AlumnForce, a French platform that manages alumni networks for elite academic institutions, has reportedly been breached. A threat actor is offering 2.7 million user records for sale, spanning nearly four decades of enrollment data from 49 institutions including Sciences Po, HEC Paris, and École Polytechnique. Sample data reviewed by researchers includes personal and professional details of several current French government members.

What Happened

A threat actor posted a listing claiming to have exfiltrated the full user database of AlumnForce, a SaaS platform used by dozens of French universities and grandes écoles to manage alumni communities. The dataset reportedly covers records created between 1987 and 2026, suggesting the attacker accessed historical and current user data across the platform's entire client base. AlumnForce serves as the backend for alumni directories, career services, and networking tools at some of France's most prestigious institutions. A compromise at the platform level would expose users across all client organizations simultaneously, making this a supply-chain-style breach hitting the education and professional networking sector.

What Was Taken

The leaked dataset reportedly contains 2.7 million records with the following fields:

The breadth of fields makes this dataset exceptionally valuable for social engineering. The presence of current French government officials in the sample data elevates this from a standard PII leak to a potential national security concern.

Why It Matters

This breach sits at the intersection of several high-value target categories. Alumni networks of elite institutions are goldmines for adversaries conducting espionage, influence operations, or targeted spear-phishing. Knowing where someone studied, who they studied with, where they work now, and what they earn provides everything needed to craft highly convincing pretexts. The 49 affected institutions include feeder schools for French government, intelligence, military, and corporate leadership. A dataset spanning 1987 to 2026 captures multiple generations of France's political and business elite in a single dump. For state-sponsored actors, this is a relationship-mapping and targeting resource. For financially motivated actors, the salary and employment data enables precision fraud campaigns.

The Attack Technique

The specific intrusion method has not been publicly disclosed. However, AlumnForce operates as a centralized SaaS platform serving multiple institutional clients, meaning a single vulnerability in the platform's infrastructure could expose all tenant data simultaneously. Common attack vectors for this type of platform include exploitation of API endpoints that aggregate cross-tenant data, SQL injection against shared database backends, or compromise of administrative credentials with broad access. The fact that records span nearly four decades suggests the attacker accessed a consolidated database rather than scraping individual institution portals.

Who Is Affected

The 49 confirmed institutions include some of France's most selective schools:

Current students, alumni dating back to 1987, faculty, administrative staff, and researchers are all reportedly included in the dataset.

What Organizations Should Do

Sources: AlumnForce Data Breach Exposes 2.7 Million User Records