Vercel incident falls short of a supply chain attack -- for now
Company Updates

Vercel incident falls short of a supply chain attack -- for now

SC Media3d ago

Vercel over the weekend identified a security incident that compromised some of its internal systems.

According to

Given Vercel's strong installed base as the developer of the Next.js framework for building web apps, there was some concern that the attack could have led to a supply chain incident, but most security pros said it fell short.

"It's too early to label this a full-blown supply chain attack, but it's exactly the kind of incident that can become one overnight," said Guillaume Valadone, a cybersecurity researcher at GitGuardian, who posted a

Morey Haber, chief security advisor at BeyondTrust, added that calling this a fullscale supply chain attack was a gross overstatement. Haber called the incident a third-party compromise with supply chain characteristics, but not a systemic, cascading supply chain failure similar to the

"The threat actor leveraged a compromised third-party AI tool integrated via a Google Workspace OAuth application, which then enabled unauthorized access into internal systems," explained Haber. "That's a trust and authentication boundary failure, not a compromised software distribution pipeline."

For its part, Vercel said it initially identified a limited subset of customers whose Vercel credentials were compromised and reached out to that group to recommend an immediate rotation of credentials.

"We assess the attacker as highly sophisticated based on their operational velocity and detailed understanding of Vercel's systems," said the company. "We are working with Mandiant, additional cybersecurity firms, industry peers, and law enforcement. We have also engaged Context.ai directly to understand the full scope of the underlying compromise."

GitGuardian's Valadone said a confirmed intrusion at a provider this central to modern web development was already significant on its own. Valadone said teams should consider customer secrets, tokens, and deployment settings burned until proven otherwise.

"The real question is whether the attackers touched anything on the publishing side," said Valadone. "If legitimate credentials were used to tag, push, or release even once before being revoked, the blast radius stops being Vercel's customer list and starts being every team with a lockfile pointing at their packages."

Valadone said that's why he's telling teams not to wait for a definitive answer: rotate aggressively, redeploy so old builds stop holding old secrets, and hunt for persistence artifacts -- new deploy keys, unexpected workflow changes and fresh tokens -- because revocation alone doesn't undo anything an attacker already did.

Amir Khayat, co-founder and CEO of Vorlon, said Vercel operates as a core layer in many production web pipelines.

"When a platform like that gets compromised, the risk extends well beyond a single vendor and into the applications and services built on top of it," said Khayat.

Originally published by SC Media

Read original source →
Vercel