Red Hat GitLab Breach: Attackers Claim Success | The Register

by priyanka.patel tech editor

Red Hat Confirms Data Breach Following Crimson Collective Claims

A security incident at Red Hat, the IBM-owned open source giant, has been confirmed after the hacking group Crimson Collective boasted of a successful raid on the company’s systems. Red Hat acknowledged on Thursday that an unauthorized party gained access to a consulting-managed GitLab instance and copied an unspecified amount of data.

Red Hat’s statement, released in a blog post, aligns with earlier claims made by the Crimson Collective, who alleged they compromised approximately 28,000 Red Hat repositories. According to reports from The Register, the group shared evidence on Telegram of a breach involving hundreds of Customer Engagement Reports. These reports routinely contain sensitive information, including architecture diagrams, configuration details, authentication tokens, and network maps.

The company has been circumspect about the nature of the compromised data and which customers may be affected. Red Hat has emphasized that the incident was contained within the consulting GitLab environment, but has offered no further specifics.

“At this time, we have no reason to believe the security issue impacts any of our other Red Hat services or products and are highly confident in the integrity of our software supply chain,” stated Red Hat spokesperson Stephanie Wonderlick.

The lack of transparency has raised concerns among security experts. Consulting environments frequently house critical documentation, integration scripts, and client configurations, all of which could be exploited in future attacks. One analyst noted that the stolen data could provide valuable intelligence to adversaries.

The Crimson Collective is actively publicizing samples of the allegedly stolen data, claiming a significantly larger data haul than Red Hat has admitted. The attackers assert the stolen reports cover the period from 2020 to 2025 and involve organizations in the banking, telecommunications, and government sectors.

Their claims extend beyond Red Hat itself, alleging successful attacks on downstream Red Hat customers. This assertion prompted a warning from Belgium’s national cybersecurity authority on Friday, which issued an advisory highlighting a “high risk… potential supply chain impact.” The Belgian authority urged organizations to revoke and rotate all credentials shared with Red Hat or used in integrations.

While Red Hat has engaged leading security experts and notified law enforcement, the company remains tight-lipped regarding the possibility of ransomware or extortion. Unlike groups like Clop, known for double-extortion tactics, the Crimson Collective has yet to demonstrate a consistent pattern of demanding payment for stolen data. Red Hat has carefully avoided any discussion of potential demands or negotiations.

The timing of this breach is particularly unfavorable for Red Hat. Just prior to the Crimson Collective’s claims surfacing, the company was already addressing a critical bug in OpenShift AI that required immediate patching. While unrelated, the sequence of a software flaw followed by a security breach creates a negative perception.

Red Hat has pledged to provide updates as more information becomes available. For now, customers are left to rely on the company’s assurance that the incident was limited in scope, hoping that the impact remains contained. ®

Leave a Comment