Get In Touch
Call us: +40 724 719 422
Email us: office@ourweb.ro
Assistance hours:
Monday – Friday 6 am to 8 pm EST (toll free)

Red Hat Confirms Major Data Breach Involving 28,000 Private Repositories

Red Hat has confirmed that its internal GitLab instance used by the Consulting team was breached by the group Crimson Collective. The attackers claim to have stolen 570 GB of compressed data from more than 28,000 private repositories.

The compromised data reportedly includes sensitive assets such as CI/CD pipeline configurations, VPN profiles, infrastructure blueprints, Ansible playbooks, OpenShift deployment guides, and container registry details. Analysts warn that this information could enable secondary supply chain attacks against Red Hat’s consulting clients.

Researchers note that the leaked repositories reference a wide range of organizations — from global banks and telecom firms to industrial companies and even government entities. Stolen SSH keys, API tokens, and database strings could allow attackers to maintain persistent access into downstream systems.

Red Hat says the incident has not impacted its primary software supply chain or official distribution channels. The company has revoked unauthorized access, isolated the GitLab instance, begun a forensic investigation, and notified law enforcement. Direct communication with potentially affected consulting clients is underway.

Security experts caution that exposed Kubernetes manifests, DevOps automation scripts, and credential management files represent valuable “blueprints” for targeting cloud-native infrastructures. While the malware itself wasn’t advanced, the sensitivity and scale of the breach make it one of the largest source code exposures in recent years.


Secure Development & Cloud Migration Review

​ Performed a code review and architecture assessment for a company expanding into the European market, built competing threat models, and delivered secure design…

Large-Scale Phishing & Mirrored Website Fraud

Uncovered a sophisticated phishing operation leveraging mirrored websites and disposable infrastructures to mislead hundreds of victims, causing losses to private individuals and businesses, and…

Cybersecurity Audit for a Mutual Funds Management Entity

Evaluate and strengthen the security posture of financial and operational systems managing mutual funds.

Vulnerability Assessment & Network Re-Architecture for a Security Services Provider

We conducted a full vulnerability assessment and network security review for a company specializing in surveillance, intervention, and installation of security systems. Our work…

International Phishing & Identity Theft (Fraud Investigation)

​ ​ ​ Exposed a multi-actor phishing and identity-theft ring that caused over €2M loss to a single victim, delivering actionable intelligence—identities, locations, and…

Import-Export Company (Man-in-the-Middle & Payment Fraud)

​ ​ ​ ​ Uncovered and dismantled a multi-actor phishing and identity theft scheme causing multi-million euro losses, providing actionable intelligence to US and…

Secure Development & Cloud Migration Review

​ Performed a code review and architecture assessment for a company expanding into the European market, built competing threat models, and delivered secure design…

  • Strategy

    Secure Development & Cloud Migration Strategy

  • Design

    Secure Code Review & Cloud Architecture Design

View Project

Large-Scale Phishing & Mirrored Website Fraud

Uncovered a sophisticated phishing operation leveraging mirrored websites and disposable infrastructures to mislead hundreds of victims, causing losses to private individuals and businesses, and…

  • Strategy

    Threat Intelligence & Digital Fraud Strategy

  • Design

    Anti-Phishing & Identity Verification Design

View Project
October 10, 2024

Cybersecurity Audit for a Mutual Funds Management Entity

Evaluate and strengthen the security posture of financial and operational systems managing mutual funds.

  • Strategy

    Cybersecurity Audit Strategy

  • Design

    Security Posture Assessment Design

View Project
June 3, 2024

Vulnerability Assessment & Network Re-Architecture for a Security Services Provider

We conducted a full vulnerability assessment and network security review for a company specializing in surveillance, intervention, and installation of security systems. Our work…

  • Strategy

    Infrastructure Hardening Strategy

  • Design

    Network Architecture & Resilience Design

View Project

International Phishing & Identity Theft (Fraud Investigation)

​ ​ ​ Exposed a multi-actor phishing and identity-theft ring that caused over €2M loss to a single victim, delivering actionable intelligence—identities, locations, and…

  • Strategy

    Fraud Response & Investigation Strategy

  • Design

    ncident Analysis & OSINT Investigation Design

View Project
December 3, 2024

Import-Export Company (Man-in-the-Middle & Payment Fraud)

​ ​ ​ ​ Uncovered and dismantled a multi-actor phishing and identity theft scheme causing multi-million euro losses, providing actionable intelligence to US and…

  • Strategy

    Cyber Fraud Mitigation Strategy

  • Design

    Anti-Phishing & Identity Verification Design

View Project