on economic and financial issues, encouraging sustainabl

The Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you

The Transportation Security Administration (TSA) is a component agency of the U.S. Department of Homeland Security (DHS), committed to securing the nation’s transportation systems to ensure safe and efficient travel for all. Our mission is to protect the American people by preventing threats and dis

Help us achieve world-class education, training and care for everyone, whatever their background. Whether you're just starting out, or an experienced professional, we have what you are looking for. Jobs include administration, policy advisers, digital, finance, commercial specialists and many more

Most people know that the National Park Service cares for national parks, a network of over 420 natural, cultural and recreational sites across the nation. The treasures in this system – the first of its kind in the world – have been set aside by the American people to preserve, protect, and share t

Minnesota State Government is the third largest employer in the state of Minnesota, employing over 50,000 diverse and talented employees in more than 100 state agencies, boards, commissions, colleges, and universities. Our workplaces can be found across the state in 86 out of 87 Minnesota counties a
.png)
Paris, October 15th, 2025 – Broadcom Inc. today announced that the Caisse Nationale des Allocations Familiales (CNAF), a cornerstone of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Caisse nationale des allocations familiales - Cnaf is https://caf.fr/professionnels/nous-connaitre/presentation.
According to Rankiteo, Caisse nationale des allocations familiales - Cnaf’s AI-generated cybersecurity score is 740, reflecting their Moderate security posture.
According to Rankiteo, Caisse nationale des allocations familiales - Cnaf currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Caisse nationale des allocations familiales - Cnaf is not certified under SOC 2 Type 1.
According to Rankiteo, Caisse nationale des allocations familiales - Cnaf does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Caisse nationale des allocations familiales - Cnaf is not listed as GDPR compliant.
According to Rankiteo, Caisse nationale des allocations familiales - Cnaf does not currently maintain PCI DSS compliance.
According to Rankiteo, Caisse nationale des allocations familiales - Cnaf is not compliant with HIPAA regulations.
According to Rankiteo,Caisse nationale des allocations familiales - Cnaf is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Caisse nationale des allocations familiales - Cnaf operates primarily in the Government Administration industry.
Caisse nationale des allocations familiales - Cnaf employs approximately 4,219 people worldwide.
Caisse nationale des allocations familiales - Cnaf presently has no subsidiaries across any sectors.
Caisse nationale des allocations familiales - Cnaf’s official LinkedIn profile has approximately 121,334 followers.
Caisse nationale des allocations familiales - Cnaf is classified under the NAICS code 92, which corresponds to Public Administration.
No, Caisse nationale des allocations familiales - Cnaf does not have a profile on Crunchbase.
Yes, Caisse nationale des allocations familiales - Cnaf maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/caf-allocations-familiales.
As of December 18, 2025, Rankiteo reports that Caisse nationale des allocations familiales - Cnaf has experienced 1 cybersecurity incidents.
Caisse nationale des allocations familiales - Cnaf has an estimated 11,742 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with yes (investigation ongoing), and communication strategy with public denial of breach, clarification on data origin..
Title: Alleged Cyberattack on Caisse d'Allocations Familiales (CAF) by Hacker Indra
Description: Hacker Indra claimed to have compromised the systems of the Caisse d'Allocations Familiales (CAF) and published 15 GB of data containing personal information of nearly 4 million allocataires. CAF denies any intrusion into its systems, suggesting the data may originate from other public services.
Type: Data Breach
Attack Vector: Compromised employee personal accounts (alleged)
Threat Actor: Indra
Motivation: Unknown (possibly financial gain or disruption)
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Alleged compromise of employee personal accounts (Ministry of Interior attack).

Data Compromised: 15 GB of data, 22 million lines of information
Brand Reputation Impact: Potential reputational damage due to data exposure
Identity Theft Risk: High (personal data exposed)
Payment Information Risk: None (no banking data or passwords exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, First Names, Dates Of Birth, Emails, Phone Numbers and .

Entity Name: Caisse d'Allocations Familiales (CAF)
Entity Type: Government Agency
Industry: Social Services
Location: France
Customers Affected: Nearly 4 million allocataires

Law Enforcement Notified: Yes (investigation ongoing)
Communication Strategy: Public denial of breach, clarification on data origin

Type of Data Compromised: Names, First names, Dates of birth, Emails, Phone numbers
Number of Records Exposed: 22 million lines of information (allegedly 4 million allocataires)
Sensitivity of Data: High (personally identifiable information)
Data Exfiltration: Yes (15 GB of data published)
Personally Identifiable Information: Yes

Legal Actions: Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'.

Source: BFMTV

Source: Breachforums (cybercrime forum)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BFMTV, and Source: Breachforums (cybercrime forum).

Investigation Status: Ongoing (22-year-old suspect arrested)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public denial of breach and clarification on data origin.

Customer Advisories: CAF issued a public statement denying the breach and clarifying data origin
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was CAF issued a public statement denying the breach and clarifying data origin.

Entry Point: Alleged compromise of employee personal accounts (Ministry of Interior attack)
Last Attacking Group: The attacking group in the last incident was an Indra.
Most Significant Data Compromised: The most significant data compromised in an incident were 15 GB of data and 22 million lines of information.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 15 GB of data and 22 million lines of information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 26.0M.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'.
Most Recent Source: The most recent source of information about an incident are Breachforums (cybercrime forum) and BFMTV.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (22-year-old suspect arrested).
Most Recent Customer Advisory: The most recent customer advisory issued was an CAF issued a public statement denying the breach and clarifying data origin.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Alleged compromise of employee personal accounts (Ministry of Interior attack).
.png)
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.