Eurofiber, a major European provider of fiber optic networks and digital infrastructure, has suffered a severe data breach within its French operations. The incident has potentially exposed sensitive operational data belonging to over 3,600 clients, including critical national entities such as defense contractor Thales, telecom giant Orange, and various French government ministries. A threat actor calling themselves 'ByteToBreach' has taken responsibility, claiming to have exploited SQL injection vulnerabilities in Eurofiber France's GLPI IT asset management portal. The stolen database, which is being offered for sale online, reportedly contains extremely sensitive credentials like SSH keys and VPN configurations, creating a massive downstream risk for all affected clients.
CVE-2024-29889, CVE-2025-24799The attacker claims to have used a slow, time-based SQL injection attack to exploit vulnerabilities in outdated versions of the GLPI software used by Eurofiber France for its ticket management and customer portal. SQL injection is a well-known web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. Successful exploitation can lead to the unauthorized viewing, modification, or deletion of data.
The breach originated from Eurofiber France's customer portal, which was running a vulnerable version of GLPI. The direct victim is Eurofiber, but the primary impact is on its extensive client base, which includes:
The vulnerabilities have been actively exploited. The threat actor 'ByteToBreach' discovered the flaw on November 13 and successfully exfiltrated the entire GLPI database. The data was subsequently put up for sale on a dark web forum after alleged ransom negotiations with Eurofiber and GLPI's maintainer failed, indicating a clear intent to monetize the stolen information. All organizations using outdated versions of GLPI are at high risk of similar attacks.
This is a critical supply chain incident with potentially catastrophic consequences for the affected clients. The impact goes far beyond a typical PII breach. The stolen data allegedly includes:
With this information, an attacker could potentially gain direct, privileged access to the internal networks of some of Europe's most critical organizations. This could facilitate espionage, sabotage, or further ransomware attacks. The sale of this data on the dark web means multiple threat actors could acquire it, amplifying the risk exponentially.
' OR 1=1, UNION SELECT, SLEEP()).Ensuring all public-facing applications, like GLPI, are kept up-to-date with the latest security patches is the primary defense against known vulnerabilities.
Mapped D3FEND Techniques:
Using a Web Application Firewall (WAF) to inspect incoming traffic can detect and block SQL injection attempts before they reach the application.
Secure coding practices, specifically the use of parameterized queries, prevent SQL injection vulnerabilities from being introduced into applications.
To prevent SQL injection attacks like the one against Eurofiber's GLPI portal, deploying a properly configured Web Application Firewall (WAF) is an essential layer of Inbound Traffic Filtering. A WAF sits in front of the web application and inspects all incoming HTTP/S requests. For this incident, a WAF with rulesets for SQL injection detection would have identified malicious payloads like ' OR 1=1 or SLEEP() within the URL parameters and blocked the request before it ever reached the vulnerable GLPI application. This acts as a crucial virtual patch, protecting the application even if it is not yet updated to the latest version. It is critical that the WAF is not run in 'monitor-only' mode and is configured to actively block malicious requests.
The root cause of the Eurofiber breach was the use of outdated GLPI software with known vulnerabilities. The most fundamental countermeasure is a rigorous Software Update and patch management program. Organizations must maintain a complete inventory of all public-facing software and their versions. Automated vulnerability scanning tools should be used to continuously monitor these assets for known vulnerabilities like CVE-2024-29889 and CVE-2025-24799. When a critical patch is released, there must be a defined process to test and deploy it within a short, risk-appropriate timeframe. This proactive stance on security hygiene is the most effective way to close the door on attackers who rely on exploiting known flaws.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats