Subscribe to Our Newsletter

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks
Feature image
CBIA thanks Tima Miroshnichenko for the photo

Stolen Government Credentials Used to Access Data of 1.2 Million French Bank Accounts

CBIA Team profile image
by CBIA Team

Attackers stole credentials from a French government official to gain access to a national banking database containing personal details of up to 1.2 million account holders, in a breach that highlights critical vulnerabilities in government data protection systems. The sophisticated compromise targeted France's FICOBA database—a comprehensive registry of all bank accounts opened in the country—allowing unauthorized viewing of sensitive information including names, IBANs, and in some cases, tax identification numbers.

The breach, which occurred in late January 2026 and persisted for several days, prompted the French government to announce plans for direct notification of affected individuals. Security experts warn the stolen data could fuel sophisticated phishing campaigns and financial fraud schemes targeting French citizens.

Background and Context

The FICOBA (Fichier des Comptes Bancaires) database serves as France's central repository for bank account information, maintained by tax authorities to combat financial crime and ensure regulatory compliance. Its comprehensive nature—containing details of virtually every bank account in France—makes it an especially high-value target for criminal networks seeking to exploit personal financial data for fraudulent purposes.

The breach demonstrates how traditional security models, which often grant broader access privileges based on seniority rather than operational necessity, can create systemic vulnerabilities. As George Foley, Security Spokesperson for ESET Ireland, noted: "Most people hear 'bank data breach' and picture a technical break-in. In reality, a lot of these incidents are closer to someone getting hold of the right keys. If an attacker gets a legitimate login, they often don't need to 'hack' anything. They just log in."

Key Figures and Entities

While the identity of the attackers remains unknown, investigators have confirmed that credentials stolen from a government official provided initial access to the system. The breach has drawn responses from cybersecurity experts across the industry, including Michael Jepson, Penetration Testing Manager at CybaVerse, who emphasized that "if individual members of an organisation can access large volumes of sensitive data unilaterally, this creates a structural weakness where a single set of compromised credentials can lead to widespread data exposure."

James Neilson, SVP of Global at OPSWAT, warned that "the exposure of 1.2 million bank accounts is significant, and the main concern now will be stolen data being used to conduct identity fraud and phishing attacks. For example, tax identifiers could be used to mimic official tax agencies or to file fraudulent tax returns."

The attack exploited a fundamental flaw in access control systems—excessive privileges granted to individual user accounts without additional safeguards. According to security experts, the attackers likely moved laterally through the system once inside, exploiting the broad access rights associated with the compromised credentials to extract substantial amounts of data without triggering immediate security alerts.

The stolen information—names, addresses, account numbers, and tax identifiers—provides criminals with sufficient detail to execute convincing impersonation scams. Foley noted that "even where money can't be moved directly, the details are still valuable. They help criminals sound convincing. That's when you get the 'we need to verify you' calls, the fake security emails, and the pressure to act fast."

International Implications and Policy Response

The breach underscores growing concerns about government data protection practices across Europe, particularly as nations increasingly centralize sensitive information to combat financial crime. Security advocates are calling for widespread adoption of zero-trust architecture, which would require continuous verification of all users and devices attempting to access network resources, regardless of their location.

Experts recommend implementing automated monitoring systems capable of detecting anomalous behavior patterns, such as bulk data access or unusual export activities, even from authenticated users. "Organisations in both the public and private sectors should adopt zero trust principles, ensuring that access requests are not trusted solely on the basis of valid credentials," Jepson advised. "Individuals should only have access to the data necessary for their specific role and daily operations."

Sources

This report draws on statements from cybersecurity professionals at CybaVerse, ESET Ireland, and OPSWAT, as well as official announcements from the French government regarding the FICOBA database breach disclosed in February 2026.

CBIA Team profile image
by CBIA Team

Subscribe to New Posts

Lorem ultrices malesuada sapien amet pulvinar quis. Feugiat etiam ullamcorper pharetra vitae nibh enim vel.

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks

Read More