Grafana Acknowledges Data Breach After Hackers Claim Theft of Source Code and Internal Data
Grafana Confirms Security Incident
Open-source analytics platform Grafana has confirmed that it suffered a data breach after a threat actor group known as Coinbase Cartel publicly claimed to have stolen sensitive information.

The breach was acknowledged late Thursday in a brief statement on the company's security blog, though Grafana has not yet disclosed the full scope or method of the attack.
Coinbase Cartel, a cybercriminal collective with ties to the notorious groups ShinyHunters, Scattered Spider, and Lapsus$, posted screenshots and samples on their Telegram channel as proof of the alleged theft.
Expert Reactions
“The involvement of a group with such a broad affiliate network suggests this breach could have far-reaching consequences,” said Alex Holden, founder of Hold Security. “Attackers may use stolen credentials or source code to target Grafana customers or launch supply-chain attacks.”
Another analyst, speaking on condition of anonymity, added: “Grafana’s widespread use in enterprise monitoring means any customer data or internal tooling leak is a serious concern.”
Background
Grafana Labs, the company behind the popular monitoring and visualization software, has over 750,000 active installations and serves numerous Fortune 500 companies. The platform is used for infrastructure monitoring, log analysis, and application performance management.
Coinbase Cartel emerged in early 2024, claiming responsibility for breaches at several tech firms. The group operates a ransomware-as-a-service model and frequently recruits affiliates from other established threat actors to amplify attacks.
ShinyHunters, Scattered Spider, and Lapsus$ are each known for high-profile data breaches and extortion campaigns. ShinyHunters previously targeted major retailers, while Lapsus$ compromised Okta, Microsoft, and Nvidia.

“This is not a typical isolated incident,” said John H. Davis, a cybersecurity researcher at FireEye. “The cross-pollination of these groups means that stolen data could be weaponized in multiple ways.”
What This Means
Grafana users should immediately review their account activity, rotate API keys, and enable two-factor authentication if not already done. The company has not yet confirmed whether customer production data was exposed, but said it is working with law enforcement and a third-party forensic team.
Enterprises relying on Grafana for mission-critical monitoring should treat this as a potential supply-chain risk, as stolen source code or internal tools could be used to craft targeted attacks against their infrastructure.
The incident also underscores the growing threat from loosely affiliated cybercrime cartels that combine skills and resources. “The line between organized crime groups and hacktivist collectives is blurring,” noted Rachel Williams, a threat intelligence analyst at Recorded Future. “Organizations must adapt their defenses accordingly.”
Grafana has promised a more detailed disclosure once the investigation is complete. In the meantime, the company urges users to stay vigilant and monitor official security advisories through its official advisory page.
Related Discussions