
Cloud hosting provider Vercel has confirmed a security breach that resulted in unauthorized access to a limited set of customer credentials, raising fresh concerns about infrastructure security across the developer and crypto ecosystem. The company disclosed the incident in a Sunday blog post, noting that internal systems were accessed without authorization and an investigation is currently underway.
According to Vercel, only a "limited subset" of users were affected. The company said it has already contacted impacted customers and urged them to immediately rotate their credentials to prevent further exposure. While the scope appears contained for now, the nature of the breach has sparked wider anxiety, especially given Vercel's popularity among Web3 and crypto-based projects.
The disclosure follows reports circulating on X, where users pointed to a post on BreachForums by a threat actor known as "ShinyHunters." The hacker allegedly offered Vercel-related data for $2 million, claiming access to sensitive materials such as API keys, source code, internal databases, and employee accounts tied to deployments.
Although Vercel did not directly confirm these claims, it acknowledged that the attacker demonstrated a high level of sophistication. The company described the breach as being carried out with "operational velocity" and a deep understanding of its internal architecture, suggesting a well-planned and potentially advanced cyberattack.
Meanwhile, Crypto exploits surged in March 2026, resulting in over $52 million in losses across 20 incidents, which nearly doubles the $26.5 million lost in February. Blockchain security firm PeckShield highlighted this spike as a return to high-risk conditions after what had been the lowest monthly losses in almost a year.
Vercel CEO Guillermo Rauch revealed that the breach originated from a compromised third-party AI tool, Context.ai, used by one of its employees. This initial compromise allowed attackers to gain access to the employee's Google Workspace account, which then became a gateway into certain internal systems.
Rauch emphasized that customer environments on Vercel remain fully encrypted. However, he noted that some environment variables categorized as "non-sensitive" may have been exposed during the intrusion. The attacker reportedly leveraged this to expand their access within the system.
In response, Vercel has rolled out enhanced monitoring systems and additional security protections. The company also reassured users that its core developer tools, including Next.js and Turbopack, remain unaffected.
Rauch advised users to adopt immediate security measures, including rotating secrets, reviewing access logs, and ensuring proper classification of sensitive data.