Skip to content

Red Hat Confirms Major Security Breach, 570GB of Sensitive Data Stolen

Red Hat's security incident exposes sensitive data from major companies. The hacker group behind the breach demands repurchase, but Red Hat remains silent.

In this image we can see there is a tool box with so many tools in it.
In this image we can see there is a tool box with so many tools in it.

Red Hat Confirms Major Security Breach, 570GB of Sensitive Data Stolen

Red Hat, a leading provider of enterprise open-source solutions, has confirmed a security incident involving unauthorized access to its private GitHub repositories. The incident, which occurred on October 1, 2025, has resulted in the theft of approximately 570GB of data, including sensitive customer information. The hacker group responsible, known as the Crimson Collective, has demanded that Red Hat repurchase the stolen data, but the company has not responded.

The affected companies, whose data was stored in the compromised repositories, include major corporations and institutions such as Bank of America, T-Mobile, AT&T, Fidelity, Kaiser, Mayo Clinic, Walmart, Costco, the U.S. Navy's Naval Surface Warfare Center, Federal Aviation Administration, and the House of Representatives. However, Red Hat's consulting activities are the only areas believed to be impacted at this time.

Red Hat has swiftly initiated remediation steps to address the security incident. The company has confirmed that the private GitHub repositories were hacked, and the Crimson Collective has claimed to have exfiltrated around 800 Customer Engagement Reports (CERs) among the stolen data. Despite the demand for repurchase, Red Hat has not engaged with the extortionists.

Red Hat continues to investigate the incident and has assured customers that it is committed to transparency and keeping them informed. The company is working diligently to mitigate any potential impact and strengthen its security measures to prevent future incidents. Meanwhile, affected companies are urged to monitor their systems and be vigilant against any potential misuse of the stolen data.

Read also:

Latest