Pro-Russian hackers claim attack on French postal service operator

Pro-Russian hacker group NoName057(16) has claimed responsibility for a cyberattack that disrupted France’s postal and banking services ahead of the Christmas holiday, French authorities said.

France’s national postal service La Poste said on Friday that operations had been restored following a distributed denial-of-service (DDoS) attack that began earlier in the week. Despite the disruption, the company said 5.5 million parcels had been delivered by Wednesday afternoon, during what it described as its busiest period of the year.

The Paris prosecutor’s office has opened an investigation into the attack. France’s domestic intelligence agency DGSI took over the probe after the hackers publicly claimed responsibility. Prosecutors told local media the investigation is, at this stage, focused on the deliberate disruption of a data processing service.

La Poste, which employs more than 200,000 people, previously said the incident temporarily knocked key digital systems offline, affecting services such as online parcel tracking and slowing mail distribution. It said there was no evidence that customer data had been compromised.

The disruption also affected La Banque Postale, La Poste’s banking arm, which warned customers that access to online banking and its mobile app was temporarily unavailable. Most of the services were restored on Wednesday. 

NoName057(16) emerged at the onset of Russia’s invasion of Ukraine in 2022 and is known for launching large-scale DDoS attacks against Ukraine and its allies. The group coordinates relatively simple but disruptive attacks, often with the help of hundreds of volunteers, and has built a botnet of several hundred servers.

NoName057(16) has mainly targeted European countries, including Poland, Czechia, Lithuania and Italy. Earlier in July, the group’s operations were disrupted by international law enforcement but the hackers continue to operate.

The incident follows a separate cyber intrusion disclosed earlier in December at France’s Interior Ministry, where attackers gained unauthorized access to email accounts and confidential documents. French authorities later arrested a 22-year-old suspect in connection with that case.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Georgia arrests ex-spy chief over alleged protection of scam call centers

Next Post

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

Related Posts

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment. "This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI [
Read More

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress. This includes a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based
Read More

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical flaw impacting ASUS Live Update to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2025-59374 (CVSS score: 9.3), has been described as an "embedded malicious code vulnerability" introduced by means of a supply chain compromise
Read More