Unknown – €150,000 Fine (France, 2021)

€150,000Commission Nationale de l'Informatique et des Libertés27 January 2021France
final
Fine

General GDPR enforcement action

This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.

France's data protection authority fined a company and its subcontractor for not protecting customer data from credential stuffing attacks. These attacks allowed hackers to access personal information like names and email addresses. This case shows the need for companies to quickly respond to security threats.

What happened

A company and its subcontractor failed to prevent credential stuffing attacks, exposing customer data.

Who was affected

Customers whose personal information, such as names and email addresses, was accessed during the attacks.

What the authority found

The French authority found that the companies did not take adequate measures to secure customer data, violating GDPR's data security requirements.

Why this matters

This ruling emphasizes the importance of timely and effective cybersecurity measures. Companies should be proactive in protecting user data from known threats like credential stuffing.

GDPR Articles Cited

AI-verified

Art. 32 GDPR
View original scraped data
Art. 32 GDPR

Original data from scraper before AI verification against source document.

Entities Involved

Company
€150,000
(controller)
Subcontractor
€75,000
(processor)
Source verified 6 March 2026
entity split needed
Full Legal Summary
Detailed

The French DPA (CNIL) fined a company and its subcontractor EUR 150,000 and EUR 75,000 for failing to take sufficient measures against credential stuffing attacks on the company's website. Between June 2018 and January 2020, the CNIL received several notifications of personal data breaches related to a website where several million customers regularly shop. In response, the CNIL decided to investigate the company and its subcontractor entrusted with the management of this website. In the course of its investigations, the CNIL found that the website in question had been subjected to numerous waves of credential stuffing attacks. In this type of attack, a malicious person obtains lists of 'unencrypted' identifiers and passwords published on the Internet, usually after a data breach. Assuming that users frequently use the same password and username (email address) for different services, the attacker will use 'bots' to try to log in to a large number of websites. If the authentication is successful, this will allow the attacker to see the information associated with those accounts. The CNIL found that the attackers were able to obtain the following information: Surname, first name, email address and date of birth of customers, as well as their loyalty card number and balance, and information related to their orders. The CNIL considers that the two companies had breached their obligation to maintain the security of customers' personal data under Article 32 of the GDR. In fact, the companies took slow action to effectively combat these repeated attacks. They had decided to focus their response strategy on developing a tool to detect and block attacks launched by robots. However, the development of this tool took a year from the first attacks. In the meantime, however, a number of other measures with faster impact could have been considered to prevent further attacks or mitigate the negative impact on individuals. As a result of this lack of diligence, the data of approxi

Details

Fine Date

27 January 2021

Authority

Commission Nationale de l'Informatique et des Libertés

Fine Amount

€150,000

Enforcement Tracker ID

ETid-535

About this data

Data: CMS GDPR Enforcement Tracker
Licensed under CC BY-NC-SA 4.0
AI-verified and classified

Cite as: Cookie Fines. Unknown - France (2021). Retrieved from cookiefines.eu

Report Inaccuracy

Last updated: