Categories: Insur. Cyber

Grafana GitHub Breach Exposes Source Code via TanStack npm Attack


Ravie LakshmananMay 20, 2026Supply Chain Attack / Cloud Security

Grafana Labs, on May 19, 2026, said an investigation into its recent breach found no evidence of customer production systems or operations being compromised.

It said the scope of the incident is limited to the Grafana Labs GitHub environment, which includes public and private source code along with internal GitHub repositories.

“After the initial assessment, we found that in addition to source code, the downloaded content included GitHub repositories that some Grafana Labs teams use to collaborate on and store internal operational information and other details about our business,” it said.

“This includes business contact names and email addresses that would be exchanged in a professional relationship context, not information pulled from or processed through the use of production systems or the Grafana Cloud platform.”

The open-source visualization software maker also noted that the breach originated from the TanStack npm supply chain attack orchestrated by TeamPCP, which also hit OpenAI and Mistral AI, and that it detected the activity on May 11, 2026.

“We performed analysis and quickly rotated a significant number of GitHub workflow tokens, but a missed token led to the attackers gaining access to our GitHub repositories,” it said. “A subsequent review confirmed that a specific GitHub workflow we originally deemed not impacted had, in fact, been compromised.”

The company said it subsequently received an extortion demand from an unnamed threat actor on May 16, but opted against paying the ransom as there is no guarantee that the stolen data would actually be deleted, and could act as a catalyst for future campaigns.

Since then, Grafana has taken steps to rotate automation tokens, implement enhanced monitoring, audit all commits for signs of malicious activity, and bolster its overall GitHub security posture.

It’s worth mentioning here that a data extortion crew named CoinbaseCartel listed Grafana Labs on its dark web site on May 15, 2026. The Hacker News has contacted Grafana for comment, and we will update the story if we hear back.

The development comes as GitHub said it’s investigating unauthorized access to its internal repositories after the notorious threat actor known as TeamPCP listed the platform’s source code and internal organizations for sale on a cybercrime forum.



Source link
nabeelhassan565@gmail.com

Share
Published by
nabeelhassan565@gmail.com

Recent Posts

WTW sues Howden about alleged yacht team raid

Willis Towers Watson sued Howden US and several former WTW brokers Tuesday, alleging the rival…

2 heures ago

‘Am I out?’ Drought and Rising Costs From Iran War Deepen Pain for US Farmers

Scott Irlbeck crouched in a field of stunted wheat plants in a parched stretch of…

4 heures ago

Workplace homicides steady, concentrated in public-facing jobs: NCCI

Workplace homicides remain relatively rare but persistent, with most occurring in public-facing jobs, cash-handling environments,…

5 heures ago

Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development

Ravie LakshmananMay 20, 2026Artificial Intelligence / Security Testing Microsoft has unveiled two new open-source tools…

5 heures ago

Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company's Artifact…

5 heures ago

Vienna Insurance nears full control of German firm

Austria-headquartered Vienna Insurance Group AG Wiener Versicherung Gruppe has completed its acquisition of Nürnberger Beteiligungs…

6 heures ago