Free Data Breach
Free French ISP & Mobile Carrier Breach (2024): 13.9 Million Customer Records Including IBAN Bank Account Numbers Exposed
French telecom and ISP serving Freebox and Free Mobile
Risk Interpretation
Risk is high because telecom and ISP breaches can expose a rich customer profile that supports identity fraud, phishing, SIM-related scams, and targeted impersonation. Communications providers often hold durable identifiers and service-level data that can materially increase downstream abuse potential.
Impact & Downstream Threats
The institutional impact on Free has been substantial and continues to evolve through ongoing regulatory and judicial proceedings. The €42 million combined CNIL fine is among the largest GDPR enforcement actions against a French telecommunications operator and represents a notable precedent for enforcement of authentication and monitoring requirements under the GDPR. Iliad's planned appeal to France's Supreme Administrative Court (Conseil d'État) will provide an important test of the proportiona
- Financial fraud using exposed financial profile data
- Identity verification bypass using name + date of birth combination
- SIM swap attacks where phone numbers are present
- Doxxing risk from physical address exposure
Threat Vectors
Breach Intelligence
Executive Summary
Free S.A.S., the second-largest French internet service provider and mobile network operator, suffered a data breach on October 17, 2024 when threat actors gained unauthorized access to an internal management tool and exfiltrated subscriber data covering both Free Mobile mobile carrier customers and Freebox residential broadband subscribers. Free publicly confirmed the breach on October 26, 2024 after a threat actor using the alias 'drussellx' listed two databases for sale on BreachForums, with the seller offering the dataset for auction at approximately $175,000 and subsequently making extortion-style threats including the threatened public release of '100,000 lines of French IBANs from Free customers' if Free did not intervene in the auction. A separate threat actor using the alias 'YuroSh' subsequently claimed to have been the actual hacker (with drussellx serving as the seller), with YuroSh describing his motivation as hacktivist rather than financially motivated. Free filed a criminal complaint and notified CNIL and ANSSI.
The breach affected approximately 13.9 million unique customer records based on records indexed by Have I Been Pwned (with the original threat actor's auction listing claiming 19.2 million customer accounts and 5.11 million IBAN records, and the subsequent CNIL investigation referencing 24 million subscribers as the regulatory population). The total exfiltrated dataset was approximately 43.6 gigabytes in JSON format. Compromised fields included full names, phone numbers, postal addresses, dates of birth, gender, email addresses, Free Mobile user IDs and login identifiers, service offer details, account statuses, and mobile numbers. For Freebox residential broadband subscribers specifically, the dataset additionally included IBAN bank account numbers, Freebox identifiers, service activation dates, and BIC banking identifiers. Free publicly emphasized that no passwords, bank card details, email contents, SMS contents, or voicemail contents were exposed in the breach, and that the IBAN exposure alone was 'not enough to make a direct debit from a bank.'
For affected customers, the practical risk profile is significant due to the combination of complete identity-profile exposure with French banking-identifier data for the Freebox subset. The IBAN exposure does not by itself enable direct debit fraud (because direct debit authorization in France requires additional steps beyond the IBAN), but the combination of full name, address, date of birth, and IBAN supports phishing attacks that can plausibly impersonate Free's billing function and request authorization for fraudulent direct debits. Affected Freebox subscribers should review their bank statements monthly for any unauthorized direct debit attempts, and should treat any communication purporting to be from Free or from their bank requesting direct-debit authorization with elevated caution. Affected mobile subscribers face elevated SIM-swap risk because the dataset includes mobile numbers tied to subscriber identity. Affected customers should change passwords on Free Mobile and Freebox accounts, enable two-factor authentication where available, monitor financial accounts for suspicious activity, and remain alert to phishing emails and SMS messages referencing real Free subscription details. Affected French citizens may file complaints with CNIL, which has retained an active enforcement posture on this case.
About Free
Free S.A.S. is a major French telecommunications company operating as a subsidiary of Groupe Iliad (Iliad S.A.). Free operates as France's second-largest internet service provider and mobile network operator, serving approximately 22.9 million mobile and fixed broadband subscribers across France through the Free Mobile mobile carrier brand and the Freebox residential broadband brand. Free was founded in 1999 and built its market position through aggressive low-cost pricing that disrupted the French telecommunications market. As a national telecommunications operator, Free maintains substantial subscriber data including identity, contact information, demographic data, service-account details, billing information, IBAN bank account numbers used for direct-debit billing of Freebox subscribers, and BIC banking identifiers.
Why They Hold Your Data
French telecom and ISP serving broadband and mobile customers through account-based communications services. The likely data context includes subscriber records, contact details, service-account information, billing or support-linked records, and data tied to telecom service use.
Recent Developments
Free is now the subject of one of France's largest GDPR enforcement actions following the October 2024 breach. In January 2026, France's data protection authority CNIL imposed total fines of approximately €42 million ($48 million) on Iliad Group subsidiaries — €27 million ($31 million) on Free SAS and €15 million ($17 million) on Free Mobile — for GDPR violations identified during the post-breach investigation. CNIL's enforcement findings included inadequate authentication procedures for VPN connections to internal systems and lack of effective measures for detecting unusual activity on Free's information systems. CNIL's press release cited the sensitivity of the breached data, the companies' large profits, and a 'lack of knowledge of essential security principles.' A Groupe Iliad spokesperson characterized the sanctions as 'completely disproportionate' and announced that the companies will appeal to France's Supreme Administrative Court, while emphasizing that Iliad has 'reinforced our security architecture, strengthened our access controls, and put in place enhanced real-time surveillance' since October 2024.
Data Points Exposed
Exposure Categories
Canonical Fields
bank_account_number, date_of_birth, full_name, gender, phone_number, physical_address
Dark Web Verification
- Dataset containing ~13.9M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: Free Data Breach;free-2024
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Free
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
