Red Hat Confirms Security Incident: Sensitive Customer Data Compromised
Red Hat has confirmed a security incident involving a self-managed GitLab instance used for its consulting services. The incident, detected on October 3, resulted in the compromise of sensitive customer data.
Red Hat is investigating the incident, which involved a GitLab Community Edition instance. The stolen data includes approximately 800 Customer Engagement Reports (CERs) containing sensitive customer information. Hackers, identifying themselves as the Crimson Collective, claim to have accessed nearly 570 GB of data from around 28,000 internal Red Hat projects, including source code and authentication tokens.
The hackers published a directory listing of stolen repositories and a list of customer reports from 2020 to 2025. They claim to have found authentication keys and full database URIs within Red Hat code and CERs, which they used to access downstream customer infrastructure. However, GitLab has confirmed that there has been no breach of its managed systems or infrastructure.
Red Hat acted swiftly after detecting the compromise, isolating the instance, and reporting it to authorities. The company has not commented on specific claims regarding the repositories and customer reports. The incident serves as a reminder of the importance of robust security measures, especially when dealing with sensitive customer data. As the investigation continues, Red Hat and its clients await further developments.
Read also:
- Mural at blast site in CDMX commemorates Alicia Matías, sacrificing life for granddaughter's safety
- Microsoft's Patch Tuesday essential fixes: 12 critical vulnerabilities alongside a Remote Code Execution flaw in SharePoint
- Zaporizhzhia Nuclear Plant Faces Crisis as Last Power Line Damaged
- Swedish Housing Associations Hike Fees by 8.1% Amidst Inflation and Interest Rate Surge