Massive Hack Hits French Catholic Schools Network, Exposing Data on 1.5 Million Students, Parents, Staff

Europe InfosEnglishMassive Hack Hits French Catholic Schools Network, Exposing Data on 1.5 Million...
5/5 - (368 votes)

A major cyberattack on France’s national Catholic education office exposed identifying and contact information tied to roughly 1.5 million people, mostly elementary-age students and their families, according to the organization.

The breach, confirmed by the Secretariat-General for Catholic Education (known in France as the SGEC), targeted an administrative management app used by Catholic preschools and elementary schools. Officials say they shut down affected services, began securing systems, and alerted government authorities, including France’s privacy watchdog.

So far, the SGEC says there’s no indication that bank or medical data was exposed. But the information that did leak, names, addresses, emails, phone numbers, and birth dates, can be enough to fuel highly targeted scams.

What happened, and who the SGEC is

The SGEC is the national coordinating body for Catholic education in France, a large private-school network that operates under contracts with the French state. Think of it less like a single school district and more like a nationwide umbrella organization that supports thousands of schools.

The SGEC said the attack occurred March 21, 2026, and involved an application used for day-to-day administrative management in “first degree” schools, France’s term for preschool and elementary grades.

How big the exposure is

The organization estimates about 1.5 million people were affected, including roughly 800,000 elementary-level students and about 40,000 teachers, along with parents and other staff.

That doesn’t necessarily mean 1.5 million full student files were dumped online. But cybersecurity experts warn that even “basic” identity and contact data becomes dangerous at scale, especially when it’s tied to children and school communities.

What data was exposed, and why it matters

According to the SGEC’s public statements, the exposed information includes civil identity and contact details: first and last names, home addresses, email addresses, phone numbers, and dates of birth.

No passwords were cited in the initial disclosures. Still, that doesn’t let families off the hook. A scammer who knows a child’s name, school context, and a parent’s phone number can craft a message that looks and feels real, an “update your student file” text, a fake school portal link, or a call pretending to be an administrator verifying identity.

In the U.S., this is the same playbook used in school-themed phishing waves that mimic district robocalls, lunch-account notices, or “emergency contact” updates, except here the attackers may have a ready-made, verified contact list.

Why families could see a spike in phishing attempts

Even without account access, leaked birth dates and addresses can help criminals bypass weak identity checks or convince victims they’re dealing with a legitimate office. It’s the difference between a generic spam email and a message that correctly names a child and references school paperwork.

Schools can also get hit indirectly. When staff are flooded with worried calls and emails, attackers sometimes exploit the chaos, posing as vendors or administrators and pushing fraudulent payment requests or “urgent” wire transfers.

What officials are doing now

The SGEC said it suspended impacted services and launched an incident-response effort to secure access and investigate how the attackers got in. The group also said it notified France’s Ministry of National Education, the central government body that oversees the country’s education system.

It also plans to report the incident to CNIL, France’s powerful data protection authority, roughly comparable to a mix of the FTC’s consumer-protection role and state-level privacy regulators in the U.S. CNIL can require disclosures, oversee compliance steps, and impose penalties in serious cases.

What families are being told

For now, families are not being asked to take any urgent action, according to messages relayed through parent organizations. But the practical advice is familiar: treat school-related emails, texts, and calls with extra skepticism, especially anything that pressures you to click a link, share personal information, or “confirm” details.

The bigger question is what happens next. Once personal data is accessed, it can circulate far beyond the breached system, sold, repackaged, and reused for months. The SGEC’s technical cleanup may restore services, but rebuilding trust with families could take much longer.

Key Takeaways

  • The Sgec reported a cyberattack on March 21, 2026, targeting an elementary school application.
  • About 1.5 million people are affected, including 800,000 students and 40,000 teachers.
  • According to the information provided, the exposed data includes identity and contact details, not banking information.
  • The affected services were suspended, and reports to authorities, including the CNIL, were filed.
  • No urgent action is being requested from families, but the risk of phishing is increasing.

Frequently Asked Questions

Who is affected by the cyberattack targeting Catholic education?

The information released mentions about 1.5 million people, including elementary school students, their families, and teachers. The figure cited includes roughly 800,000 students and 40,000 teachers.

What data was exposed in the attack?

The items mentioned include identification and contact data: last names, first names, addresses, email addresses, phone numbers, and dates of birth. Publicly available information does not indicate that banking data was involved.

What should families do right away?

At this stage, no urgent action is being requested. It is recommended to stay alert for emails, texts, or calls pretending to be from the school or an administrative service, especially if they ask you to click a link or share information.

What measures were taken after the incident was detected?

The SGEC says it secured access, suspended affected services, and reported the incident to the relevant authorities, with steps announced with the CNIL. Cybersecurity experts were brought in to analyze the situation and strengthen protections.

Why can a leak of contact details be a problem?

Even without passwords, contact details and dates of birth can be used for phishing attempts and identity theft. Scammers can tailor messages by citing accurate information to gain trust and obtain additional data.

Michel Gribouille
Michel Gribouille
Je suis Michel Gribouille, rédacteur touche-à-tout et maître du clavier sur mon site europe-infos.fr. Je jongle avec l’actualité et les sujets variés, toujours avec un brin d’humour et une curiosité insatiable. Sérieux quand il le faut, mais jamais ennuyeux, j’aime rendre mes articles aussi vivants que mon café du matin !
- Advertisement -spot_img
Actualités
- Advertisement -spot_img