china hackers breach france

Chinese state-affiliated hackers infiltrated France’s most critical infrastructure sectors through a sophisticated cyber espionage campaign that compromised government ministries, defense contractors, telecommunications providers, financial institutions, media outlets, and transport networks.

Chinese state-affiliated hackers compromised France’s critical infrastructure including government ministries, defense contractors, telecommunications, financial institutions, media outlets, and transport networks.

The French cybersecurity agency ANSSI and Google Threat Intelligence Group attributed the operation, dubbed Houken, to UNC5174, a group suspected of operating on behalf of China’s Ministry of State Security.

The attack campaign began in September 2024, though investigators believe the activity traces back to 2023. Attackers exploited three critical zero-day vulnerabilities in Ivanti Cloud Service Appliance systems: CVE-2024-8190, CVE-2024-8963, and CVE-2024-9380. These previously unknown security flaws permitted hackers to penetrate France’s most sensitive networks without detection, as vendors and cybersecurity defenders remained unaware of the vulnerabilities.

UNC5174 deployed sophisticated rootkits, particularly the sysinitd.ko and sysinitd executables, to maintain stealth and persistence within compromised systems. The hackers utilized open-source tools, often developed by Chinese-speaking programmers, alongside commercial VPNs and dedicated command-and-control servers to manage their operations. The breach resulted in damages estimated at average breach costs of $4.35 million.

Following initial compromise, the attackers conducted lateral movement through victims’ networks, targeting additional devices including F5 BIG-IP systems. Intelligence analysts assess that UNC5174 functions as an initial access broker, selling or sharing compromised network footholds with other state-linked actors.

This multi-party exploitation model involves one group uncovering vulnerabilities, another conducting large-scale exploitation, and third parties executing follow-on intelligence operations. The coordinated approach demonstrates persistent targeting of France’s critical national infrastructure for intelligence gathering purposes.

ANSSI first detected the intrusion in September 2024, launching a thorough investigation before publishing technical details through CERT-FR in July 2025. The delayed detection resulted from the attackers’ use of zero-day vulnerabilities unknown to security vendors at the time of exploitation. This campaign reflects a broader trend of supply chain attacks targeting critical infrastructure, similar to recent incidents affecting SentinelOne and other major organizations.

French investigators traced the attack tools and methodologies to the Chinese-speaking developer community, reinforcing attribution assessments. The campaign represents a significant escalation in state-sponsored cyber espionage targeting Western critical infrastructure.

Security agencies continue monitoring affected sectors for evidence of lateral movement and subsequent attacks, as the breach’s full scope remains under investigation across France’s telecommunications, financial, media, transport, and government networks.

You May Also Like

UK Faces Surge in Cyberattacks as AI Use Soars, Government Warns

AI fuels record-breaking cyberattacks in Britain, with 8.58M crimes yearly – but the real danger isn’t what you’d expect. Your business could be next.

Apple Dismisses Iphone Crash-Hacking Link Amid Rising Fears of Chinese Cyber Intrusions

Chinese cyber threats loom, but Apple stands firm: iPhone crash bug sparks global security debate. Is your device truly protected from intrusion?

Elite Chinese Hackers Tried—and Failed—to Breach SentinelOne in Silent Cyber Espionage Siege

Elite Chinese hackers relentlessly pursued SentinelOne for 8 months, but their sophisticated cyber espionage campaign hit an unexpected wall. See what went wrong.

Victoria’s Secret Revives Systems After Cyberattack Paralyzes Retail and Web Operations

Victoria’s Secret’s systems crumbled under a devastating cyberattack, leaving millions in losses and customer data potentially exposed. Is your information at risk?