DARK WEB INTEL | DATA BREACH
Active Threat10 min read

France's ID Agency Breach: 11.7M Citizens' Identity Records Now for Sale

11.7M
citizen accounts confirmed compromised — France Titres confirmed the figure on April 24, nine days after the breach was detected on April 15
~19M
records claimed by the EvilDump/breach3d dark web listing — roughly one-third of France's entire 68-million population
8
data categories stolen per record: full name, date/place of birth, email, phone, postal address, account ID, gender, and civil status
10
days between ANTS detecting the breach on April 15 and publicly confirming 11.7 million impacted accounts on April 24

France Titres — the French government agency that manages passport applications, driver's licence renewals, and national identity card issuance for every French citizen — confirmed on April 24, 2026 that a breach of its ants.gouv.fr portal has compromised 11.7 million citizen accounts, with a coordinated threat group now listing the stolen France Titres ANTS data breach dataset for sale on criminal dark web forums. A three-actor group operating under the aliases EvilDump, ExtaseHunters, and breach3d posted the sale listing on April 16, claiming to hold between 18 and 19 million records — roughly one-third of France's 68-million population — extracted through what the forensic evidence indicates was structured database exfiltration rather than surface-layer scraping.

The dataset being sold is not a commercial website's user base. France Titres is the Ministry of the Interior's identity infrastructure. Every French national who has renewed a passport, registered a vehicle, or applied for a national identity card in recent years has an account on ants.gouv.fr. The records now offered on dark web forums contain government-validated full legal names, dates and places of birth, residential addresses, phone numbers, email addresses, civil status, and unique account identifiers — precisely the data bundle required for high-confidence identity fraud, SIM-swap attacks, FranceConnect government SSO impersonation, and targeted spear-phishing at national scale.

The risk extends well beyond immediate phishing threats. Government-verified identity data has a long operational shelf life for fraud networks — researchers tracking the aftermath of the Infutor/Verisk SSN breach found that dataset being actively used for identity fraud enrichment more than 18 months after its initial dark web sale. With French national elections approaching and government-issued ID serving as the foundation of financial account verification and healthcare access, the ANTS dataset represents a durable intelligence asset for criminal operators. ANSSI, CNIL, and OFAC are all engaged — but the records are already circulating.

What France Titres Holds and Why Its Data Commands Dark Web Premium Prices

France Titres (ANTS) was established to digitise France's administrative document ecosystem and currently processes approximately 20 million identity document requests per year. Every French national's interaction with ants.gouv.fr — whether applying for a passport, renewing a driver's licence, requesting a vehicle registration card, or checking an application status — creates or updates an account record on the agency's backend systems. Professional accounts used by agents who process applications on behalf of businesses are also held in the same infrastructure, meaning the breach has both consumer and enterprise dimensions.

What distinguishes this dataset from a typical commercial breach is the authentication source. ANTS accounts are linked to government-verified identity: birthdates are validated against civil registry records, addresses are verified through the document issuance process, and names are taken directly from official identity documents. Unlike consumer breach data — where records may be incomplete, synthesised from multiple sources, or inaccurate — an ANTS account record carries implicit government validation. Fraud operators pay significant premiums for data with this provenance because it can be used directly to pass identity verification checks at financial institutions, mobile carriers, and government portals without additional enrichment.

This premium-value characteristic distinguishes the ANTS breach from even large-scale commercial incidents. The [Infutor/Verisk breach exposing 676 million US SSN records](/blog/infutor-verisk-676-million-ssn-dark-web-breach) commanded significant dark web prices specifically because of its government-adjacent data quality — the ANTS dataset, carrying official French Ministry of the Interior validation, occupies an even higher tier.

What Was Stolen: Eight Data Categories Per Government-Verified Record

The dataset posted for sale on April 16 by EvilDump, crediting ExtaseHunters and breach3d, includes eight data categories per record per the sample published with the listing: login IDs, full legal names, email addresses, dates of birth, places of birth, residential postal addresses, telephone numbers, and civil status data including gender and marital status. The presence of sequential internal database IDs in the exposed sample is the key forensic signal distinguishing this from a web-scraping incident.

Sequential database IDs are almost never exposed through surface-level portal scraping, which returns only UI-presented data and typically lacks internal primary keys. Their presence strongly implies the attacker obtained a direct database dump, accessed a backend API returning raw database objects, or exploited a vulnerability exposing internal record structures. ANTS has not disclosed the attack vector; the investigation remains active under ANSSI and OFAC.

The claimed dataset size — 18 to 19 million records against 11.7 million confirmed active accounts — suggests the extracted database contains historical entries, inactive accounts, or duplicate records from users who created profiles across multiple document application workflows. The distinction matters for scope assessment but not for risk: any record with valid name, date of birth, and address is immediately actionable for fraud operators regardless of whether the underlying portal account is still active. ANTS confirmed that the dataset also includes professional account data — agents who process document applications on behalf of clients — adding an enterprise intelligence dimension beyond consumer identity theft.

How the Breach Happened: Structured Database Exfiltration Signals

ANTS confirmed the breach occurred prior to April 15 — when the agency detected the incident — but has not disclosed the specific attack vector, and the technical investigation under ANSSI remains active. The forensic signals available from the threat actor's public sample point toward a specific attack class. Three scenarios are consistent with the sequential-ID evidence: a compromised administrative or API credential providing direct database access; a SQL injection or insecure direct object reference (IDOR) vulnerability in the ants.gouv.fr backend enabling unauthorised data enumeration; or a compromise of a third-party integration partner with backend database access.

The inclusion of professional account data alongside citizen records strengthens the third-party vector hypothesis — a system-to-system integration used by professional document agents would require backend database access, creating a potential supply-chain entry point that bypasses public-facing portal security controls. No ransomware group has claimed responsibility, no encryption event has been reported, and no demands have been publicised — indicating this is a pure exfiltration-and-sell operation. OFAC, France's dedicated cybercrime police unit within the National Gendarmerie, is leading the criminal attribution investigation alongside ANSSI.

The disclosure of data does not include additional data submitted during the various procedures. This personal data does not allow unauthorized access to the portal account.

ANTS official statement, April 2026

Breach Scope: 11.7 Million Confirmed — Up to One-Third of France at Risk

ANTS published an update on April 24 confirming 11.7 million accounts were impacted — nine days after detection. The agency began direct notification of affected account holders on April 22. The seven-day gap between detection and public acknowledgement drew scrutiny under GDPR Article 34, which requires communication to data subjects without undue delay when a breach is likely to result in high risk to their rights and freedoms. CNIL has been formally notified under Article 33 and can open a formal enforcement inquiry.

At 11.7 million confirmed records, the ANTS breach is larger than every major French data breach on public record — surpassing the 33 million French health insurance record breach disclosed in 2024. If EvilDump's 19 million figure is validated, it would represent France's single largest data breach and one of the ten largest government identity breaches globally. The Ministry of the Interior has filed a criminal referral with the Paris Public Prosecutor under Article 40 of the Code of Criminal Procedure, and ANSSI is coordinating across all response workstreams.

Threat Actors: EvilDump, ExtaseHunters, and breach3d — Who Posted the Data

The dark web sale listing was posted by a threat actor operating as EvilDump, explicitly crediting ExtaseHunters and breach3d as collaborators in the breach operation. This three-actor structure — a primary poster crediting technical collaborators — is characteristic of organised criminal groups operating on dedicated leak forums rather than ransomware gangs or state-sponsored APTs. breach3d has been observed in prior data sales on BreachForums and its successor forums; ExtaseHunters is a newer alias with limited prior attribution in public threat intelligence reporting.

No nation-state indicators — command-and-control infrastructure reuse, tradecraft signatures, or victimology patterns consistent with intelligence collection — have been identified in the ANTS breach. The motivation appears straightforwardly financial: government ID data sells at a premium to fraud networks, SIM-swap operators, and identity verification bypass services. Historical dark web sales of comparable government identity datasets have achieved prices in the range of $50,000 to $500,000 depending on uniqueness and volume, though EvilDump's listing has not publicly disclosed an asking price.

The breach is the latest in a series of high-profile French data exposures following the 2024 health insurance breach and the 2025 Education Ministry incident — raising questions about centralised identity infrastructure security standards across French government digital services and whether ANSSI's National Cybersecurity Strategy has adequately addressed government portal backend security.

No nation-state fingerprints, no ransomware signature — this is a data broker operation targeting government-validated identity records for premium dark web resale.

Threat intelligence assessment based on dark web forum analysis, April 2026

Indicators of Compromise and Fraud Vectors to Operationalise Now

France Titres has not published technical IOCs from the intrusion, and the ANSSI investigation is ongoing. However, the following observables and fraud vectors should be operationalised immediately by defenders and security teams supporting French-language organisations.

Phishing impersonation of ANTS and France Titres will emerge using stolen personalised data — defenders should update email gateway rules to flag messages referencing ants.gouv.fr, France Titres, the Ministry of the Interior, and document renewal processes. SIM-swap risk is elevated for affected French nationals — alert telecom security teams to increase verification friction on SIM-related requests from customers in the exposed population. FranceConnect — France's government SSO platform used across tax, healthcare, and benefits portals — uses identity verification aligned with the stolen data fields and should be treated as a high-risk downstream target.

The exposed email addresses also enable credential-stuffing enrichment: while passwords were not stolen, attackers knowing a victim's email, full name, and date of birth can use this combination to pass account recovery flows on many consumer platforms. Prior dark web data sales — including the [ShinyHunters McGraw Hill breach affecting 45 million accounts](/blog/shinyhunters-mcgraw-hill-salesforce-breach-45-million) — demonstrated that government-adjacent identity data remains actively monetised for 12 to 18 months after initial listing. The ANTS dataset should be treated as operationally live throughout 2026 and into 2027.

Indicators of Compromise
ArtifactTypeSHA-256 (Truncated)
EvilDump / breach3d / ExtaseHuntersThreat ActorActive on dark web forums; listed 11.7M+ French government identity records for sale on April 16, 2026
ants-gouv.fr / france-titres-securite.fr / ants-france.frPhishing DomainTyposquat variants of ants.gouv.fr expected in credential-harvesting phishing campaigns targeting French nationals
ants.gouv.fr portal exfiltrated datasetStolen Data8 categories per record: login ID, full name, email, DOB, birthplace, address, phone, civil status — sequential internal IDs confirm DB-level extraction
FranceConnect SSO impersonationAttack VectorDownstream risk: stolen ANTS data enables identity verification bypass on FranceConnect-integrated government portals

Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.

Remediation: What French Citizens and Enterprise Defenders Must Do Now

ANTS has confirmed that portal account passwords were not included in the stolen data and that the exposed records do not provide direct portal access. However, the combination of government-verified personal data now in criminal hands creates immediate and durable downstream risk requiring active defensive steps.

For enterprise defenders, treat any employee population with French nationality or ants.gouv.fr accounts as a high-risk phishing target. Update email filtering to flag ANTS and France Titres impersonation patterns. Include the breach in employee security awareness communications. Flag French-national employees for priority MFA enrollment if not already enrolled. Review FranceConnect integrations for identity verification bypass scenarios — a motivated attacker with full name, DOB, and address can attempt account registration or recovery on FranceConnect-integrated portals. The [ShinyHunters Amtrak breach affecting 9 million customer records](/blog/amtrak-shinyhunters-salesforce-breach-9-million-records) demonstrated that large-scale government-adjacent breach data creates sustained fraud campaigns lasting months; the ANTS dataset should be treated as live threat fuel throughout 2026.

Reset your ants.gouv.fr portal password immediately

Passwords were not stolen, but immediate credential rotation is best practice. Enable any available two-factor authentication on the portal.

Alert your bank and set fraud monitoring

Notify your financial institution that your identity data may have been exposed. Request enhanced verification on account changes, card applications, and online banking access.

Contact your mobile carrier to flag SIM security

Request enhanced verification friction for any SIM-related requests on your account. This directly mitigates the SIM-swap risk created by the stolen name, address, and contact data.

Monitor FranceConnect for unrecognised sessions

Check your FranceConnect government SSO dashboard for unrecognised access events. FranceConnect is used across French tax, healthcare, and benefits portals and is a high-value downstream target.

Watch for personalised phishing lures

Expect targeted phishing emails and SMS messages referencing your name, address, and upcoming document renewal deadlines. Do not click links in unsolicited messages claiming to be from ANTS or the Ministry of the Interior.

Enterprise: update email gateway phishing rules now

Add rules blocking or flagging messages impersonating ants.gouv.fr, France Titres, the Ministry of the Interior, and document renewal notifications. Prioritise French-national employees for phishing-resilience awareness.

The bottom line

The France Titres ANTS data breach is not a consumer website spill — it is a confirmed exfiltration of 11.7 million government-validated identity records that EvilDump, ExtaseHunters, and breach3d are actively selling on criminal forums. This dataset carries government authenticity that makes it premium fraud fuel: the records are accurate, complete, and they won't degrade. French nationals should immediately reset ants.gouv.fr credentials, alert banks and mobile carriers, and monitor FranceConnect for unrecognised activity. Security teams must deploy ANTS impersonation email filters, flag French-national employees as elevated phishing targets, and audit FranceConnect integrations for identity bypass scenarios. Monitor ANSSI and CNIL advisories as the OFAC criminal attribution investigation advances.

Frequently asked questions

What is France Titres (ANTS) and what data does it hold?

France Titres, officially the Agence nationale des titres sécurisés (ANTS), is the French Ministry of the Interior's platform for processing passport applications, driver's licence renewals, national identity cards, and vehicle registration. Every French national who has applied for or renewed an identity document since 2009 has an account on ants.gouv.fr containing government-verified biographic data: legal name, date and place of birth, residential address, and contact details.

How many people were affected by the France Titres ANTS breach?

ANTS confirmed on April 24, 2026 that 11.7 million accounts were impacted. The threat actor EvilDump claims to hold between 18 and 19 million records — roughly 28% of France's 68 million population. The discrepancy likely reflects duplicate or historical account entries in the extracted dataset. Either figure represents a nation-scale breach of a government identity system, making it France's largest confirmed data breach on public record.

What personal data was stolen in the ANTS breach?

Eight data categories were exposed per record: login IDs, full legal names, email addresses, dates and places of birth, unique account identifiers, residential postal addresses, telephone numbers, and civil status including gender and marital status. The dataset also includes data from professional agent accounts used by organisations that process ANTS applications on behalf of clients — adding a corporate intelligence dimension beyond consumer identity theft.

Is my French passport or driver's licence number compromised?

ANTS confirmed that document numbers were not included in the stolen data — only portal account and biographic data from ants.gouv.fr. Portal passwords were also not in the breach. However, the combination of name, date of birth, address, and contact details is sufficient to execute targeted phishing, SIM-swap attacks, and identity fraud without requiring the document numbers themselves.

Who are breach3d, EvilDump, and ExtaseHunters?

The dark web sale listing was posted by a threat actor operating as EvilDump, explicitly crediting breach3d and ExtaseHunters as collaborators. These aliases are active on criminal hacker forums. No nation-state attribution has been made. The three-actor, professionally structured listing — with a formatted sample dataset and explicit credit sharing — indicates an organised criminal group rather than a lone actor or state-sponsored APT operation.

What is CNIL doing about the France Titres breach?

ANTS notified CNIL, France's data protection authority, under GDPR Article 33, which requires notification within 72 hours of a breach becoming known. CNIL can open a formal enforcement inquiry into whether ANTS met its obligations under Articles 25 (data protection by design) and 32 (security of processing). A criminal referral was also filed with the Paris Public Prosecutor under Article 40 of the French Code of Criminal Procedure to establish a formal criminal investigation track.

How can I protect myself after the ANTS breach?

Immediately reset your ants.gouv.fr portal password. Alert your bank and mobile carrier that your personal data may have been exposed and request enhanced verification on account changes. Monitor your FranceConnect government SSO account for unrecognised sessions. Be alert to personalised phishing emails or SMS messages referencing document renewals, ANTS account alerts, or Ministry of the Interior notifications — the stolen data enables highly convincing targeted lures at scale.

Was the France Titres breach a ransomware or nation-state attack?

No ransomware group has claimed responsibility and no nation-state fingerprints have been identified as of April 25, 2026. ANSSI and OFAC are leading the investigation. The motivation appears financial — selling the dataset on dark web forums for premium prices rather than ransomware extortion or espionage. Sequential internal IDs in the sample data indicate structured database extraction by actors with backend system access, not surface-layer scraping.

Sources & references

  1. BleepingComputer — French govt agency confirms breach as hacker offers to sell data
  2. TechRadar — French government agency admits data breach as hacker alleges up to 19 million sensitive records stolen
  3. The Register — France's 'Secure' ID agency probes claimed 19M record breach
  4. SC Media — France Titres data breach: 19 million records allegedly stolen
  5. Help Net Security — Cyberattack on French government agency triggers phishing alert
  6. DarkWebInformer — France's National ID Agency ANTS Allegedly Breached, 18M Records Listed for Sale
  7. TechCrunch — France confirms data breach at government agency that manages citizens' IDs
  8. SafeState — French Government Agency Data Breach Hits Up to 19 Million Citizens
  9. CyberHub Podcast — France Titres (ANTS) Breach Exposes Identity Records
25
Free Download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities — CVSS scores, exploit status, and patch availability. The reference card your SOC team needs, free with your newsletter subscription.

Get the free cheat sheet →

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.