Quote:On February 26, 2026, a revelation sent shockwaves through the French healthcare system: a massive data breach linked to the Cegedim Group was made public, potentially compromising the personal information of millions of patients and the notes written by their doctors. Here is a detailed and structured account of the known facts, compiled by me.
Cegedim is a French company founded in 1969, specializing in software and digital services for the healthcare sector. It develops solutions used by doctors, laboratories, and insurers to manage patient records, billing, and medical data.
The attackers reportedly gained access to several internal or compromised access points. The categories cited include, in particular:
- OWA (Webmail): access to the company’s webmail, which generally corresponds to Outlook Web Access, used by employees to check their work emails.
- VPN: a virtual private network allowing employees or contractors to connect to the company’s internal network remotely.
- Cloud: access to resources hosted in the company’s cloud infrastructure.
- Zendesk (CRM / support): a tool for managing customer support and technical tickets.
- Technician access: likely an internal account used for maintenance or technical support.
The group explains that the user @czx (a BreachForums user) had already sold a small portion of what he possessed via RDP access.
DumpSec listed this data dump for sale on the BreachForums marketplace, and according to them, it reportedly sold for a six-figure sum. The sample provided as evidence contains 300,000 lines and is available below!
Quote:On February 26, 2026, a revelation sent shockwaves through the French healthcare system: a massive data breach linked to the Cegedim Group was made public, potentially compromising the personal information of millions of patients and the notes written by their doctors. Here is a detailed and structured account of the known facts, compiled by me.
Cegedim is a French company founded in 1969, specializing in software and digital services for the healthcare sector. It develops solutions used by doctors, laboratories, and insurers to manage patient records, billing, and medical data.
The attackers reportedly gained access to several internal or compromised access points. The categories cited include, in particular:
- OWA (Webmail): access to the company’s webmail, which generally corresponds to Outlook Web Access, used by employees to check their work emails.
- VPN: a virtual private network allowing employees or contractors to connect to the company’s internal network remotely.
- Cloud: access to resources hosted in the company’s cloud infrastructure.
- Zendesk (CRM / support): a tool for managing customer support and technical tickets.
- Technician access: likely an internal account used for maintenance or technical support.
The group explains that the user @czx (a BreachForums user) had already sold a small portion of what he possessed via RDP access.
DumpSec listed this data dump for sale on the BreachForums marketplace, and according to them, it reportedly sold for a six-figure sum. The sample provided as evidence contains 300,000 lines and is available below!