Skip to content

Alleged Data Breach of French IT Services Platform Réseau Exposes 73,000 Users

Dark Web Informer — Cyber Threat Intelligence

Alleged Data Breach of French IT Services Platform Réseau Exposes 73,000 Users

January 28, 2026 — 10:00 PM UTC France Information Technology (IT) Services

🧩 Standalone API Access Now Available

High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.

View API

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat FeedLive tracking with JSON export.
🔍
Leak and Breach CoverageDirect access to claims and posts.
📡
Snippets and Quick FactsConcise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet ResourcesVerified index of dark web sites and services.
📊
Real Time Uptime DashboardLive status of 500+ sites.
🤖
Whiteintel.io APIIntegrated checks inside breach posts.
🖼️
High Resolution ImagesUncompressed, watermark free evidence.
🔑
Keyword NotificationsBrowser alerts for tracked terms.

Quick Facts

Date & Time
2026-01-28 22:00:57 UTC
Threat Actor
Sorb
Victim Country
France
Industry
Information Technology (IT) Services
Victim Organization
Réseau
Victim Site
reseau.site
Category
Data Breach
Severity
Medium
Network
Open Web

Incident Overview

A threat actor operating under the handle "Sorb" has posted on BreachForums claiming responsibility for a data breach targeting reseau.site, a French IT services platform. According to the forum post dated January 28, 2026, the threat actor claims to have exfiltrated the full MySQL database, totaling 184 MB across 159 CSV files.

The alleged dataset reportedly contains over 24,000 unique email addresses (no duplicates), 65,000+ phone numbers, and 29,000+ mobile numbers. The threat actor states the data includes full names, physical addresses, and passwords hashed using bcrypt and MD5 algorithms. The actor claims the hack occurred on January 28, 2026, and states that proof of the hack was sent to another user (@Addka72424) for verification. A sample from the database was provided, and the full dataset has been made available via a file-sharing link.

This post is for subscribers on the Plus, Pro and Elite tiers

Subscribe

Already have an account? Sign In

Latest