DDoS incident disrupts France’s postal and banking services ahead of Christmas

France’s national postal service, La Poste, confirmed that a suspected cyberattack disrupted its websites and mobile applications days before Christmas, slowing deliveries and knocking some online services offline.

In a statement on Monday, La Poste said that a distributed denial-of-service (DDoS) incident knocked key digital systems offline. The company said there was no evidence that customer data had been compromised, but acknowledged that postal operations, including parcel distribution, had been affected.

The disruption extended to La Banque Postale, the banking service, which warned customers that access to online banking and its mobile app was affected. Card payments at in-store terminals and cash withdrawals from ATMs continued to function, and online payments remained possible if authenticated by text message, the bank said.

La Poste said some post offices were operating at reduced capacity, though customers were still able to carry out banking and postal transactions at counters. “Our teams are fully mobilised to restore services as quickly as possible,” the company said in a statement.

The disruption came at a busy time for the postal service. Customers complained on social media that delays could prevent them from receiving packages in time for Christmas, while French media reported that some people attempting to send or collect parcels were turned away from post offices.

The incident follows a separate data breach disclosed last week at France’s Interior Ministry, where attackers gained unauthorized access to email accounts and confidential documents. French authorities later arrested a 22-year-old suspect in connection with that incident.

It is not immediately clear who was responsible for the attack on La Poste, and the company did not attribute it to any specific group.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Cyber spies use fake New Year concert invites to target Russian military

Next Post

FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks

Related Posts

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate via WhatsApp a worm that deploys a banking trojan in attacks targeting users in Brazil. The latest wave is characterized by the attackers shifting from PowerShell to a Python-based variant that spreads the
Read More

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. "The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access," AhnLab Security Intelligence Center (ASEC) said in a report published last week. "They then used PowerCat, an open-source
Read More

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop
Read More