Page 188 - Red Hat PR REPORT - OCTOBER 2025
P. 188

10/8/25, 3:31 PM                     Shiny Hunters group reportedly extorting Red Hat after stealing data | SC Media
        credentials, review access logs, and brace for follow-up attacks exploiting the leaked information. The
        volume and sensitivity of the data make this breach a major supply chain security threat.”













































        Amir Khayat, co-founder and CEO at Vorlon, added that the Red Hat Beach represents a textbook SaaS
        ecosystem exposure amplified by an extortion‑as‑a‑service economy.



        “This breach moved from intrusion to extortion in less than a week,” said Khayat. “That speed exposes
        the new reality of SaaS: once data leaves a trusted boundary, attackers don’t need patience. They need

        partners. Extortion‑as‑a‑service means every overlooked repository or token can become tomorrow’s
        public crisis.”



        Khayat said teams with continuous, ecosystem‑wide visibility will detect and contain identity misuse
        fast enough to prevent the kind of cascading exposure that 28,000 repositories represent. Security
        teams should start by mapping every connected SaaS and developer platform, auditing and rotating

        tokens and secrets on a fixed schedule, and monitoring cross‑app data flows in real time, said Khayat.



        Jason Soroko, senior fellow at Sectigo, said the intrusion path in this case fits a familiar pattern that
        starts in a code platform and ends in customer environments. Attackers gained access to a self-hosted
        GitLab instance used by Red Hat Consulting and mined CERs and repos for hardcoded secrets

        including tokens and database credentials that opened doors into connected systems.



      https://www.scworld.com/news/shiny-hunters-group-reportedly-extorting-red-hat-after-stealing-data             2/3
   183   184   185   186   187   188   189   190   191   192   193