CoinbaseCartel Steals Grafana Source Code via GitHub Token

Grafana Labs confirmed CoinbaseCartel stole its source code via a stolen GitHub token; the group has links to ShinyHunters; no customer data was affected.
CoinbaseCartel Steals Grafana Source Code via GitHub Token
Table of Contents
    Add a header to begin generating the table of contents

    Grafana Labs disclosed May 18, 2026 that attackers stole its source code repositories after obtaining a GitHub authentication token from the company’s CI/CD environment. CoinbaseCartel — a threat group with ties to the ShinyHunters cluster — claimed responsibility after publicly announcing the theft. Grafana confirmed no customer data, personal information, or production systems were affected.

    How CoinbaseCartel Used a Single GitHub Token to Access Grafana’s Codebase

    The attack required no exploitation of a product vulnerability. Attackers obtained a GitHub authentication token stored in Grafana’s continuous integration and continuous deployment pipeline and used it to download the company’s source code repositories. Grafana invalidated the compromised credentials immediately upon discovering the breach and engaged a third-party incident response firm for forensic investigation.

    Grafana has not publicly disclosed how the token was obtained — whether through a compromised build environment, a leaked configuration file, or a separate intrusion. The company said it implemented additional security controls across its CI/CD pipelines following the incident.

    What Was Stolen and What Was Not: Source Code, No Customer Data

    The theft was limited to Grafana’s internal source code. The company confirmed that no customer data, personal information, or production systems were accessed or disrupted. Grafana’s public-facing services continued operating without interruption throughout the incident.

    Stolen source code can expose internal implementation details and security logic, even where no immediate operational harm results. Grafana has not characterized which specific repositories were downloaded or what their contents reveal about the company’s product architecture.

    CoinbaseCartel’s ShinyHunters Ties and the Scattered Spider Threat Cluster

    CoinbaseCartel is linked to the broader Scattered Spider and ShinyHunters threat clusters, which have conducted a string of high-profile breaches throughout 2025 and into 2026. The Grafana breach places this incident within a pattern of credential-focused intrusions attributed to actors in that ecosystem.

    Source code exposure creates risk beyond immediate operational harm. Even where no customer systems are affected, access to internal implementation details and proprietary security logic can inform future targeted attacks crafted from knowledge of the platform’s internal architecture.

    Grafana’s Incident Response: Credentials Revoked, IR Firm Engaged, Ransom Refused

    Grafana’s disclosed response includes invalidating the compromised credentials upon discovery, implementing additional CI/CD security measures, declining the ransom demand, and retaining a third-party forensic firm. The company has not identified the IR firm or provided a timeline for the investigation’s completion.

    The speed of credential invalidation — described as immediate — is significant. Whether Grafana discovered the breach through its own monitoring or only after CoinbaseCartel’s dark web listing became visible is not addressed in the company’s public statements.

    Related Posts