
Red Hat has officially confirmed it is investigating a cybersecurity incident involving unauthorized access to an internal GitLab environment. The breach was isolated to a specific instance used by the Red Hat Consulting team for collaboration on certain customer projects.
The Crimson Collective hacking group has claimed responsibility, alleging the theft of nearly 570GB of data that includes information from approximately 28,000 internal projects and, more critically, around 800 customer engagement reports (CERs) from 2020 to 2025.
The hacking group also published the allegedly stolen GitLab repositories and a CERs list on Telegram to support their claims. Victims listed include:
These reports could contain sensitive information such as client infrastructure details, configuration data, and authentication keys. The Centre for Cybersecurity Belgium (CCB) stated that the Crimson Collective already used leaked authentication tokens to access customer systems.
“We recently detected unauthorized access to a GitLab instance used for internal Red Hat Consulting collaboration in select engagements,” the Red Hat announcement reads.
Upon detecting the intrusion, Red Hat reports that it immediately removed the unauthorized party's access, isolated the system, and initiated a full investigation.
However, the company stated this incident is unrelated to its core products or software supply chain. “At this time, we have no reason to believe this security issue impacts any of our other Red Hat services or products, including our software supply chain or downloading Red Hat software from official channels.”
This incident is unrelated to a Red Hat OpenShift AI vulnerability (CVE-2025-10725) that was recently announced.
While Red Hat has stated that the compromised GitLab instance does not typically house sensitive personal data, the alleged exfiltration of CERs may pose a significant risk to affected consulting clients.
Information within these reports could potentially be used by malicious actors to target downstream customer networks.
CCB assesses that this data breach poses a high risk for organisations that used Red Hat Consulting services or shared sensitive information (e.g., credentials, tokens, network data) with Red Hat and recommends:
In other recent news, the U.S. Air Force is investigating a suspected SharePoint breach that exposed sensitive data.