Company Details
ministere-de-l-interieur
27,866
315,656
92
gouv.fr
0
MIN_2840950
In-progress

Ministère de l'Intérieur Company CyberSecurity Posture
gouv.fr----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Company Details
ministere-de-l-interieur
27,866
315,656
92
gouv.fr
0
MIN_2840950
In-progress
Between 700 and 749

MDL Global Score (TPRM)XXXX

Description: **French Interior Ministry Hit by Cyber Attack, Investigation Underway** On December 12, France’s Interior Ministry confirmed that its email servers were targeted in a cyber attack earlier this week. Interior Minister Laurent Nuñez revealed in an interview with RTL radio that an attacker accessed a number of files, though there is no evidence to suggest they were severely compromised. Nuñez stated that immediate protection measures were implemented, including strengthened access controls for ministry personnel. An ongoing investigation aims to determine the scope and origin of the breach, though no details about the attacker or their motives have been disclosed at this stage. The incident highlights growing cybersecurity threats to government infrastructure, with authorities working to assess potential risks and prevent further exposure.
Description: **Cyberattack Claim Targets French Family Benefits Agency (CAF) Amid Hacker’s Escalating Threats** A hacker known as *Indra*, who previously claimed responsibility for a cyberattack on France’s Interior Ministry, has now alleged a breach of the *Caisse d’Allocations Familiales* (CAF), the national family benefits agency. In a post on the cybercriminal forum *Breachforums* late yesterday, the hacker asserted access to 15 GB of data—reportedly containing 22 million lines of personal information on nearly 4 million beneficiaries. The leaked files, reviewed by *BFMTV*, include names, birthdates, email addresses, and phone numbers of individuals registered with the CAF between September 2022 and November 2025. Indra framed the attack as a "Christmas gift to France." The CAF swiftly denied the claims, stating that no intrusion or vulnerability had been detected in its systems. In an official response, the agency insisted its infrastructure remains secure and that the exposed data did not originate from its own databases. Instead, the CAF suggested the information may have been sourced from other public services with which it exchanges data, though it confirmed no technical breach of its information flows. Notably, the agency emphasized that no banking details or passwords were included in the leaked files. The same *Indra* account had earlier claimed responsibility for compromising the Interior Ministry’s systems, including sensitive police databases like the *Traitement des Antécédents Judiciaires* (TAJ) and the *Fichier des Personnes Recherchées* (FPR). That attack was reportedly executed by hijacking personal email accounts of ministry employees. Authorities arrested a 22-year-old suspect in connection with the Interior Ministry breach just hours before the CAF-related post appeared, though the origin of the CAF data remains unconfirmed. While the CAF maintains its systems were not breached, the authenticity of the leaked data raises questions about the broader security of interconnected public-sector networks. Investigations into both incidents are ongoing.
Description: **French Interior Ministry Hit by Cyberattack, Confidential Law Enforcement Files Breached** French Interior Minister Laurent Nunez confirmed that hackers accessed "dozens of confidential files" in a cyberattack targeting the ministry last week. The breach compromised sensitive law enforcement databases, including records from the Criminal Records Processing system and the Wanted Persons File. Speaking to *Franceinfo* on Wednesday, Nunez acknowledged the severity of the incident, stating that while only a limited number of files were extracted, the systems contain millions of records. Authorities are still assessing the full scope of the compromise, with investigations ongoing to determine the exact data accessed. Nunez described the attack as a "serious act," emphasizing the potential risks to law enforcement operations. The ministry has not yet disclosed the origin of the breach or whether the attackers were state-sponsored or criminal actors.


Ministère de l'Intérieur has 265.85% more incidents than the average of same-industry companies with at least one recorded incident.
Ministère de l'Intérieur has 284.62% more incidents than the average of all companies with at least one recorded incident.
Ministère de l'Intérieur reported 3 incidents this year: 3 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
MDL cyber incidents detection timeline including parent company and subsidiaries

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Il ministero dell'Interno è una struttura complessa il cui assetto organizzativo è disciplinato dal D.L.vo n. 300/99 e dai provvedimenti attuativi. A livello centrale, si articola in uffici di diretta collaborazione con il ministro (D.P.R. n. 98/2002) e cinque dipartimenti (D.P.R. n. 398/2001 e succ

Travailler dans la fonction publique du Québec, c'est plus qu'une carrière! Réparti(e)s dans une vingtaine de ministères et une soixantaine d'organismes à travers le Québec, tous les gestes posés par les employé(e)s de la fonction publique façonnent l’avenir de la société et contribuent à améliorer

Montréal est la plus grande ville francophone d’Amérique et elle se distingue par sa vitalité culturelle exceptionnelle et des forces créatrices reconnues mondialement. Elle se développe un peu plus chaque jour en une ville contemporaine, inclusive et dynamique sur les plans économique, culturel

El Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) es el principal organismo dedicado a la promoción de la ciencia y la tecnología en la Argentina. Su actividad se desarrolla en cuatro grandes áreas: • Ciencias agrarias, ingeniería y de materiales • Ciencias biológicas y de la s

With a workforce of 30,000 people, and opportunities in 1,000 different job categories, the City of Philadelphia is one of the largest employers in Southeastern Pennsylvania. As an employer, we operate through the guiding principles of service, integrity, respect, accountability, collaboration, dive

Empresa Brasileira de Correios e Telégrafos foi criada como empresa em 1969 por decreto lei. Hoje conta com mais de 100.000 empregados, tem presença em todos os municípios do Brasil. NEGÓCIO: Soluções que aproximam. MISSÃO: Fornecer soluções acessíveis e confiáveis para conectar pessoas, institu

U.S. Environmental Protection Agency’s (EPA) mission is to protect human health and the environment. EPA works to ensure that: - Americans have clean air, land and water; - National efforts to reduce environmental risks are based on the best available scientific information; - Federal laws protecti

Region Västra Götaland is governed by democratically elected politicians and with just over 50,000 employees is one of Sweden’s biggest employers. It is tasked with offering good healthcare and dental care and providing the prerequisites for good public health, a rich cultural life, a good enviro

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all — including those who have historically been left out. We are doing the work to make our state a place for every Cali
.png)
Un succès record pour le tourisme local. La 9ᵉ édition du Tsenaben'ny Fizahantany se tient du 14 au 16 avril 2025 au Stade BAREA Mahamasina...
More than forty representatives of Czech and Luxembourg institutions and technology companies took part in the “Smart Security & Defence:...
The Minister of the Interior and Public Security, Bamba Cissé, has launched a ser...
Data Centre World Paris leads the way as a premier event for the data centre sector, featuring a compelling lineup of sessions and speakers...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ministère de l'Intérieur is https://www.interieur.gouv.fr/.
According to Rankiteo, Ministère de l'Intérieur’s AI-generated cybersecurity score is 729, reflecting their Moderate security posture.
According to Rankiteo, Ministère de l'Intérieur currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ministère de l'Intérieur is not certified under SOC 2 Type 1.
According to Rankiteo, Ministère de l'Intérieur does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ministère de l'Intérieur is not listed as GDPR compliant.
According to Rankiteo, Ministère de l'Intérieur does not currently maintain PCI DSS compliance.
According to Rankiteo, Ministère de l'Intérieur is not compliant with HIPAA regulations.
According to Rankiteo,Ministère de l'Intérieur is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ministère de l'Intérieur operates primarily in the Government Administration industry.
Ministère de l'Intérieur employs approximately 27,866 people worldwide.
Ministère de l'Intérieur presently has no subsidiaries across any sectors.
Ministère de l'Intérieur’s official LinkedIn profile has approximately 315,656 followers.
Ministère de l'Intérieur is classified under the NAICS code 92, which corresponds to Public Administration.
No, Ministère de l'Intérieur does not have a profile on Crunchbase.
Yes, Ministère de l'Intérieur maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ministere-de-l-interieur.
As of December 18, 2025, Rankiteo reports that Ministère de l'Intérieur has experienced 3 cybersecurity incidents.
Ministère de l'Intérieur has an estimated 11,742 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with public disclosure via franceinfo, and containment measures with protection measures implemented, strengthened access conditions for agents, and communication strategy with public disclosure via rtl radio, and law enforcement notified with yes (investigation ongoing), and communication strategy with public denial of breach, clarification on data origin..
Title: Cyberattack on French Interior Ministry
Description: French Interior Minister Laurent Nunez confirmed that hackers accessed 'dozens of confidential files' during a cyberattack targeting the ministry, including sensitive law enforcement databases such as the Criminal Records Processing system and the Wanted Persons File.
Type: Data Breach
Title: Cyber Attack on French Interior Ministry's Email Servers
Description: The French Interior Ministry’s email servers were the target of a cyber attack this week. An attacker was able to access a number of files, but there is no evidence that they were seriously compromised. Protection measures have been put in place, and an investigation is underway.
Date Publicly Disclosed: 2023-12-12
Type: Cyber Attack
Title: Alleged Cyberattack on Caisse d'Allocations Familiales (CAF) by Hacker Indra
Description: Hacker Indra claimed to have compromised the systems of the Caisse d'Allocations Familiales (CAF) and published 15 GB of data containing personal information of nearly 4 million allocataires. CAF denies any intrusion into its systems, suggesting the data may originate from other public services.
Type: Data Breach
Attack Vector: Compromised employee personal accounts (alleged)
Threat Actor: Indra
Motivation: Unknown (possibly financial gain or disruption)
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Alleged compromise of employee personal accounts (Ministry of Interior attack).

Data Compromised: Dozens of confidential files, including records from the Criminal Records Processing system and the Wanted Persons File
Systems Affected: Criminal Records Processing system, Wanted Persons File
Identity Theft Risk: High

Data Compromised: Files accessed (sensitivity not confirmed)
Systems Affected: Email servers
Operational Impact: Strengthened access conditions for agents

Data Compromised: 15 GB of data, 22 million lines of information
Brand Reputation Impact: Potential reputational damage due to data exposure
Identity Theft Risk: High (personal data exposed)
Payment Information Risk: None (no banking data or passwords exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Confidential law enforcement files, criminal records, wanted persons data, Files (unspecified), Names, First Names, Dates Of Birth, Emails, Phone Numbers and .

Entity Name: French Interior Ministry
Entity Type: Government
Industry: Public Sector
Location: France

Entity Name: French Interior Ministry
Entity Type: Government
Industry: Public Sector
Location: France

Entity Name: Caisse d'Allocations Familiales (CAF)
Entity Type: Government Agency
Industry: Social Services
Location: France
Customers Affected: Nearly 4 million allocataires

Communication Strategy: Public disclosure via Franceinfo

Containment Measures: Protection measures implemented, strengthened access conditions for agents
Communication Strategy: Public disclosure via RTL radio

Law Enforcement Notified: Yes (investigation ongoing)
Communication Strategy: Public denial of breach, clarification on data origin

Type of Data Compromised: Confidential law enforcement files, criminal records, wanted persons data
Number of Records Exposed: Dozens (potentially millions of data records at risk)
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Files (unspecified)
Sensitivity of Data: Not seriously compromised (per investigation)

Type of Data Compromised: Names, First names, Dates of birth, Emails, Phone numbers
Number of Records Exposed: 22 million lines of information (allegedly 4 million allocataires)
Sensitivity of Data: High (personally identifiable information)
Data Exfiltration: Yes (15 GB of data published)
Personally Identifiable Information: Yes
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by protection measures implemented and strengthened access conditions for agents.

Legal Actions: Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'.

Source: Franceinfo

Source: BFMTV

Source: Breachforums (cybercrime forum)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Franceinfo, and Source: ReutersDate Accessed: 2023-12-12, and Source: BFMTV, and Source: Breachforums (cybercrime forum).

Investigation Status: Ongoing

Investigation Status: Underway

Investigation Status: Ongoing (22-year-old suspect arrested)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure via Franceinfo, Public disclosure via RTL radio, Public denial of breach and clarification on data origin.

Customer Advisories: CAF issued a public statement denying the breach and clarifying data origin
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was CAF issued a public statement denying the breach and clarifying data origin.

Entry Point: Alleged compromise of employee personal accounts (Ministry of Interior attack)
Last Attacking Group: The attacking group in the last incident was an Indra.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-12-12.
Most Significant Data Compromised: The most significant data compromised in an incident were Dozens of confidential files, including records from the Criminal Records Processing system and the Wanted Persons File, Files accessed (sensitivity not confirmed), 15 GB of data and 22 million lines of information.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Protection measures implemented and strengthened access conditions for agents.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Files accessed (sensitivity not confirmed), Dozens of confidential files, including records from the Criminal Records Processing system and the Wanted Persons File, 15 GB of data and 22 million lines of information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 26.0M.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'.
Most Recent Source: The most recent source of information about an incident are Franceinfo, BFMTV, Reuters and Breachforums (cybercrime forum).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued was an CAF issued a public statement denying the breach and clarifying data origin.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Alleged compromise of employee personal accounts (Ministry of Interior attack).
.png)
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.