Vercel logo illustrating an update to a supply-chain attack

Vercel Updates Platform, Scopes Possible Wider Impact of Attack

Vercel investigates supply-chain attack affecting users through compromised third-party tool.

Cloud development platform Vercel said it’s investigating a possible wider impact of a supply-chain attack that could impact “hundreds of users across many organizations.”

In an update to its security bulletin regarding an attack that gave adversaries limited unauthorized access to its internal systems it said:

“Our investigation has revealed that the incident originated from a small, third-party AI tool whose Google Workspace OAuth app was the subject of a broader compromise, potentially affecting its hundreds of users across many organizations.” – Vercel’s security bulletin updated late Wednesday.   

From AI Tool to Internal Systems

Vercel confirmed earlier this week that attackers gained unauthorized access to its internal systems through a compromised third-party AI tool, in what security researchers are calling a textbook example of OAuth-enabled supply chain escalation.

Exposure was limited to non-sensitive environment variables, and the investigation is ongoing with Google Mandiant, according to Vercel. Security researchers are calling the attack a textbook example of OAuth-enabled supply chain escalation.

Vercel said it is “actively” updating its platform to harden cybersecurity defenses. Improvements include:

  • Better environment variable management, with stronger defaults, improved safeguards.
  • New team-wide management and security overview of environment variable.
  • Easier to use activity log, including deep-linking to filtered views and higher information density.

The breach, publicly disclosed April 19, originated at Context.ai, an AI productivity tool used by at least one Vercel employee who had connected the application to their corporate Google Workspace account. In a statement from Vercel’s CEO Guillermo Rauch, he said the attacker exploited that OAuth trust relationship to hijack the employee’s Google account and pivot into Vercel’s internal environments.

What the Attacker Actually Reached

Attacker access included developer-stored credentials such as API keys and access tokens  that had not been explicitly marked as sensitive within Vercel’s platform. Exposure was limited to individual team accounts, not a single master key unlocking every customer’s credentials across the platform, according to Vercel.

The company confirmed its Next.js open-source framework and Turbopack projects were not affected. The company said it has notified affected customers and is continuing its investigation.

The Entry point: Trust Abused

On Tuesday, Trend Micro researchers said the initial compromise occurred in February 2026 via Lumma Stealer malware — not through an unknown mechanism — giving the attacker a dwell time of approximately two months before public disclosure.

Timeline illustrating a series of cybersecurity incidents involving Context.ai and Vercel between February and April 2026. Highlights key events such as malware infection, unauthorized access to AWS, and publication of a security bulletin.
Credit Trend Micro: Incident timeline illustrating the attack progression from initial Lumma Stealer infection to public disclosure.

Context.ai said it identified and stopped unauthorized access to its AWS environment last month and later learned that compromised OAuth tokens included one used to access Vercel’s Google Workspace environment.

Peeling Back the Attack Details

A threat actor using the ShinyHunters name posted on BreachForums on April 19 claiming to possess Vercel’s internal database, source code, employee account data, and API keys, and listing the package for $2 million in Bitcoin, according to BleepingComputer reporting.  

The posting included a file purportedly containing records for 580 Vercel employees. Vercel said it has not received any ransom communication, and representatives of the ShinyHunters group denied involvement. Investigators have not publicly attributed the attack.

Vercel said it is working with Google’s Mandiant incident response team, law enforcement and industry partners. The company also published an indicator of compromise tied to the malicious OAuth application and urged Google Workspace administrators to audit connected apps and permissions.

The Bigger Risk: OAuth Sprawl

An indicator of compromise is the compromised OAuth app which has been identified as: 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com.

Security analysts said the incident reflects a broader pattern in which attackers target developer-adjacent tools, particularly those with broad OAuth permissions, as a pathway into enterprise environments.

Trend Micro researchers described the attack chain as part of a broader 2026 convergence of incidents targeting credentials stored across CI/CD pipelines, package registries, and deployment platforms.

Vercel said it will continue updating its public security bulletin as new details emerge.

Total
0
Shares

Leave a Reply

Previous Article
BlackCat ransomware insider case diagram

No Margarine for Error: Land O’Lakes Man Pleads Guilty in BlackCat Case

Next Article
OpenAI workspace agents push ChatGPT into enterprise team workflows

OpenAI Deploys Workspace Agents for Team Collaboration

Related Posts

Discover more from Security Point Break

Subscribe now to keep reading and get access to the full archive.

Continue reading