ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Ministère de l'Intérieur A.I CyberSecurity Scoring

MDL

Company Details

Linkedin ID:

ministere-de-l-interieur

Employees number:

27,866

Number of followers:

315,656

NAICS:

92

Industry Type:

Government Administration

Homepage:

gouv.fr

IP Addresses:

0

Company ID:

MIN_2840950

Scan Status:

In-progress

AI scoreMDL Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/ministere-de-l-interieur.jpeg
MDL Government Administration
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreMDL Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ministere-de-l-interieur.jpeg
MDL Government Administration
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

MDL Company CyberSecurity News & History

Past Incidents
3
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
French Interior Ministry: French Interior Ministry’s e-mail servers hit by cyber attack, minister saysCyber Attack60212/2025
Rankiteo Explanation :
Attack limited on finance or reputation

Description: **French Interior Ministry Hit by Cyber Attack, Investigation Underway** On December 12, France’s Interior Ministry confirmed that its email servers were targeted in a cyber attack earlier this week. Interior Minister Laurent Nuñez revealed in an interview with RTL radio that an attacker accessed a number of files, though there is no evidence to suggest they were severely compromised. Nuñez stated that immediate protection measures were implemented, including strengthened access controls for ministry personnel. An ongoing investigation aims to determine the scope and origin of the breach, though no details about the attacker or their motives have been disclosed at this stage. The incident highlights growing cybersecurity threats to government infrastructure, with authorities working to assess potential risks and prevent further exposure.

Ministère de l'Intérieur and Caisse d'Allocations Familiales: Le pirate du ministère de l'Intérieur revendique un hack de la CAF: la Caisse nationale nie toute attaque et "confirme la sécurité de son système d'information"Cyber Attack100812/2025
Rankiteo Explanation :
Attack that could bring to a war

Description: **Cyberattack Claim Targets French Family Benefits Agency (CAF) Amid Hacker’s Escalating Threats** A hacker known as *Indra*, who previously claimed responsibility for a cyberattack on France’s Interior Ministry, has now alleged a breach of the *Caisse d’Allocations Familiales* (CAF), the national family benefits agency. In a post on the cybercriminal forum *Breachforums* late yesterday, the hacker asserted access to 15 GB of data—reportedly containing 22 million lines of personal information on nearly 4 million beneficiaries. The leaked files, reviewed by *BFMTV*, include names, birthdates, email addresses, and phone numbers of individuals registered with the CAF between September 2022 and November 2025. Indra framed the attack as a "Christmas gift to France." The CAF swiftly denied the claims, stating that no intrusion or vulnerability had been detected in its systems. In an official response, the agency insisted its infrastructure remains secure and that the exposed data did not originate from its own databases. Instead, the CAF suggested the information may have been sourced from other public services with which it exchanges data, though it confirmed no technical breach of its information flows. Notably, the agency emphasized that no banking details or passwords were included in the leaked files. The same *Indra* account had earlier claimed responsibility for compromising the Interior Ministry’s systems, including sensitive police databases like the *Traitement des Antécédents Judiciaires* (TAJ) and the *Fichier des Personnes Recherchées* (FPR). That attack was reportedly executed by hijacking personal email accounts of ministry employees. Authorities arrested a 22-year-old suspect in connection with the Interior Ministry breach just hours before the CAF-related post appeared, though the origin of the CAF data remains unconfirmed. While the CAF maintains its systems were not breached, the authenticity of the leaked data raises questions about the broader security of interconnected public-sector networks. Investigations into both incidents are ongoing.

French Interior Ministry: Hackers breach French interior ministry, access dozens of confidential files: ministerCyber Attack100512/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: **French Interior Ministry Hit by Cyberattack, Confidential Law Enforcement Files Breached** French Interior Minister Laurent Nunez confirmed that hackers accessed "dozens of confidential files" in a cyberattack targeting the ministry last week. The breach compromised sensitive law enforcement databases, including records from the Criminal Records Processing system and the Wanted Persons File. Speaking to *Franceinfo* on Wednesday, Nunez acknowledged the severity of the incident, stating that while only a limited number of files were extracted, the systems contain millions of records. Authorities are still assessing the full scope of the compromise, with investigations ongoing to determine the exact data accessed. Nunez described the attack as a "serious act," emphasizing the potential risks to law enforcement operations. The ministry has not yet disclosed the origin of the breach or whether the attackers were state-sponsored or criminal actors.

French Interior Ministry: French Interior Ministry’s e-mail servers hit by cyber attack, minister says
Cyber Attack
Severity: 60
Impact: 2
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack limited on finance or reputation

Description: **French Interior Ministry Hit by Cyber Attack, Investigation Underway** On December 12, France’s Interior Ministry confirmed that its email servers were targeted in a cyber attack earlier this week. Interior Minister Laurent Nuñez revealed in an interview with RTL radio that an attacker accessed a number of files, though there is no evidence to suggest they were severely compromised. Nuñez stated that immediate protection measures were implemented, including strengthened access controls for ministry personnel. An ongoing investigation aims to determine the scope and origin of the breach, though no details about the attacker or their motives have been disclosed at this stage. The incident highlights growing cybersecurity threats to government infrastructure, with authorities working to assess potential risks and prevent further exposure.

Ministère de l'Intérieur and Caisse d'Allocations Familiales: Le pirate du ministère de l'Intérieur revendique un hack de la CAF: la Caisse nationale nie toute attaque et "confirme la sécurité de son système d'information"
Cyber Attack
Severity: 100
Impact: 8
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack that could bring to a war

Description: **Cyberattack Claim Targets French Family Benefits Agency (CAF) Amid Hacker’s Escalating Threats** A hacker known as *Indra*, who previously claimed responsibility for a cyberattack on France’s Interior Ministry, has now alleged a breach of the *Caisse d’Allocations Familiales* (CAF), the national family benefits agency. In a post on the cybercriminal forum *Breachforums* late yesterday, the hacker asserted access to 15 GB of data—reportedly containing 22 million lines of personal information on nearly 4 million beneficiaries. The leaked files, reviewed by *BFMTV*, include names, birthdates, email addresses, and phone numbers of individuals registered with the CAF between September 2022 and November 2025. Indra framed the attack as a "Christmas gift to France." The CAF swiftly denied the claims, stating that no intrusion or vulnerability had been detected in its systems. In an official response, the agency insisted its infrastructure remains secure and that the exposed data did not originate from its own databases. Instead, the CAF suggested the information may have been sourced from other public services with which it exchanges data, though it confirmed no technical breach of its information flows. Notably, the agency emphasized that no banking details or passwords were included in the leaked files. The same *Indra* account had earlier claimed responsibility for compromising the Interior Ministry’s systems, including sensitive police databases like the *Traitement des Antécédents Judiciaires* (TAJ) and the *Fichier des Personnes Recherchées* (FPR). That attack was reportedly executed by hijacking personal email accounts of ministry employees. Authorities arrested a 22-year-old suspect in connection with the Interior Ministry breach just hours before the CAF-related post appeared, though the origin of the CAF data remains unconfirmed. While the CAF maintains its systems were not breached, the authenticity of the leaked data raises questions about the broader security of interconnected public-sector networks. Investigations into both incidents are ongoing.

French Interior Ministry: Hackers breach French interior ministry, access dozens of confidential files: minister
Cyber Attack
Severity: 100
Impact: 5
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: **French Interior Ministry Hit by Cyberattack, Confidential Law Enforcement Files Breached** French Interior Minister Laurent Nunez confirmed that hackers accessed "dozens of confidential files" in a cyberattack targeting the ministry last week. The breach compromised sensitive law enforcement databases, including records from the Criminal Records Processing system and the Wanted Persons File. Speaking to *Franceinfo* on Wednesday, Nunez acknowledged the severity of the incident, stating that while only a limited number of files were extracted, the systems contain millions of records. Authorities are still assessing the full scope of the compromise, with investigations ongoing to determine the exact data accessed. Nunez described the attack as a "serious act," emphasizing the potential risks to law enforcement operations. The ministry has not yet disclosed the origin of the breach or whether the attackers were state-sponsored or criminal actors.

Ailogo

MDL Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for MDL

Incidents vs Government Administration Industry Average (This Year)

Ministère de l'Intérieur has 265.85% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Ministère de l'Intérieur has 284.62% more incidents than the average of all companies with at least one recorded incident.

Incident Types MDL vs Government Administration Industry Avg (This Year)

Ministère de l'Intérieur reported 3 incidents this year: 3 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — MDL (X = Date, Y = Severity)

MDL cyber incidents detection timeline including parent company and subsidiaries

MDL Company Subsidiaries

SubsidiaryImage

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Loading...
similarCompanies

MDL Similar Companies

Ministero dell'Interno

Il ministero dell'Interno è una struttura complessa il cui assetto organizzativo è disciplinato dal D.L.vo n. 300/99 e dai provvedimenti attuativi. A livello centrale, si articola in uffici di diretta collaborazione con il ministro (D.P.R. n. 98/2002) e cinque dipartimenti (D.P.R. n. 398/2001 e succ

Gouvernement du Québec – Carrières

Travailler dans la fonction publique du Québec, c'est plus qu'une carrière! Réparti(e)s dans une vingtaine de ministères et une soixantaine d'organismes à travers le Québec, tous les gestes posés par les employé(e)s de la fonction publique façonnent l’avenir de la société et contribuent à améliorer

Ville de Montréal

Montréal est la plus grande ville francophone d’Amérique et elle se distingue par sa vitalité culturelle exceptionnelle et des forces créatrices reconnues mondialement. Elle se développe un peu plus chaque jour en une ville contemporaine, inclusive et dynamique sur les plans économique, culturel

El Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) es el principal organismo dedicado a la promoción de la ciencia y la tecnología en la Argentina. Su actividad se desarrolla en cuatro grandes áreas: • Ciencias agrarias, ingeniería y de materiales • Ciencias biológicas y de la s

City of Philadelphia

With a workforce of 30,000 people, and opportunities in 1,000 different job categories, the City of Philadelphia is one of the largest employers in Southeastern Pennsylvania. As an employer, we operate through the guiding principles of service, integrity, respect, accountability, collaboration, dive

Empresa Brasileira de Correios e Telégrafos foi criada como empresa em 1969 por decreto lei. Hoje conta com mais de 100.000 empregados, tem presença em todos os municípios do Brasil. NEGÓCIO: Soluções que aproximam. MISSÃO: Fornecer soluções acessíveis e confiáveis para conectar pessoas, institu

US Environmental Protection Agency (EPA)

U.S. Environmental Protection Agency’s (EPA) mission is to protect human health and the environment. EPA works to ensure that: - Americans have clean air, land and water; - National efforts to reduce environmental risks are based on the best available scientific information; - Federal laws protecti

Västra Götalandsregionen

Region Västra Götaland is governed by democratically elected politicians and with just over 50,000 employees is one of Sweden’s biggest employers. It is tasked with offering good healthcare and dental care and providing the prerequisites for good public health, a rich cultural life, a good enviro

State of California

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all — including those who have historically been left out. We are doing the work to make our state a place for every Cali

newsone

MDL CyberSecurity News

November 17, 2025 08:00 AM
Le salon Tsenaben’ny Fizahantany 2025 attire plus de 7 500 visiteurs

Un succès record pour le tourisme local. La 9ᵉ édition du Tsenaben'ny Fizahantany se tient du 14 au 16 avril 2025 au Stade BAREA Mahamasina...

October 15, 2025 07:00 AM
Czechia and Luxembourg Strengthen Cooperation in Defence, Cybersecurity, and European Funding

More than forty representatives of Czech and Luxembourg institutions and technology companies took part in the “Smart Security & Defence:...

October 01, 2025 06:29 PM
Security: Interior Minister Bamba Cissé begins tour of police services

The Minister of the Interior and Public Security, Bamba Cissé, has launched a ser...

February 21, 2024 08:00 AM
Data Centre World Paris 2023 sets new benchmarks with expert insights and global perspectives

Data Centre World Paris leads the way as a premier event for the data centre sector, featuring a compelling lineup of sessions and speakers...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

MDL CyberSecurity History Information

Official Website of Ministère de l'Intérieur

The official website of Ministère de l'Intérieur is https://www.interieur.gouv.fr/.

Ministère de l'Intérieur’s AI-Generated Cybersecurity Score

According to Rankiteo, Ministère de l'Intérieur’s AI-generated cybersecurity score is 729, reflecting their Moderate security posture.

How many security badges does Ministère de l'Intérieur’ have ?

According to Rankiteo, Ministère de l'Intérieur currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Ministère de l'Intérieur have SOC 2 Type 1 certification ?

According to Rankiteo, Ministère de l'Intérieur is not certified under SOC 2 Type 1.

Does Ministère de l'Intérieur have SOC 2 Type 2 certification ?

According to Rankiteo, Ministère de l'Intérieur does not hold a SOC 2 Type 2 certification.

Does Ministère de l'Intérieur comply with GDPR ?

According to Rankiteo, Ministère de l'Intérieur is not listed as GDPR compliant.

Does Ministère de l'Intérieur have PCI DSS certification ?

According to Rankiteo, Ministère de l'Intérieur does not currently maintain PCI DSS compliance.

Does Ministère de l'Intérieur comply with HIPAA ?

According to Rankiteo, Ministère de l'Intérieur is not compliant with HIPAA regulations.

Does Ministère de l'Intérieur have ISO 27001 certification ?

According to Rankiteo,Ministère de l'Intérieur is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Ministère de l'Intérieur

Ministère de l'Intérieur operates primarily in the Government Administration industry.

Number of Employees at Ministère de l'Intérieur

Ministère de l'Intérieur employs approximately 27,866 people worldwide.

Subsidiaries Owned by Ministère de l'Intérieur

Ministère de l'Intérieur presently has no subsidiaries across any sectors.

Ministère de l'Intérieur’s LinkedIn Followers

Ministère de l'Intérieur’s official LinkedIn profile has approximately 315,656 followers.

NAICS Classification of Ministère de l'Intérieur

Ministère de l'Intérieur is classified under the NAICS code 92, which corresponds to Public Administration.

Ministère de l'Intérieur’s Presence on Crunchbase

No, Ministère de l'Intérieur does not have a profile on Crunchbase.

Ministère de l'Intérieur’s Presence on LinkedIn

Yes, Ministère de l'Intérieur maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ministere-de-l-interieur.

Cybersecurity Incidents Involving Ministère de l'Intérieur

As of December 18, 2025, Rankiteo reports that Ministère de l'Intérieur has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

Ministère de l'Intérieur has an estimated 11,742 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Ministère de l'Intérieur ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

How does Ministère de l'Intérieur detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with public disclosure via franceinfo, and containment measures with protection measures implemented, strengthened access conditions for agents, and communication strategy with public disclosure via rtl radio, and law enforcement notified with yes (investigation ongoing), and communication strategy with public denial of breach, clarification on data origin..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Cyberattack on French Interior Ministry

Description: French Interior Minister Laurent Nunez confirmed that hackers accessed 'dozens of confidential files' during a cyberattack targeting the ministry, including sensitive law enforcement databases such as the Criminal Records Processing system and the Wanted Persons File.

Type: Data Breach

Incident : Cyber Attack

Title: Cyber Attack on French Interior Ministry's Email Servers

Description: The French Interior Ministry’s email servers were the target of a cyber attack this week. An attacker was able to access a number of files, but there is no evidence that they were seriously compromised. Protection measures have been put in place, and an investigation is underway.

Date Publicly Disclosed: 2023-12-12

Type: Cyber Attack

Incident : Data Breach

Title: Alleged Cyberattack on Caisse d'Allocations Familiales (CAF) by Hacker Indra

Description: Hacker Indra claimed to have compromised the systems of the Caisse d'Allocations Familiales (CAF) and published 15 GB of data containing personal information of nearly 4 million allocataires. CAF denies any intrusion into its systems, suggesting the data may originate from other public services.

Type: Data Breach

Attack Vector: Compromised employee personal accounts (alleged)

Threat Actor: Indra

Motivation: Unknown (possibly financial gain or disruption)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Alleged compromise of employee personal accounts (Ministry of Interior attack).

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach MIN1765957651

Data Compromised: Dozens of confidential files, including records from the Criminal Records Processing system and the Wanted Persons File

Systems Affected: Criminal Records Processing system, Wanted Persons File

Identity Theft Risk: High

Incident : Cyber Attack MIN1766008492

Data Compromised: Files accessed (sensitivity not confirmed)

Systems Affected: Email servers

Operational Impact: Strengthened access conditions for agents

Incident : Data Breach MINCAF1766073386

Data Compromised: 15 GB of data, 22 million lines of information

Brand Reputation Impact: Potential reputational damage due to data exposure

Identity Theft Risk: High (personal data exposed)

Payment Information Risk: None (no banking data or passwords exposed)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Confidential law enforcement files, criminal records, wanted persons data, Files (unspecified), Names, First Names, Dates Of Birth, Emails, Phone Numbers and .

Which entities were affected by each incident ?

Incident : Data Breach MIN1765957651

Entity Name: French Interior Ministry

Entity Type: Government

Industry: Public Sector

Location: France

Incident : Cyber Attack MIN1766008492

Entity Name: French Interior Ministry

Entity Type: Government

Industry: Public Sector

Location: France

Incident : Data Breach MINCAF1766073386

Entity Name: Caisse d'Allocations Familiales (CAF)

Entity Type: Government Agency

Industry: Social Services

Location: France

Customers Affected: Nearly 4 million allocataires

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach MIN1765957651

Communication Strategy: Public disclosure via Franceinfo

Incident : Cyber Attack MIN1766008492

Containment Measures: Protection measures implemented, strengthened access conditions for agents

Communication Strategy: Public disclosure via RTL radio

Incident : Data Breach MINCAF1766073386

Law Enforcement Notified: Yes (investigation ongoing)

Communication Strategy: Public denial of breach, clarification on data origin

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach MIN1765957651

Type of Data Compromised: Confidential law enforcement files, criminal records, wanted persons data

Number of Records Exposed: Dozens (potentially millions of data records at risk)

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Incident : Cyber Attack MIN1766008492

Type of Data Compromised: Files (unspecified)

Sensitivity of Data: Not seriously compromised (per investigation)

Incident : Data Breach MINCAF1766073386

Type of Data Compromised: Names, First names, Dates of birth, Emails, Phone numbers

Number of Records Exposed: 22 million lines of information (allegedly 4 million allocataires)

Sensitivity of Data: High (personally identifiable information)

Data Exfiltration: Yes (15 GB of data published)

Personally Identifiable Information: Yes

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by protection measures implemented and strengthened access conditions for agents.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach MINCAF1766073386

Legal Actions: Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'.

References

Where can I find more information about each incident ?

Incident : Data Breach MIN1765957651

Source: Franceinfo

Incident : Cyber Attack MIN1766008492

Source: Reuters

Date Accessed: 2023-12-12

Incident : Data Breach MINCAF1766073386

Source: BFMTV

Incident : Data Breach MINCAF1766073386

Source: Breachforums (cybercrime forum)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Franceinfo, and Source: ReutersDate Accessed: 2023-12-12, and Source: BFMTV, and Source: Breachforums (cybercrime forum).

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach MIN1765957651

Investigation Status: Ongoing

Incident : Cyber Attack MIN1766008492

Investigation Status: Underway

Incident : Data Breach MINCAF1766073386

Investigation Status: Ongoing (22-year-old suspect arrested)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure via Franceinfo, Public disclosure via RTL radio, Public denial of breach and clarification on data origin.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach MINCAF1766073386

Customer Advisories: CAF issued a public statement denying the breach and clarifying data origin

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was CAF issued a public statement denying the breach and clarifying data origin.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach MINCAF1766073386

Entry Point: Alleged compromise of employee personal accounts (Ministry of Interior attack)

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Indra.

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-12-12.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Dozens of confidential files, including records from the Criminal Records Processing system and the Wanted Persons File, Files accessed (sensitivity not confirmed), 15 GB of data and 22 million lines of information.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Protection measures implemented and strengthened access conditions for agents.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Files accessed (sensitivity not confirmed), Dozens of confidential files, including records from the Criminal Records Processing system and the Wanted Persons File, 15 GB of data and 22 million lines of information.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 26.0M.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Franceinfo, BFMTV, Reuters and Breachforums (cybercrime forum).

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an CAF issued a public statement denying the breach and clarifying data origin.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Alleged compromise of employee personal accounts (Ministry of Interior attack).

cve

Latest Global CVEs (Not Company-Specific)

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ministere-de-l-interieur' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge