France's ID Database Got Hacked by a Teenager - 19 Million Records Stolen (2026)
Quick take: A 15-year-old hacker going by "breach3d"broke into ANTS - France's national identity document agency - and walked out with records for up to 19 million people. Passport scans, national ID data, driver's license details, names, addresses, phone numbers. ANTS confirmed 11.7 million accounts were directly impacted. The breach was detected April 15, 2026. The teen posted the data for sale the next day, and was arrested April 25. If you've ever applied for a French passport or ID card online, your data was almost certainly in that database.

What happened at ANTS
ANTS stands for Agence Nationale des Titres Sécurisés - the French government agency that manages passport applications, national identity cards, and driver's licenses. It's a central clearinghouse for some of the most sensitive documents a person owns.
The breach was detected on April 15, 2026. The following day, April 16, a user calling themselves "breach3d"posted what they claimed was ANTS data on a criminal forum, offering it for sale. According to the post, the stolen dataset covered up to 19 million individuals. ANTS later confirmed that 11.7 million accounts were verifiably compromised in their initial assessment.
French authorities moved fast. The suspect - a teenager - was arrested on April 25, just nine days after the breach was detected. French law enforcement identified him quickly enough that very little time passed between the data going on sale and his arrest, though it's unknown how many buyers accessed the data in those nine days.
What data was actually taken
This is the part that matters most. When I looked at what ANTS confirmed was in the stolen records, it's a complete identity profile:
- Full legal names - the name on your official documents, not just a display name.
- Email addresses - the one you registered with the ANTS portal.
- Dates of birth - a standard component of identity verification almost everywhere.
- Postal addresses - your home address as submitted during the application process.
- Telephone numbers - mobile and landline where provided.
- Login IDs and unique account identifiers - the internal identifiers ANTS uses to link you to your document records.
What makes this especially dangerous isn't any single field - it's the combination. A name plus date of birth plus address plus email is enough to impersonate someone for credit applications, social engineering attacks, or account takeovers. This is the exact bundle of data that financial fraud operations pay for on the criminal market.
ANTS has not confirmed whether scanned document images were included, but given that the system processes passport and ID card applications, it's reasonable to assume photo data was at risk. That matters especially for anyone who's thought about how sensitive identity photos can become once they leave your hands.

How a 15-year-old got into a government database
French authorities have not released the full technical details of how breach3d got in, which is typical while prosecution is ongoing. But based on what's been reported, this was not a nation-state attack using zero-days. A teenager did this.
The most likely vectors for breaches like this are credential stuffing (using leaked passwords from other breaches to log in to admin accounts), SQL injection against a web application, or compromised third-party access credentials. None of these require sophisticated resources - they require patience and a target with weak defenses.
The speed of the arrest - 10 days from detection to custody - suggests investigators had enough digital trail to identify the suspect quickly. That's either very good police work or a teenager who wasn't careful about covering their tracks, or both.
The broader lesson is uncomfortable: an individual with no organizational backing broke into a system holding identity records for tens of millions of French citizens. The attack surface for a government agency that handles passport applications is enormous - millions of users, years of accumulated records, and the kind of slow security update cycles that government IT is known for.
Government databases are not automatically safer
There's an assumption that government systems are hardened, audited, and secure by default. The ANTS breach is a useful corrective. Governments are not immune to the same vulnerabilities that hit private companies - often they're worse, because procurement cycles are slow, legacy systems get maintained indefinitely, and the talent pool is thinner than in private tech.
This isn't unique to France. When I looked at major government data breaches over the past decade, the pattern repeats: the US Office of Personnel Management lost 21 million security clearance records in 2015. India's Aadhaar biometric database was accessed by unauthorized parties in 2018. The UK's Electoral Commission lost 40 million voter records in 2021, discovered in 2023. Mandatory data collection at national scale creates targets that are as high-value as they are difficult to protect.
The difference between commercial platforms and government agencies is that you can choose not to use Google Photos or iCloud - you can't opt out of the national passport system. When a government agency holds your data, your only option is to hope their security practices are adequate. Based on the ANTS breach, that hope is sometimes misplaced.
This is also why the argument "I don't care if the government has my data"misses something important. It's not about the government reading your records - it's about whether those records can be stolen from the government and then used against you by someone else entirely.
How to protect your identity photos
You can't undo what happened at ANTS, and you can't opt out of submitting a passport photo when you apply for a passport. But you can be more deliberate about how your identity photos travel beyond that mandatory submission.
- Don't upload passport-quality photos to general cloud services. Google Photos and iCloud are fine for family albums, but they're not designed with identity document security in mind. A high-resolution photo of your face that could pass for a KYC selfie doesn't need to live in an unsecured shared folder.
- Use EU-based, GDPR-compliant storage for sensitive personal photos. GDPR provides stronger deletion rights and breach notification requirements than most US-based services. Under GDPR Article 33, you must be notified of a breach within 72 hours - the ANTS breach notification met this standard.
- Be selective about which apps get your ID photos. Every fintech, crypto exchange, or gig platform that runs KYC is holding a copy of your face and your documents. Read about the risks of verification selfie exposure before uploading to the next platform that asks.
- Set up fraud alerts after any government database breach. In France, contact your bank and credit agencies. In other countries, the equivalent is a credit freeze or fraud alert with national credit bureaus. Don't wait for confirmed misuse - act when the breach is announced.
- Store your own identity photos in platforms built for privacy. Platforms like Viallo are designed specifically for photo privacy, with EU-based servers and no third-party data sharing - unlike mainstream photo services that use your images for advertising or AI training.
The bigger principle is minimizing how many copies of your identity photos exist and who controls them. Every system that holds a copy is a breach waiting to be discovered. The ANTS data was collected because the French government needed it to issue documents - that's a necessary tradeoff. Most other systems that ask for your face don't have the same justification. For a deeper look at what secure photo storage actually looks like, the criteria are simpler than most people expect.

Try Viallo Free
Share your photo albums with a single link. No account needed for viewers.
Start Sharing FreeFrequently Asked Questions
What is the best way to protect yourself after a government ID data breach?
Place a fraud alert with your national credit bureaus immediately - don't wait for confirmed misuse of your data. In France, this means contacting Banque de France and your bank's fraud team. Change passwords on any account that uses the same email exposed in the breach, and enable two-factor authentication where you haven't already. The 11.7 million accounts confirmed in the ANTS breach represent a significant identity theft risk for years, not just weeks.
How do I find out if my data was included in the ANTS breach?
ANTS announced they would notify affected users directly by email. Check the email address you used to register with the ANTS portal. You can also check services like HaveIBeenPwned.com, which indexes major data breaches and lets you search by email address. Given that ANTS confirmed 11.7 million accounts were affected, if you've applied for a French passport or national ID card online in recent years, assume your data was exposed and act accordingly.
Is it safe to store passport photos and identity documents in cloud storage?
It depends heavily on which service and how. Google Photos and Apple iCloud provide convenient backup but weren't designed for document-level security - they're optimized for photo sharing, not identity protection. If you need to keep copies of identity documents digitally, use encrypted storage with strong access controls and choose a provider subject to GDPR. The ANTS breach is a reminder that even dedicated government systems can be compromised, so limiting where copies of these documents live reduces your overall risk surface.
How does the ANTS breach compare to other government data breaches?
The ANTS breach sits in the mid-tier of government breaches by scale - larger than many, smaller than the US OPM breach of 21 million records in 2015 or India's Aadhaar exposure. What makes it notable is the attacker's profile: a 15-year-old acting alone, not a nation-state or organized criminal group. That's a signal about the underlying vulnerability level. A database protecting 19 million national identity records should require more than one person with time and basic hacking skills to penetrate.
Why do hackers target government ID databases specifically?
Government ID databases are the highest-value targets for identity theft because they combine official document data with personally identifiable information in a single, verified, reliable dataset. Criminal buyers pay premiums for this data because it's accurate and complete - unlike scraped social media profiles, government records are verified at the point of collection. The combination of full legal name, date of birth, address, and email that ANTS held is exactly what's needed to pass identity checks at banks, loan providers, and other financial services.