Skip to main content
Mallory

Multiple Data Exposure and Breach Reports Involving French Citizens, Victorian Students, and Alleged PayPal Credentials

mass-credential-exposurebreach-disclosure-notificationcloud-misconfigurationeducation-sector-threatcredential-stealer-activity
Updated March 21, 2026 at 02:51 PM3 sources
Share:
Multiple Data Exposure and Breach Reports Involving French Citizens, Victorian Students, and Alleged PayPal Credentials

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Security researchers reported a large, publicly exposed database on an open cloud server containing tens of millions of French citizen records aggregated from at least five prior breaches, including voter data, healthcare entries, CRM contacts, financial profiles (including IBANs/BICs), and vehicle-related information. The dataset appears to have been compiled to increase resale value and enable identity cross-linking, elevating risks of phishing, fraud, and identity theft.

Separately, Australia’s Victorian Department of Education notified parents that an unauthorized party accessed a student database containing names, school names, year levels, school-issued email addresses, and encrypted passwords, prompting a forced password reset and temporary account access disruption; the department stated more sensitive fields (e.g., home addresses, phone numbers) were not exposed and investigators had not confirmed public release. In another unrelated report, researchers questioned the veracity of a newly claimed PayPal breach, assessing a ~100,000-record credential “combolist” as likely outdated infostealer-log data rather than evidence of a fresh PayPal compromise, noting PayPal’s prior refutation of similar claims and the practical barriers posed by MFA.

Timeline

  1. Jan 16, 2026

    Open server exposes aggregated database on French citizens

    Cybernews researchers found an open cloud server hosting a massive database with tens of millions of French citizen records, apparently aggregated from at least five separate breaches. The archive included voter, healthcare, financial, CRM, and vehicle-related data, increasing risks of phishing, fraud, and identity theft.

  2. Jan 14, 2026

    Victoria resets student passwords after breach

    As a precaution following the student data breach, the Victorian Department of Education reset all student passwords and temporarily blocked account access until new credentials could be issued. Investigators said they had not found evidence that the accessed data had been publicly released or shared.

  3. Jan 14, 2026

    Victorian education department discloses student data breach

    Victoria's Department of Education notified parents that an unauthorized third party accessed a database containing current and former students' personal information, including names, school details, school-issued email addresses, and encrypted passwords. The department said more sensitive data such as birth dates, home addresses, and phone numbers were not exposed.

  4. Jan 13, 2026

    Cybernews questions claimed new PayPal credential breach

    Cybernews assessed a newly circulated combolist of more than 100,000 alleged PayPal credentials as likely outdated data from infostealer logs rather than evidence of a fresh PayPal compromise. Researchers cited the relatively small record count and noted that many PayPal accounts are protected by multi-factor authentication, making account takeover harder.

  5. Jan 1, 2022

    PayPal says 2022 credential stuffing exposed 35,000 accounts

    PayPal previously attributed reports of stolen credentials to a 2022 credential stuffing incident that exposed about 35,000 accounts, rather than to a direct breach of its systems.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Related Stories

Dark Web Leak Claims Target Colis Privé and Multiple Online Services

Dark Web Leak Claims Target Colis Privé and Multiple Online Services

Dark web monitoring reports described **unverified data leak claims** involving several organizations, including French parcel delivery firm **Colis Privé**. One post on **BreachForums** allegedly offered an upload of **22,564,381 records** attributed to Colis Privé, described as `.jsonl` files totaling **~4.1 GB**; no specific threat actor attribution or company confirmation was cited, and the notice characterized the situation as informational while scope is assessed. If authentic, the scale and format of the dataset would materially increase risk of **identity theft, credential stuffing, and targeted phishing** against customers. Separate dark web forum posts also alleged database exposures affecting **JobsGO** (Vietnam recruitment platform), **MyVete** (veterinary management platform), **PIXPAY** (Senegalese payment service), and **Groupe Fondasol** (France-based engineering). The claimed datasets reportedly include **CV/personal records**, and in some cases **API credentials and employee metadata**, with example figures including **~2.3 million records** for JobsGO and **~5.57 million records** for MyVete (verification not indicated). Across the claims, the primary business risk is downstream abuse of exposed personal and operational data for **social engineering, recruitment fraud, and account takeover**, rather than immediate exploitation of a specific software vulnerability.

1 months ago
Multiple Consumer Data Exposures: IDMerit Database Leak, youX Intrusion, and Substack User Data Access

Multiple Consumer Data Exposures: IDMerit Database Leak, youX Intrusion, and Substack User Data Access

Cybersecurity researchers reported a major exposure at **IDMerit**, an AI-driven identity verification provider, after discovering an unsecured, internet-accessible **MongoDB** instance containing **over 3 billion records** (over 1TB). Exposed data reportedly included full names, addresses, dates of birth, national ID numbers, phone numbers, and email addresses; researchers estimated roughly **~1 billion** records contained sensitive data (with duplicates likely inflating the total). The dataset was described as global in scope, affecting individuals across **26 countries**, with large volumes attributed to the **US, Mexico, and the Philippines**, creating downstream risk for **identity fraud, account takeover, phishing, and SIM-swap** activity. Separately, Australian finance technology platform **youX** confirmed an **unauthorized third-party access** incident, after which a hacker claimed theft of data tied to **444,528** Australian borrowers and additional loan-application and identity data (including driver’s licence numbers, addresses, and credit/banking-related information), plus customer/staff details associated with broker organizations. **Substack** also confirmed unauthorized access to **limited user data** (including email addresses, phone numbers, and internal account metadata) that occurred in **October 2025** but was only identified on **Feb. 3, 2026**; Substack stated **passwords and payment card/financial data were not accessed**, but the extended detection gap raised concerns about monitoring and dwell time.

1 months ago
Data exposures tied to third-party access and credential misuse in Ukraine and France

Data exposures tied to third-party access and credential misuse in Ukraine and France

Ukraine’s National Bank (NBU) took its **collectible coin/numismatic online store** offline after a cyberattack against a supporting **contractor** potentially exposed customer registration data (names, phone numbers, emails, and delivery addresses). The NBU said **core banking systems were not affected** and **no payment card or banking data** was compromised, but warned the exposed PII could be leveraged for **phishing** and other follow-on fraud; the incident was described as consistent with a **supply-chain** intrusion path. In France, authorities disclosed illegal access to a portion of the **National Bank Accounts File (FICOBA)**—a government database used for tax, customs, and law-enforcement purposes—after an attacker **impersonated a civil servant** and used valid credentials to query data. Officials said up to **1.2 million accounts** may have been impacted, with exposed fields potentially including account numbers, names, addresses, and in some cases tax identifiers; **DGFiP**, supported by **ANSSI**, is investigating and notifying affected individuals while banks were alerted to heighten fraud/phishing monitoring. Separately, **Safran Group** denied being cyberattacked, stating that a leaked dataset containing “non-strategic” order/customer details was **inadvertently exposed via a third-party provider**, with external analysis suggesting the compromise occurred elsewhere in the supply chain rather than within Safran’s own systems.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Multiple Data Exposure and Breach Reports Involving French Citizens, Victorian Students, and Alleged PayPal Credentials | Mallory