Grafana Labs has confirmed that attackers accessed their GitHub environment and downloaded part of the source code after compromising an access token. Although the company claims that no evidence of customer data exposure or impact on systems in production, the filtration of the code poses different and persistent risks that deserve technical and strategic attention.
The extortion group that claims the intrusion, self-called CoinbaseCartel, has added Grafana to its data leakage portal (DLS) without yet publishing files, in a classic pressure maneuver to force a payment. Grafana has chosen not to give in to extortion and has invalidated the committed credentials, following the public recommendation of the authorities, which warn that paying ransom does not guarantee the recovery of assets or deter future attacks. See the FBI's general orientation on ransomware and extortion here: https: / / www.fbi.gov / scams-and-safety / common-scams-and-crimes / ransomware.

From the operational point of view, the declared vector - a stolen token in GitHub - emphasizes a constant: the credentials and the secrets exposed remain the main gateway for attacks on repositories and pipelines. Open source organizations and projects with high commercial adoption, such as Grafana, are particularly valuable for attackers because their code may contain useful information about configurations, dependencies and potentially logical flows that facilitate supply chain vulnerabilities.
The incident also highlights the mode of operation of collectives such as CoinbaseCartel, which according to researchers groups members of previous bands (ShinyHunters, Lapsus $) and combines data theft with publication threats and destructive tools. Technical and intelligence reports indicate that variants of these threats develop loads to encrypt critical infrastructure like VMware ESXi, which complicates the response if the actor decides to climb.
For product equipment and operations that manage own or third-party software such as Grafana, priority actions should include the immediate rotation of tokens and keys, the revision and restriction of permits (principle of less privilege), and migration to safer mechanisms: fine tokens with expiry, OIDC between CI / CD and identity providers, and automatic expiry policies. GitHub offers guides to create and protect tokens that should be reviewed: https: / / docs.github.com / en / authentication / keeping-your-account-and-data-secure / creating-a-personal-accesses.
Beyond the management of secrets, it is recommended to audit the entire history of commitments and automatic integrations in case the access was used to insert back doors or modify releases. Software consumer organisations should verify official release signatures / prints, prefer packages distributed from official sources, and activate integrity controls (check sum, reproducible building and device signature) to minimize the risk of accepting manipulated binaries.

As for the response to extortion, Grafana followed the position recommended by many law enforcement officials and specialists: not to pay. However, public communication and technical transparency matter as much as internal containment. Companies should prepare communication plans to explain which information has been revised, which evidence supports the non-impact of sensitive data, and the mitigation measures taken to restore confidence.
For those responsible for cybersecurity and governance, this case is a reminder of two priorities: investing in early detection and credentials hygiene practices, and assuming that the source code, although not containing personal data, is a strategic asset that requires equivalent protection. Risk assessments, post-incident integrity tests and escape / extortion simulation exercises help to calibrate the response and reduce reputational and operational impact.
Finally, the community should remember that incidents of this type can evolve: subsequent publication of code or artifacts, or exploitation attempts based on the knowledge acquired from the repository, are plausible scenarios. Maintain monitoring of leak forums and portals, update intelligence alerts and collaborate with suppliers and authorities are actions that, combined with technical controls, improve resilience to future attacks. For more context on the initial coverage of this incident, see BleepingComputer's report: https: / / www.bleepingcomputer.com / news / security / grafana-labs-confirms-source-code-stolen-by-coinbasecartel /.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...