but CI’s at the Fed remain… Skeptical!
Published: October 3, 2025
Red Hat admitted it was breached:
But have they failed to disclose what really happened? Maybe Red Hat is just going to wait that out, you know, just like the US Dept. of Treasury did after they were breached, then lied about the extent of the Hack, until the truth was realized and disclosed.
Oh well… here we go again.
The author of this article doubles-down on corporate-crafted-speech when they bought the Red Hat Tag Line “It hasn’t found evidence of personal or sensitive data theft.” Just read it for yourself: https://cyberscoop.com/red-hat-gitlab-attack-consulting-data/
This breach all boils down to one single point of failure: Unauthorized Privileged Account Escalation. The breach will soon be further investigated, the results will establish that PII was accessed, and you can bet that data was exfiltrated, just like it was at the USDoT!
Today, it’s 100% clear that there was a Cybersecurity failure due to there being a lack of a Host-Based CDM-SIEM (such as the Anamo CDM) solution in place to prevent such a privilege escalation. IoA’s or “Indicators of Attack”, along with IoC’s (Indicators of Compromise), are the essential data sets in breach prevention. Breach prevention isn’t working for most entities because they have become reliant upon external Network-Based SIEM services that are slow and outside of a Host, therefore they remain blind and unable to see IoA’s and IoC’s from the inside of a compromised system.
Over 5,000 Compromised:
Dear Red Hat: Here’s the way to eliminate the failure that led to your breach: https://www.youtube.com/watch?v=ByTKwyAzZB4.
Red Hat Consulting compromised over 5,000 Enterprise businesses and an untold number of Federal assets, putting them all at risk:
So, What Did Anamo’s CI’s at the Fed Say?
CI’s in DC have disclosed some interesting facts and offered some of their own opinions. For the sake of keeping secrets, we’ll just state my “opinion.” Red Hat may have compromised client information, including government information. While that has not (yet) been confirmed, the investigation will likely prove that fact. Additionally, sources close to the matter have stated that the PII that was captured… may not have been encrypted either. If these statements are found to be true, I’ll have some additional juicy facts to share in my next post.