Grafana Confirms Breach After Hackers Claim They Stole Data
Grafana confirms data breach via compromised GitHub token; source code stolen by Coinbase Cartel.
Summary
Grafana Labs suffered a data breach after attackers compromised a token granting access to its GitHub environment, allowing them to download the company's codebase. The cybercrime group Coinbase Cartel, linked to ShinyHunters, Scattered Spider, and Lapsus$, claimed the intrusion and demanded ransom; Grafana declined to pay. The company confirmed no customer or personal data was compromised and operations remain unaffected.
Full text
Grafana confirmed suffering a data breach on Sunday, two days after a cybercrime group listed the company on its leak website. The open source visualization and analytics software provider said the intrusion was possible due to a compromised token that granted access to the Grafana Labs GitHub environment. Grafana admitted that the hackers managed to download its codebase, but said no personal or customer information was stolen and the incident has not impacted customer systems or operations. The company said the attackers demanded a ransom to prevent the source code from being leaked, but it has decided not to pay up. The compromised credentials have been reset, and a forensic analysis is being conducted. Grafana has promised to share additional details when the investigation is completed. Grafana hacked Grafana was listed on the website of the cybercrime group Coinbase Cartel on May 15, but no data appears to have been leaked at the time of writing. “We can cause you more damage than you would ever imagine,” the hackers said.Advertisement. Scroll to continue reading. The gang, active since September 2025, does not use file-encrypting ransomware. Instead, it demands a ransom payment after stealing sensitive data from victims. The Coinbase Cartel website currently lists 105 victims. Cybersecurity companies say Coinbase Cartel is linked to ShinyHunters, Scattered Spider, and Lapsus$, whose members have been collaborating since at least mid-2025, with some evidence pointing to a possible partnership dating back to 2024. The alliance has been conducting a major data theft campaign, using the ShinyHunters name to sign and claim intrusions against several high-profile companies, including Instructure, Vimeo, Wynn Resorts, Vercel, and Medtronic. Related: TeamPCP Ups the Game, Releases Shai-Hulud Worm’s Source Code Related: Trellix Source Code Repository Breached Related: GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026New Linux Kernel Vulnerability Fragnesia Allows Root Privilege EscalationAkamai to Acquire AI and Browser Security Firm LayerX for $205 MillionG7 Countries Release AI SBOM GuidanceHigh-Severity Vulnerability Patched in VMware FusionFoxconn Confirms North American Factories Hit by CyberattackMicrosoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own CodeMicrosoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises Latest News First Shai-Hulud Worm Clones EmergeExploitation of Critical NGINX Vulnerability BeginsHackers Earn $1.3 Million at Pwn2Own Berlin 2026 PoC Code Published for Critical NGINX VulnerabilityIn Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi App FlawsMicrosoft Warns of Exchange Server Zero-Day Exploited in the WildAmerican Lending Center Data Breach Affects 123,000 IndividualsOpenAI Hit by TanStack Supply Chain Attack Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: Third-Party Risk in Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveTim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.IRONSCALES has named Steve McKenzie as Chief Operating Officer.Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.More People On The MoveExpert Insights Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) Flipboard Reddit Whatsapp Whatsapp Email