Red Hat reveals unauthorized access to a GitLab instance where internal data was copied

Crimson Collective has claimed the attack, saying it has accessed more than 28,000 Red Hat repositories

A visitor walks past US software company Red Hat logo at the Mobile World Congress (MWC), the telecom industry's biggest annual gathering, in Barcelona on February 27, 2023.
(Image credit: Getty Images)

Open source software firm Red Hat has been hacked, with extortion group Crimson Collective claiming it has exfiltrated more than 570GB of data.

Red Hat has confirmed the incident, which it said related to a specific GitLab environment used by the Red Hat Consulting team.

"We recently detected unauthorized access to a GitLab instance used for internal Red Hat Consulting collaboration in select engagements," it said in a statement.

30% off Keeper Security's Business Starter and Business plans

30% off Keeper Security's Business Starter and Business plans

Keeper Security is trusted and valued by thousands of businesses and millions of employees. Why not join them and protect your most important assets while taking advantage of this special offer?

"Upon detection, we promptly launched a thorough investigation, removed the unauthorized party's access, isolated the instance, and contacted the appropriate authorities. Our investigation, which is ongoing, found that an unauthorized third party had accessed and copied some data from this instance."

The compromised GitLab instance housed consulting engagement data, which the firm said, could include Red Hat's project specifications, example code snippets, and internal communications about consulting services.

However, it said, this particular GitLab instance doesn't typically house sensitive personal data, and there's no indication that any has been accessed. And there was no sign, it said, that the incident had affected any of its other services or products, including its software supply chain or downloads of Red Hat software from official channels.

Red Hat said it had now implemented additional hardening measures designed to help prevent further access and contain the issue.

"If you are not a Red Hat Consulting customer, there is currently no evidence that you have been affected by this incident, it said. "We are engaging directly with any customers who may be impacted."

The Crimson Collective

The attack has been claimed by a little-known group called Crimson Collective, which said on its Telegram channel that it had exfiltrated data from more than 28,000 internal repositories.

These, it said, included client documents, Customer Engagement Reports (CERs), that could hold details of infrastructure, configuration data, authentication tokens, and full database Uniform Resource Identifiers (URIs).

"These consulting reports contain detailed information about how these companies' networks and systems are set up, including network designs, passwords, tokens used for system access, and other technical details," said Aras Nazarovas, a senior information security researcher at Cybernews.

"For hackers, these documents are pretty much golden – a step-by-step map showing exactly how the affected companies' computer systems are built and connected – reconnaissance is no longer needed."

According to International Cyber Digest, the repositories reference major banks, telecoms firms and airlines, along with Citi, Verizon, Siemens, Bosch, JPMC, HSBC, Merrick Bank, Telstra, Telefonica, and even the US Senate.

The Centre for Cybersecurity Belgium (CCB) has issued a warning.

"The Centre for Cybersecurity Belgium (CCB) assesses this breach poses a high risk for Belgian organisations that used Red Hat Consulting services or shared sensitive information (e.g., credentials, tokens, network data) with Red Hat," it said. "There is also potential supply chain impact if your service providers or IT partners worked with Red Hat Consulting."

It recommended that Red Hat customers revoke and rotate all tokens, keys, and credentials shared with Red Hat or used in integrations; check with their IT providers or partners whether they have used Red Hat Consulting, and assess potential exposure; and ramp up the monitoring of authentication events, API calls, and system access for anomalies.

Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.

MORE FROM ITPRO

  • INSERT CONTENT
TOPICS
Emma Woollacott

Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.