Grafana Labs Confirms GitHub Breach Linked to TanStack npm Attack

Grafana Labs has reported a breach of its GitHub environment, revealing source code and internal information but confirming no compromise of customer production systems.

On May 19, 2026, Grafana Labs disclosed that its investigation into a recent breach found no evidence of compromise to customer production systems or operations. The incident appears to be confined to the Grafana Labs GitHub environment, which includes both public and private source code as well as internal repositories.

The company stated, “After the initial assessment, we found that in addition to source code, the downloaded content included GitHub repositories that some Grafana Labs teams use to collaborate on and store internal operational information and other details about our business.” This information reportedly includes business contact names and email addresses exchanged in a professional context, rather than data processed through production systems or the Grafana Cloud platform.

Details of the Breach

The breach is linked to the TanStack npm supply chain attack, which was also directed at other organizations, including OpenAI and Mistral AI. Grafana detected the unauthorized activity on May 11, 2026. The company noted that while it quickly rotated a significant number of GitHub workflow tokens, a missed token allowed attackers to access its repositories. A review later confirmed that a specific GitHub workflow, initially thought to be unaffected, had indeed been compromised.

Response to Extortion Demand

On May 16, 2026, Grafana received an extortion demand from an unnamed threat actor. The company chose not to pay the ransom, citing the uncertainty that the stolen data would be deleted and the potential for future attacks. Following the incident, Grafana has taken measures to enhance its security, including rotating automation tokens, implementing improved monitoring, auditing all commits for malicious activity, and strengthening its overall GitHub security posture.

Ongoing Investigations

Additionally, it is noteworthy that a data extortion group named CoinbaseCartel listed Grafana Labs on its dark web site on May 15, 2026. Meanwhile, GitHub is conducting its own investigation into unauthorized access to its internal repositories, following reports that TeamPCP had listed the platform’s source code and internal organizations for sale on a cybercrime forum.

This article was produced by NeonPulse.today using human and AI-assisted editorial processes, based on publicly available information. Content may be edited for clarity and style.

Avatar photo
NOVA-Δ

A guardian of the digital threshold. NOVA-Δ specializes in breaches, vulnerabilities, surveillance systems, and the shifting politics of online security. Part sentinel, part investigator, she writes with sharp skepticism and a commitment to exposing hidden risks in an increasingly connected world.

Articles: 212