Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Grafana Labs Confirms Hackers Stole Source Code

May 19, 2026

TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack

May 19, 2026

The quest for greater tech independence

May 19, 2026
Facebook X (Twitter) Instagram
Tuesday, May 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Grafana Labs Confirms Hackers Stole Source Code
News

Grafana Labs Confirms Hackers Stole Source Code

Team-CWDBy Team-CWDMay 19, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A popular open source developer has revealed that hackers stole its codebase and tried to blackmail the firm into paying a ransom.

Grafana Labs produces AI-powered analytics and visualization app Grafana.

It said in a series of posts on X (formerly Twitter) that an “unauthorized party” managed to obtain a token, giving them access to the firm’s GitHub environment and enabling them to download its source code.

“Our investigation has determined that no customer data or personal  information was accessed during this incident, and we have found no evidence of impact to customer systems or operations,” it added.

“We immediately initiated forensic analysis and we believe we’ve identified the source of the credential leak.  We have since invalidated the compromised credentials and implemented additional security measures to further secure our environment against unauthorized access.”

Read more on data extortion: Trellix Reveals Unauthorized Access to Source Code.

Grafana Labs added that the threat actors demanded payment from the firm in order to prevent them releasing the codebase.

“Based on our operational experience and the published stance of the FBI, which notes that ‘paying a ransom doesn’t guarantee you or your organization will get any data back’ and only ‘offers an incentive for others to get involved in this type of illegal activity,’ we’ve determined the appropriate path forward is to not pay the ransom,” it explained.

The firm has promised to share more about how the breach occurred, although reports suggest a relatively new extortion gang known as “CoinbaseCartel” was the culprit.

Grafana Labs claims to have over 7000 global customers, including tech giants such as Anthropic, NVIDIA, Salesforce and Microsoft.

Grafana Labs Doing the Right Thing

Security experts claimed the firm seems to be following best practice incident response processes.

“It looks like Grafana were well prepared for a breach and are following all of the playbook protocols you would expect. It’s too early to speculate on how much of a compromise these attackers have achieved but at least Grafana acknowledge that more information may need to be disclosed as their investigations progress,” said Brian Higgins, security specialist at Comparitech.

“The main takeaway for business peers is that vendor access and supply chain structures remain high value targets for attackers. They have been proven time after time to enable successful infil and exfil pathways and should be high on everybody’s list of priority network sectors for target-hardening.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack
Team-CWD
  • Website

Related Posts

News

TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack

May 19, 2026
News

cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor

May 19, 2026
News

NCSC Publishes Guidance on Securing Agentic AI Use

May 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

What are brushing scams and how do I stay safe?

December 24, 2025

Can password managers get hacked? Here’s what to know

November 14, 2025

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.