Up to 2.1 million (claimed)
In early January 2026, the French Office for Immigration and Integration (OFII) confirmed it was the victim of a significant data breach originating from a third-party contractor. The breach came to light after a threat actor posted a database allegedly containing the personal information of up to 2.1 million foreign residents in France for sale on the BreachForums marketplace. The exposed data samples included highly sensitive information such as names, contact details, dates of birth, and nationalities. OFII has stated its internal systems were not compromised; instead, the attack targeted a private training provider that administers mandatory courses for residents. This incident is a stark example of a Supply Chain Attack and exposes the French government agency, as the data controller, to potential investigation and penalties under the EU's General Data Protection Regulation (GDPR).
This incident is a classic supply chain attack where the attackers targeted a weaker link in the chain to access valuable data.
This incident underscores the critical importance of third-party risk management.
D3-VRA: Vendor Risk Analysis) Data controllers like OFII must have a robust VRM program. This includes:Implementing a robust vendor risk management program is essential to mitigating supply chain risks.
Applying principles of data minimization and least privilege to third-party data access reduces the impact of a contractor breach.
Mapped D3FEND Techniques:
The OFII breach is a textbook example of supply chain risk. The primary countermeasure is a rigorous Vendor Risk Analysis program. Before entrusting a contractor with the PII of millions, OFII should have conducted an in-depth security assessment of the training provider. This includes reviewing their security policies, demanding evidence of security controls (e.g., penetration test results, SOC 2 reports), and contractually obligating them to meet specific security standards equivalent to those of the government agency itself. The contract must include clauses for immediate breach notification and the right to audit. This proactive due diligence shifts security from being an afterthought to a prerequisite for doing business, preventing the selection of vendors with weak security postures.
A critical question in the OFII breach is why the third-party training provider needed persistent access to a database of 2.1 million records. Implementing the principle of Data Minimization could have drastically reduced the impact. Instead of giving the vendor access to the entire database, OFII could have implemented a 'just-in-time' data provisioning system. For example, an API could be created that allows the vendor to query for the details of a specific individual only when that person is scheduled for a training course. The vendor would not need to store the data long-term. By architecting the data flow so that the vendor only has access to the minimum amount of data needed, for the minimum amount of time, the 'blast radius' of a compromise at that vendor is significantly contained.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats