The French Ministry of National Education has confirmed a major cyberattack resulting in the exfiltration of personal data belonging to approximately 3.5 million students. The intrusion, which took place in the closing months of 2025, has become one of the most significant breaches of student privacy ever disclosed in France and is now under the oversight of the CNIL, the national data protection authority responsible for GDPR enforcement.

What Happened

Threat actors penetrated internal databases maintained by the Ministry and bypassed access controls to silently extract records at scale. Unlike disruptive ransomware events, this intrusion prioritized stealth and data harvesting, allowing the attackers to remain undetected for an extended period. The Ministry has since moved to contain the incident, harden affected systems, and coordinate with French authorities, but the window of unauthorized access is believed to span several weeks of late 2025. The breach fits a broader pattern of European public sector agencies being targeted for bulk identity datasets rather than extortion payouts.

What Was Taken

The compromised records relate to roughly 3.5 million students, many of them minors, raising the sensitivity profile significantly under GDPR. Based on the ministry's disclosures and the standard schema of French student information systems, the exposed fields likely include:

This combination is highly weaponizable: it enables long-term identity fraud against minors whose credit files are typically unmonitored for years, and it equips adversaries to craft convincing spear-phishing lures impersonating schools or education officials.

Why It Matters

Student data breaches carry a uniquely long tail. Stolen records on minors retain value for a decade or more, because victims are unlikely to discover identity misuse until they reach adulthood and apply for credit, housing, or employment. For national authorities, the reputational impact is compounded by statutory GDPR obligations, potential CNIL sanctions, and public trust erosion in digital education platforms. The incident also signals that education ministries, historically underfunded relative to defense or finance sectors, remain a soft target for threat actors prioritizing large, clean identity datasets over ransom leverage.

The Attack Technique

The Ministry has not publicly attributed the breach to a specific threat actor or confirmed the initial access vector. Early reporting indicates the attackers leveraged access to internal databases, suggesting either credential compromise, exploitation of an exposed administrative portal, or abuse of a trusted third-party integration common to national education platforms. The operation is consistent with data-harvesting campaigns observed across European public sector targets in late 2025, where adversaries favored silent exfiltration over encryption to maximize dwell time and data yield.

What Organizations Should Do

Sources: French Ministry of Education Cyberattack: Personal Data Leaked