March 7, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

Red Hat’s GitLab Repository Breached—Security Investigation Ongoing

Red Hat’s GitLab Repository Breached—Security Investigation Ongoing



Red Hat’s GitLab Repository Breached—Security Investigation Ongoing

In the lifecycle of any enterprise, security breaches are an unfortunate inevitability. This time, the target was Red Hat, a major player in the Linux and cloud computing sectors.

A new cybercrime group calling itself Crimson Collective (also known as Eye of Providence) has claimed responsibility for infiltrating Red Hat’s private GitLab repository and stealing customer information along with confidential source code.

The group announced the breach late on October 2 (US time) via Telegram, posting screenshots purportedly showing directory listings of Red Hat’s internal projects. Red Hat has confirmed the breach occurred.

 

Red Hat's GitLab Repository Breached—Security Investigation Ongoing

 


Red Hat’s Official Statement

Red Hat issued the following statement:

“We recently detected unauthorized access to a GitLab instance that was used for internal collaboration on certain consulting engagements. We immediately launched a thorough investigation, removed the unauthorized access, isolated the instance, and contacted the appropriate authorities. Our ongoing investigation has determined that an unauthorized third party accessed and copied some data from this instance.”

Scale of the Alleged Data Theft

The hackers claim to have extracted approximately 570GB of data from 28,000 internal development repositories, allegedly including around 800 Customer Engagement Reports (CERs).

CERs are detailed documents produced by Red Hat’s consulting services that contain sensitive information about client environments, including architecture diagrams, network configurations, and authentication tokens. The group claims this data could enable infiltration of customer infrastructure.

Red Hat responded to these claims as follows: “The compromised GitLab instance contained consulting engagement data, such as Red Hat project specifications, example code snippets, and internal communications related to consulting services. This GitLab instance typically does not contain highly sensitive personal information. While our analysis continues, we have not identified highly sensitive personal information in the affected data at this time.”

Affected Organizations

The group claims to have obtained CERs related to major corporations including AT&T, Bank of America, and Fidelity, as well as government agencies such as the US Navy’s Naval Surface Warfare Center, the Federal Aviation Administration, and the US House of Representatives.

In response, Red Hat emphasized that the breach affected only Red Hat Consulting customers. “At this time, we have no reason to believe this security issue impacts our other Red Hat services or products, such as our software supply chain or downloads of Red Hat software from official channels.”

For those who are not Red Hat Consulting customers, Red Hat stated clearly to all other customers and users that “at this time, we have confirmed no evidence of impact from this incident.” The company acknowledged it is “aware of claims circulating online” and explained that its “security team is actively investigating this matter.”

GitLab Not at Fault

While GitLab software was involved, this security breach is entirely a Red Hat issue, not a GitLab problem. GitLab stated: “There has been no breach of GitLab-managed systems or infrastructure. GitLab remains secure and unaffected. This incident concerns an instance of GitLab Community Edition—our free, open-core offering—that Red Hat self-manages.”

Unverified Claims

Crimson Collective claims to have extracted massive amounts of data, including unreleased projects and security-related tools, from Red Hat’s self-hosted GitLab instance. However, these claims remain unverified as no source code samples have appeared on information leak sites.

Furthermore, since Red Hat’s software and services are based on open-source code, access to that code is unlikely to pose significant danger. Unlike proprietary code from companies like Apple or Microsoft, the code for Red Hat Enterprise Linux (RHEL) is already publicly available through Fedora and CentOS Stream. In other words, what RHEL contains and how it’s built is already precisely known.

Reputational Impact

Nevertheless, this customer data breach damages the company’s reputation. This impact cannot be ignored, especially given that concerns about open-source supply chain security have increased among enterprises over the past two years.

As of October 3 when this article was written, Red Hat has not provided further updates on how serious Crimson Collective’s claims actually are. Ultimately, cybercrime groups often exaggerate or fabricate breaches to gain attention. While there’s no doubt a breach occurred, the severity remains an unresolved question.

Red Hat’s GitLab Repository Breached—Security Investigation Ongoing


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.