Red Hat is investigating a security breach involving a self-managed **GitLab Community Edition** instance used exclusively by **Red Hat Consulting**. The attack, claimed by the hacker group **Crimson Collective**, resulted in the theft of **~570 GB of data** from **28,000 internal projects**, including **800 Customer Engagement Reports (CERs)**. These CERs contained sensitive details such as **infrastructure configurations, authentication keys, and database URIs**, which the attackers allegedly used to access downstream customer systems (e.g., **Bank of America, T-Mobile, AT&T, Fidelity, Walmart**). The breach occurred **~two weeks before detection (late September 2024)**, with attackers publishing **directory listings of stolen repositories and CERs (2020–2025)** on Telegram. Red Hat isolated the compromised instance, revoked attacker access, and reported the incident to authorities. While Red Hat asserts no impact on its **software supply chain** or other services, the attackers claim to have **extorted the company** but received only generic vulnerability reporting instructions. The group also vandalized **Nintendo’s topic page** around the same time, suggesting broader malicious activity.
TPRM report: https://www.rankiteo.com/company/red-hat
"id": "red3233032100325",
"linkid": "red-hat",
"type": "Breach",
"date": "6/2020",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': ['Bank of America',
'T-Mobile',
'AT&T',
'Fidelity',
'Walmart',
'Other Organizations in CERs '
'(2020–2025)'],
'industry': 'Software/Open-Source Solutions',
'location': 'Global (HQ: Raleigh, North Carolina, USA)',
'name': 'Red Hat (IBM Subsidiary)',
'size': 'Large Enterprise',
'type': 'Technology Company'},
{'location': 'Global',
'name': 'Customers Listed in CERs',
'type': ['Financial Services',
'Telecommunications',
'Retail',
'Technology']}],
'attack_vector': ['Compromised Self-Managed GitLab Instance',
'Exploited Authentication Keys/Database URIs in Code/CERs'],
'customer_advisories': ['Potential Risk to Customer Infrastructure via '
'Exposed Keys/URIs in CERs'],
'data_breach': {'data_exfiltration': True,
'file_types_exposed': ['Repository Code',
'PDF/Document Files (CERs)',
'Configuration Files'],
'number_of_records_exposed': ['28,000 Internal Projects',
'800 CERs'],
'personally_identifiable_information': True,
'sensitivity_of_data': 'High (Includes PII, Credentials, and '
'Customer Infrastructure Details)',
'type_of_data_compromised': ['Source Code',
'Customer Engagement Reports '
'(CERs)',
'Authentication Keys',
'Database URIs',
'Infrastructure Configurations']},
'date_detected': '2023-10-02T17:30:00 CEST (approximate, based on correction '
'issuance)',
'date_publicly_disclosed': '2023-10-03',
'description': 'Red Hat is investigating a security incident involving a '
'self-managed GitLab Community Edition instance used solely '
'for Red Hat Consulting. Hackers calling themselves Crimson '
'Collective claim to have stolen data from 28,000 internal Red '
'Hat projects (570 GB) and 800 Customer Engagement Reports '
'(CERs), which may contain sensitive customer information such '
'as infrastructure details, authentication keys, and '
'configuration data. The breach reportedly occurred about two '
'weeks prior to public disclosure on October 3, 2023. Red Hat '
'acted immediately to isolate the instance and report the '
'incident to authorities. The investigation remains ongoing.',
'impact': {'brand_reputation_impact': ['Potential Erosion of Trust '
'(High-Profile Customers Affected)',
'Media Coverage of Breach'],
'data_compromised': ['Internal Project Data (28,000 projects, ~570 '
'GB)',
'Customer Engagement Reports (800 CERs, '
'2020–2025)',
'Authentication Keys',
'Database URIs',
'Infrastructure Details',
'Configuration Data'],
'identity_theft_risk': ['High (PII/Authentication Keys in CERs)'],
'operational_impact': ['Isolation of Affected GitLab Instance',
'Ongoing Investigation',
'Potential Customer Infrastructure Risks'],
'systems_affected': ['Self-Managed GitLab Community Edition '
'Instance (Red Hat Consulting)']},
'initial_access_broker': {'entry_point': 'Self-Managed GitLab Community '
'Edition Instance',
'high_value_targets': ['Customer Engagement Reports '
'(CERs)',
'Authentication Keys',
'Database URIs'],
'reconnaissance_period': 'Approximately 2 Weeks '
'(Prior to Detection)'},
'investigation_status': 'Ongoing',
'motivation': ['Data Theft',
'Extortion',
'Potential Downstream Attacks on Customers'],
'ransomware': {'data_exfiltration': True,
'ransom_demanded': ['Extortion Attempt (No Specific Amount '
'Disclosed)']},
'recommendations': ['Update Self-Managed GitLab Instances to Latest Version '
'(GitLab Advisory)',
'Apply Security Patches Promptly',
'Harden Access Controls (GitLab Handbook Guidelines)',
'Avoid Storing Credentials/Keys in Repositories',
'Monitor for Downstream Attacks Leveraging Stolen Data'],
'references': [{'date_accessed': '2023-10-03', 'source': 'Red Hat Blog Post'},
{'date_accessed': '2023-10-03', 'source': 'BleepingComputer'},
{'date_accessed': '2023-10-03',
'source': 'GitLab Security Handbook',
'url': 'https://about.gitlab.com/security/hardening/'},
{'date_accessed': '2023-10-03',
'source': 'Telegram (Crimson Collective Leaks)'}],
'regulatory_compliance': {'regulatory_notifications': ['Authorities Notified '
'(Specific Agencies '
'Not Named)']},
'response': {'communication_strategy': ['Public Blog Post (2023-10-03)',
'Correction Statement (2023-10-02)',
'No Further Comments During '
'Investigation'],
'containment_measures': ['Immediate Isolation of GitLab Instance',
'Termination of Attacker Access'],
'incident_response_plan_activated': True,
'law_enforcement_notified': True},
'stakeholder_advisories': ['No Evidence Other Red Hat Services/Products '
'Affected',
'Confidence in Software Supply Chain Integrity'],
'threat_actor': 'Crimson Collective',
'title': 'Red Hat Security Incident Involving Self-Managed GitLab Instance',
'type': ['Data Breach', 'Unauthorized Access', 'Extortion Attempt'],
'vulnerability_exploited': ['Unpatched Self-Managed GitLab Community Edition',
'Misconfigured Access Controls',
'Exposed Credentials in Repositories']}