The latest news and updates from companies in the WLTH portfolio.
This analysis has uncovered two additional findings: First, we have identified a small number of additional accounts that were compromised as part of this incident. Second, we have uncovered a small number of customer accounts with evidence of prior compromise that is independent of and predates this incident, potentially as a result of social engineering, malware, or other methods.

* Vercel expanded its breach investigation, confirming more compromised accounts than initially reported. * Researchers linked the attack to a Context.ai account infected with Lumma Stealer malware, which was used to access Vercel environments. * A dark web actor attempted to sell stolen Vercel data, claiming ties to ShinyHunters, though the group denied involvement. The number of customers affected by the recent breach at Vercel is bigger than initially thought, as the company confirmed finding even more compromised accounts. Earlier this week, the cloud development platform confirmed suffering a cyberattack and losing "non-sensitive" customer data. In the initial report, Vercel said one of its employees used a third-party AI tool called Context.ai, which seems to have been used as an entry point. "The incident originated with a compromise of Context.ai" the company said, claiming that the attacker used that access to take over that employee's Google Workspace account. Through that, they gained access to some Vercel environments and environment variables "that were not marked as 'sensitive'. Infected after downloading "game hacks" During a more thorough investigation, Vercel expanded its list of compromise indicators. As a result, it found even more accounts that were exposed. It also said it found a "small number" of customer accounts with evidence of proper compromises, predating this attack. These, the company believes, are the result of social engineering, or malware attacks. It said it notified the affected individuals but did not want to say how many people were affected. In its own investigation, security researchers Hudson Rock found that the Context.ai user was infected with the Lumma Stealer infostealer in February 2026, after searching for exploits for Roblox. "We now understand that the threat actor has been active beyond that startup's compromise," Vercel CEO Guillermo Rauch said on X. "Threat intel points to the distribution of malware to computers in search of valuable tokens like keys to Vercel accounts and other providers." Just a day before Vercel announced the breach, someone tried selling the archive on a dark web forum. "Greetings all. Today I am selling Access Key/Source Code/Database from Vercel," the attacker said. They claimed to be part of the ShinyHunters team, which the group denied. Via The Hacker News Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.

Vercel says some of its customers' data was stolen prior to its recent hack - BERITAJA is one of the most discussed topics today. In this article, you will find a clear explanation, key facts, and the latest updates related to this topic, presented in a concise and easy-to-understand way. Read more news on Beritaja. App and website hosting elephantine Vercel connected Thursdays said hackers had accessed immoderate of its customers' information earlier the institution discovered its caller information breach, suggesting that this incident whitethorn person broader information implications than initially known. In an update connected its information incident page, Vercel said it had identified grounds of malicious activity connected its web preceding the early-April breach aft it expanded its first investigation. "We person uncovered a mini number of customer accounts pinch grounds of anterior discuss that is independent of and predates this incident, perchance arsenic a consequence of societal engineering, malware, aliases different methods," the update reads. Vercel besides said it discovered much customer accounts compromised by the April incident, but did not disclose details, only saying that it had notified customers known to beryllium affected truthful far. The San Francisco-based app and website hosting institution initially said its soul systems were breached aft an worker downloaded an app made by package startup Context AI, which hackers abused to summation entree to the employee's activity account, and subsequently, Vercel's systems. The caller update suggests the information breach whitethorn beryllium larger successful scope and could person lasted longer than initially thought. In a station connected X, Vercel CEO Guillermo Rauch confirmed that the hackers who compromised Vercel person been progressive "beyond that startup's compromise," referring to Context AI, which confirmed an earlier breach of its systems successful a station this week. A Vercel spokesperson declined to remark beyond the update connected the incident page. They would neither corroborate really galore customers the breach now affects, nor opportunity really acold the 2nd discuss dates back. Vercel has not yet confirmed really the hackers collapsed into its systems, but Rauch pointed to early signs that the hackers relied connected malware that compromises computers "in hunt of valuable tokens for illustration keys to Vercel accounts and different providers." Rauch whitethorn beryllium referring to accusation stealing malware, aliases infostealers, which often masquerade arsenic morganatic software. When installed, the malware collects and uploads delicate secrets from the victim's computer, including passwords and different backstage keys, allowing hackers to participate immoderate strategy that those keys let entree to. "Once the attacker gets ahold of those keys, our logs show a repeated pattern: accelerated and broad API usage, pinch a attraction connected enumeration of non-sensitive situation variables," said Rauch. The hackers utilized the hijacked Vercel employee's relationship to summation entree to immoderate of the company's soul systems, including customer credentials that were not encrypted. Rauch's comments look to adhd weight to earlier reporting by information researchers that a Context AI employee's machine was infected pinch infostealer malware aft they allegedly looked up Roblox crippled cheats. It's not yet known really galore customers are affected by the Vercel breaches and customer information thefts. Both Vercel and Context AI person suggested that the breach whitethorn impact much companies, and that much victims whitethorn travel to light.

The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user. The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.

@itsmarkmoran: YES, I did bet ~$100 on myself on Kalshi because I wanted to get caught... After discovering potential manipulation on polymarket in the NYC mayoral race (NY Post reported on this) I realized how rife with corruption kalshi is...I mean death markets...come on.... Today, we're releasing notices related to three enforcement investigations. All three cases concern political insider trading and were flagged because of our newly released safeguards to block political candidates from trading on their own elections. Kalshi does not tolerate anyone cheating or skirting the rules. Regulated exchanges must constantly evolve and adapt their systems to address insider threats.

App and website hosting giant Vercel on Thursdays said hackers had accessed some of its customers' data before the company discovered its recent data breach, suggesting that this incident may have broader security implications than initially known. In an update on its security incident page, Vercel said it had identified evidence of malicious activity on its network preceding the early-April breach after it expanded its initial investigation. "We have uncovered a small number of customer accounts with evidence of prior compromise that is independent of and predates this incident, potentially as a result of social engineering, malware, or other methods," the update reads. Vercel also said it discovered more customer accounts compromised by the April incident, but did not disclose details, only saying that it had notified customers known to be affected so far. The San Francisco-based app and website hosting company initially said its internal systems were breached after an employee downloaded an app made by software startup Context AI, which hackers abused to gain access to the employee's work account, and subsequently, Vercel's systems. The new update suggests the data breach may be larger in scope and could have lasted longer than initially thought. In a post on X, Vercel CEO Guillermo Rauch confirmed that the hackers who compromised Vercel have been active "beyond that startup's compromise," referring to Context AI, which confirmed an earlier breach of its systems in a post this week. A Vercel spokesperson declined to comment beyond the update on the incident page. They would neither confirm how many customers the breach now affects, nor say how far the second compromise dates back. Vercel has not yet confirmed how the hackers broke into its systems, but Rauch pointed to early signs that the hackers relied on malware that compromises computers "in search of valuable tokens like keys to Vercel accounts and other providers." Rauch may be referring to information stealing malware, or infostealers, which often masquerade as legitimate software. When installed, the malware collects and uploads sensitive secrets from the victim's computer, including passwords and other private keys, allowing hackers to enter any system that those keys allow access to. "Once the attacker gets ahold of those keys, our logs show a repeated pattern: rapid and comprehensive API usage, with a focus on enumeration of non-sensitive environment variables," said Rauch. The hackers used the hijacked Vercel employee's account to gain access to some of the company's internal systems, including customer credentials that were not encrypted. Rauch's comments appear to add weight to earlier reporting by security researchers that a Context AI employee's computer was infected with infostealer malware after they allegedly looked up Roblox game cheats. TechCrunch reported on Thursday that embattled compliance startup Delve, accused of faking customer data, performed the security certifications for Context AI. It's not yet known how many customers are affected by the Vercel breaches and customer data thefts. Both Vercel and Context AI have suggested that the breach may affect more companies, and that more victims may come to light.

The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user. The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.

Last weekend, Vercel, the company behind Next.js and one of the most widely used deployment platforms in the world, confirmed a security breach. Hackers breached its internal systems. They walked out with API keys, source code, and employee records. A threat actor has listed the stolen data on BreachForums for $2 million. If you host anything on Vercel, this is your problem too. If you've built on Lovable, it's actually worse. I've been through a major security breach before. At Evernote, we had to reset over 50 million user accounts in one bad weekend. What I learned is that the founders who survive these moments are the ones who had already thought about it once, before anything happened. Most hadn't. Here's what you need to understand about both incidents and what to do when you find yourself facing a secruity threat.

The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user. The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.

Web infrastructure platform Vercel has disclosed a significant security incident involving unauthorized access to internal systems, tracing the attack chain back to a compromise of Context.ai, a third-party AI productivity tool used by one of its employees. Vercel first published its security bulletin on April 19, 2026, confirming that an attacker successfully gained a foothold in its internal environment by exploiting a compromised Google Workspace OAuth application belonging to Context.ai. The attacker leveraged that access to hijack an individual Vercel employee's Google Workspace account, subsequently pivoting into Vercel's internal environment to enumerate and decrypt non-sensitive environment variables. The incident follows what analysts are calling a textbook OAuth supply chain attack. Context.ai, which builds AI evaluation and analytics tools, has integrated its "Office Suite" consumer app with Google Workspace via OAuth. A Lumma Stealer malware infection on a Context.ai employee's machine in February 2026 resulted in OAuth tokens being collected by the threat actor in March, which were later weaponized to access Vercel's corporate environment. Vercel Confirms Security Breach Security firm OX Security noted the intrusion began when the Vercel employee installed the Context.ai browser extension and signed in using their enterprise Google account with broad "Allow All" permissions. Vercel initially identified a limited subset of customers whose non-sensitive environment variables, including API keys, tokens, database credentials, and signing keys, were compromised and reached out to those customers immediately for credential rotation. Following an expanded investigation, the company uncovered two additional findings: a small number of additional accounts compromised in this incident, and a separate set of customer accounts showing evidence of prior, independent compromise potentially stemming from social engineering or malware. Critically, environment variables marked as "sensitive" in Vercel, which are stored in an encrypted, non-readable format, show no evidence of being accessed. Vercel CEO Guillermo Rauch described the attacker as "highly sophisticated" based on their operational velocity and in-depth knowledge of Vercel's product API surface. A threat actor operating under the ShinyHunters persona has since claimed responsibility, reportedly attempting to sell stolen data, including internal databases, source code, and employee records, for $2 million on underground cybercriminal forums. Vercel stated it has received no ransom communication from the threat actor. In collaboration with GitHub, Microsoft, npm, and Socket, Vercel's security team confirmed that no Vercel-published npm packages have been compromised and that the software supply chain remains intact. Vercel is urging all customers to take the following steps immediately: * Rotate all non-sensitive environment variables (API keys, tokens, database credentials, signing keys) -- deleting a project or account is not sufficient to eliminate risk * Enable multi-factor authentication using an authenticator app or passkey * Mark future secrets as "sensitive" to prevent them from being readable via the dashboard * Review activity logs in the Vercel dashboard or CLI for suspicious behavior * Audit recent deployments for unexpected or unauthorized activity and ensure Deployment Protection is set to Standard at a minimum Vercel has published one Indicator of Compromise (IOC) to assist the wider security community: the OAuth App Client ID . Google Workspace administrators are advised to check for usage of this OAuth application immediately, as Context.ai's compromise potentially affected hundreds of users across multiple organizations. Vercel has engaged Google Mandiant and additional cybersecurity firms to assist with investigation and remediation, and the company says it is actively shipping product enhancements, including stronger environment variable management defaults and improved security oversight tooling.

The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user. The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.

Vercel CEO Guillermo Rauch, in an update today said that after scanning through petabytes of logs of the company's networks and APIs, his security team concluded that the threat actor behind the Vercel breach had been active well beyond Context.ai's compromise. Rauch said that the "threat intel points to the distribution of malware to computers in search of valuable tokens like keys to Vercel accounts and other providers. Once the attacker gets ahold of those keys, our logs show a repeated pattern: rapid and comprehensive API usage, with a focus on enumeration of non-sensitive environment variables." Researchers at Hudson Rock had earlier confirmed that the attack actually initiated in February itself when a Context.ai employee's computer was infected with Lumma Stealer malware after they searched for Roblox game exploits, a common vector for infostealer deployments. What the latest findings mean is that there could be a wider net of victims that the threat actor may have phished for and what we know is just the tip of the iceberg - or not. In an official update, the company also stated that initially it identified a limited subset of customers whose non-sensitive environment variables stored on Vercel were compromised. However, a deeper assessment of the their network, as well as environment variable read events in the company's logs uncovered two additional findings. "First, we have identified a small number of additional accounts that were compromised as part of this incident," the company noted. But the main concern is the next finding: "Second, we have uncovered a small number of customer accounts with evidence of prior compromise that is independent of and predates this incident, potentially as a result of social engineering, malware, or other methods." The company did not disclose who were the attackers, what was the motive, or the impact on customers, and is yet to respond to these queries from The Cyber Express. It only stated: "In both cases, we have notified the affected customers." Meanwhile, Rauch said, Vercel had notified other suspected victims and encouraged them to rotate credentials and adopt best practices.

One employee, one bad download, and one cyber incident later, a $2 million ransom listing was tied to a chain that began with a Roblox cheat search and ended inside Vercel's internal systems. The immediate shock is not the malware itself, but how quickly a private browsing mistake in February 2026 became a platform-level exposure. Verified fact: Hudson Rock researchers reverse-engineered the victim's browser history and found the employee at Context. ai had been searching for and downloading "auto-farm" scripts and game exploit executors. One of those downloads contained Lumma Stealer, which silently harvested browser-saved credentials, API keys, session cookies, and OAuth tokens. Informed analysis: The scale of the aftermath shows that the real weakness was not just infected software, but the trust placed in connected accounts and broad permissions. What does this cyber incident reveal about the first point of failure? The central question is not how a Roblox cheat got onto a machine. It is why a single browser session could open a path from a small AI startup to one of the most important cloud development platforms. The context given here is narrow, but it is enough to show a layered chain of access: a browser infection, a credential harvest, a dormant database of stolen login material, and then a takeover that reached into enterprise systems. Hudson Rock's reconstruction places the origin in February 2026, when the employee was searching for game exploit tools. Lumma Stealer then collected whatever the browser had stored, including Google Workspace logins and OAuth tokens. Those credentials remained in a database for two months before someone noticed the email address belonged to a core engineer at Context. ai. That sequence matters because it turns a personal mistake into an organizational breach only after a delay. How did OAuth permissions turn into the bridge into Vercel? On April 19, 2026, Vercel confirmed that an attacker had used the stolen credentials to breach Context. ai, steal the OAuth tokens of its customers, and move into the Google Workspace of a Vercel employee who had signed up for Context. ai's product. That employee had granted "Allow All" permissions on their enterprise account. The permissions box, as described in the context, requested broad read access to the user's entire Google Workspace environment, including Drive. This is the critical hinge in the story. The attacker did not need to break into Vercel directly. They moved through a third-party AI tool already trusted by one employee. Once the attacker had that foothold, they entered Vercel's internal systems and took customer environment variables that had not been flagged as sensitive. Vercel's own statement framed the event as originating from "a small, third-party AI tool" whose Google Workspace OAuth app was caught in a broader compromise. Verified fact: a threat actor then listed what they claimed was Vercel's internal database for sale on BreachForums at $2 million. Informed analysis: The ransom figure signals that the value in this case was not just stolen access, but the perceived reach of the compromised data and accounts. Who is implicated, and who appears to benefit from the chain of trust? The context points to several parties in the chain. Context. ai is implicated because its OAuth app and infrastructure were part of the compromise. The employee at Vercel is implicated only in the sense that they accepted broad permissions on a work account, which became the bridge into deeper systems. Vercel is implicated because its internal systems held customer environment variables that were not flagged as sensitive, creating an exposure path once the attacker reached inside. What benefits from this structure is the attacker, who only needed one infected browser and one permissive grant. What also benefits, in a more systemic sense, are the hidden assumptions embedded in workplace software: that a trusted tool remains safe, that a login is isolated, and that broad access will not be abused. This cyber incident shows how those assumptions can fail together. There is also a broader lesson embedded in the way the breach unfolded. The malware did not target Vercel first. It harvested credentials from a small startup employee, waited, and then enabled lateral movement through a chain of software trust. That means the attack surface was not a single company's perimeter, but the permissions relationships between companies, employees, and their cloud accounts. What should the public understand about the real risk now? The facts here support a careful but firm conclusion: the breach was not only about stolen credentials, and not only about one employee's mistake. It was about how broad OAuth permissions, third-party AI tools, and stored browser credentials can combine into a single operational failure. Once the attacker obtained Context. ai credentials, the path to Vercel did not require a dramatic exploit. It required trust already granted. Verified fact: Vercel confirmed that customer environment variables were lifted and that the incident originated from a small third-party AI tool whose Google Workspace OAuth app was compromised. Informed analysis: If that is the model, then the accountability question is no longer limited to malware removal. It extends to permission design, customer data handling, and the default settings that let a broad grant become an enterprise doorway. The public should read this as a warning about the hidden cost of convenience. A cyber incident that started with a Roblox cheat download became a test of how much trust organizations place in browser sessions, connected apps, and broad access to work accounts. The lesson is plain: the weakest link may not be the company under attack, but the quiet permission granted long before the attack reached it. That is the real meaning of this cyber incident.

A supply chain attack originating from a third-party AI assistant has exposed customer credentials at one of the web's most critical infrastructure providers -- and no one saw it coming. On the morning of April 19, 2026, engineers across the internet refreshed their dashboards to find an unsettling message from Vercel the cloud deployment platform that quietly underpins millions of websites, serverless functions, and frontend applications. The company had been breached. Hackers had found their way inside not through some zero-day exploit or brute-force attack against Vercel's own perimeter, but through something far more mundane and far more dangerous: a single employee's AI productivity tool. In less than 48 hours, a forum post on BreachForums claimed access to Vercel's source code, API keys, GitHub tokens, and NPM tokens enough, the threat actor boasted, to mount "the largest supply chain attack ever." The asking price: $2 million in Bitcoin. This is the full story of how it happened, why it matters, and what every developer should do right now. What is Vercel, and Why Should You Care? If you have deployed a React app, a Next.js site, or virtually any modern JavaScript frontend in the last few years, there is a very good chance you have used Vercel. The company was founded in 2015, originally as ZEIT, and has since become the dominant platform for frontend deployment a cloud layer sitting between your code repository and the open internet. Vercel is the official steward of Next.js, the React framework with over 520 million NPM downloads in 2025 alone. It runs serverless functions, edge compute, CI/CD pipelines, and preview deployments for companies ranging from scrappy startups to...

Cloud development platform Vercel has confirmed a security incident involving unauthorized access to parts of its internal systems, following a breach disclosed in April 2026. In an official security bulletin, the company stated: "We've identified a security incident that involved unauthorized access to certain internal Vercel systems." Vercel added that it is "actively investigating" the incident, has engaged incident response experts, and notified law enforcement [...]

The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user. The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.

Cloud development platform Vercel confirmed a security breach after an employee's Google Workspace account was compromised via a third-party AI vulnerability. Attackers gained unauthorized access to internal systems, targeting non-sensitive environment variables. The data, including source code and API keys, is reportedly being sold for $2 million. American cloud development platform Vercel on Sunday confirmed a security breach allowing an attacker to gain unauthorised access to data for a "limited subset of customers". "We've identified a security incident that involved unauthorized access to certain internal Vercel systems. We are actively investigating, and we have engaged incident response experts to help investigate and remediate. We have notified law enforcement," the company wrote in a blogpost. What was the data breach about? The data breach occurred after a employee's Google Workspace account was compromised via a vulnerability at the third-party AI platform Context.ai. Vercel CEO Guillermo Rauch confirmed that hackers exploited this foothold to infiltrate internal systems with "surprising speed", suggesting the attackers likely used AI-driven tools to navigate the company's infrastructure and identify technical vulnerabilities. The intruders specifically targeted environment variables, focusing on those marked as 'non-sensitive,' a convenience feature now undergoing a rigorous security review. Although Vercel emphasises that sensitive data remained encrypted at rest and that the impact was limited to a small number of customers, the fallout has escalated into a high-stakes extortion attempt. The threat actor, identified by some as the group ShinyHunters, listed Vercel's data for sale on BreachForums for $2 million. The hackers claim to have exfiltrated source code, internal databases, and API keys. "Vercel stores all customer environment variables fully encrypted at rest. We have numerous defense-in-depth mechanisms to protect core systems and customer data. We do have a capability however to designate environment variables as "non-sensitive". Unfortunately, the attacker got further access through their enumeration," CEO Rauch wrote in a post on X. Per The Information, last September, Vercel raised $300 million at a $9.3 billion valuation. How is Vercel currently tackling the breach? The company is prioritising investigation, customer communication, tightening security, and cleaning affected systems. Vercel has confirmed that core tools and projects such as Next.js and Turbopack remain secure and uncompromised. Vercel has partnered with Google's Mandiant team and law enforcement to investigate the full scope of the breach. The company has already begun rolling out new safeguards, specifically enhancing the visibility and control of environment variables within its dashboard. Rauch has committed to transforming this incident into a catalyst for the 'strongest security response possible' for the platform. "At the moment, we believe the number of customers with security impact to be quite limited. All of our focus right now is on investigation, communication to customers, enhancement of security measures, and sanitisation of our environments. We've deployed extensive protection measures and monitoring," Rauch added in his post. Further, Vercel has directly contacted affected individuals, advising them to immediately change their sensitive credentials, such as passwords and API keys, and monitor access logs to check if attackers have already accessed these keys and prevent further unauthorised activity.
Vercel, a Web3 infrastructure provider, has finally provided a breather to the crypto community as it announced that no Node Package Manager (npm) package was affected in the attack. For context, npm is like an app store for code, facilitating speedy development by enabling managing and reusing code instead of redoing everything. The confirmation on this was made by the Vercel security team in collaboration with GitHub, Microsoft, npm, and Socket. This disclosure comes on the heels of a bunch of Vercel's customers credentials getting attacked as the hacker got access to customers's API keys. Though the attack was initially aimed at the Context.ai. The "keys" (OAuth tokens), however, attached to the AI tool gave the attacker access to the employee's Google Workspace. And Vercel, being one of the organizations of the OAuth app, got dragged in. Despite npm being safe from getting attacked, Vercel didn't have a laid-back attitude. The Web3 infrastructure provider went ahead and added another layer of security with a minimum 2-step authentication method. The first was an authenticator app configuration, and the other was initiating a passkey. The Vercel team also noted, Deleting your Vercel projects or account is not sufficient to eliminate risk. Instead, they recommend reviewing and rotating unmasked "sensitive" environment variables. Additionally, the Vercel security team also urged customers to review and investigate the activity log. Applauding his team's move, Vercel's CEO Guillermo Rauch noted, Though everything looks clean on the surface, an important question pops up -- how, despite such a kind of attack, was nothing compromised? Notably, there were screenshots circulating on X concerning Vercel striking a deal to sell their company's internal database in return for $2 million USD. However, it's still unknown whether it was actually Vercel or the hacker who was manipulating the customers. This is because in another screenshot, Vercel clearly asked the exploiter to stop texting its employees. In conclusion, despite getting access to Google Workspace, the attacker was only able to majorly access non-sensitive variables, which were nothing but useless text. Lastly, the wrongdoer also couldn't rewrite the actual source code hosted on GitHub or GitLab. Hence, despite the attack, no major loss was incurred.

One employee at Vercel adopted an AI tool. One employee at that AI vendor got hit with an infostealer. That combination created a walk-in path to Vercel's production environments through an OAuth grant that nobody had reviewed.Vercel, the cloud platform behind Next.js and its millions of weekly npm downloads, confirmed on Sunday that attackers gained unauthorized access to internal systems. Mandiant was brought in. Law enforcement was notified. Investigations remain active. An update on Monday confirmed that Vercel collaborated with GitHub, Microsoft, npm, and Socket to verify that no Vercel npm packages were compromised. Vercel also announced it is now defaulting environment variable creation to "sensitive." Next.js, Turbopack, AI SDK, and all Vercel-published npm packages remain uncompromised after a coordinated audit with GitHub, Microsoft, npm, and Socket.Context.ai was the entry point. OX Security's analysis found that a Vercel employee installed the Context.ai browser extension and signed into it using a corporate Google Workspace account, granting broad OAuth permissions. When Context.ai was breached, the attacker inherited that employee's Workspace access, pivoted into Vercel environments, and escalated privileges by sifting through environment variables not marked as "sensitive." Vercel's bulletin states that variables marked sensitive are stored in a manner that prevents them from being read. Variables without that designation were accessible in plaintext through the dashboard and API, and the attacker used them as the escalation path.CEO Guillermo Rauch described the attacker as "highly sophisticated and, I strongly suspect, significantly accelerated by AI." Jaime Blasco, CTO of Nudge Security, independently surfaced a second OAuth grant tied to Context.ai's Chrome extension, matching the client ID from Vercel's published IOC to Context.ai's Google account before Rauch's public ...

One employee at Vercel adopted an AI tool. One employee at that AI vendor got hit with an infostealer. That combination created a walk-in path to Vercel's production environments through an OAuth grant that nobody had reviewed. Vercel, the cloud platform behind Next.js and its millions of weekly npm downloads, confirmed on Sunday that attackers gained unauthorized access to internal systems. Mandiant was brought in. Law enforcement was notified. Investigations remain active. An update on Monday confirmed that Vercel collaborated with GitHub, Microsoft, npm, and Socket to verify that no Vercel npm packages were compromised. Vercel also announced it is now defaulting environment variable creation to "sensitive." Next.js, Turbopack, AI SDK, and all Vercel-published npm packages remain uncompromised after a coordinated audit with GitHub, Microsoft, npm, and Socket. Context.ai was the entry point. OX Security's analysis found that a Vercel employee installed the Context.ai browser extension and signed into it using a corporate Google Workspace account, granting broad OAuth permissions. When Context.ai was breached, the attacker inherited that employee's Workspace access, pivoted into Vercel environments, and escalated privileges by sifting through environment variables not marked as "sensitive." Vercel's bulletin states that variables marked sensitive are stored in a manner that prevents them from being read. Variables without that designation were accessible in plaintext through the dashboard and API, and the attacker used them as the escalation path. CEO Guillermo Rauch described the attacker as "highly sophisticated and, I strongly suspect, significantly accelerated by AI." Jaime Blasco, CTO of Nudge Security, independently surfaced a second OAuth grant tied to Context.ai's Chrome extension, matching the client ID from Vercel's published IOC to Context.ai's Google account before Rauch's public statement. The Hacker News reported that Google removed Context.ai's Chrome extension from the Chrome Web Store on March 27. Per The Hacker News and Nudge Security, that extension embedded a second OAuth grant enabling read access to users' Google Drive files. Patient zero. A Roblox cheat and a Lumma Stealer infection Hudson Rock published forensic evidence on Monday, reporting that the breach origin traces to a February 2026 Lumma Stealer infection on a Context.ai employee's machine. According to Hudson Rock, browser history showed the employee downloading Roblox auto-farm scripts and game exploit executors. Harvested credentials included Google Workspace logins, Supabase keys, Datadog tokens, Authkit credentials, and the [email protected] account. Hudson Rock identified the infected user as a core member of "context-inc," Context.ai's tenant on the Vercel platform, with administrative access to production environment variable dashboards. Context.ai published its own bulletin on Sunday (updated Monday), disclosing that the breach affects its deprecated AI Office Suite consumer product, not its enterprise Bedrock offering (Context.ai's agent infrastructure product, unrelated to AWS Bedrock). Context.ai says it detected unauthorized access to its AWS environment in March, hired CrowdStrike to investigate, and shut down the environment. Its updated bulletin then disclosed that the scope was broader than initially understood: the attacker also compromised OAuth tokens for consumer users, and one of those tokens opened the door to Vercel's Google Workspace. Dwell time is the detail that should concern security directors. Nearly a month separated Context.ai's March detection from the Vercel disclosure on Sunday. A separate Trend Micro analysis references an intrusion beginning as early as June 2024 -- a finding that, if confirmed, would extend the dwell time to roughly 22 months. VentureBeat could not independently reconcile that timeline with Hudson Rock's February 2026 dating; Trend Micro did not respond to a request for comment before publication. Where detection goes blind Security directors can use this table to benchmark their own detection stack against the four-hop kill chain this breach exploited. What's confirmed vs. what's claimed Vercel's bulletin confirms unauthorized access to internal systems, a limited subset of affected customers, and two IOCs tied to Context.ai's Google Workspace OAuth apps. Rauch confirmed that Next.js, Turbopack, and Vercel's open-source projects are unaffected. Separately, a threat actor using the ShinyHunters name posted on BreachForums claiming to hold Vercel's internal database, employee accounts, and GitHub and NPM tokens, with a $2M asking price. Austin Larsen, principal threat analyst at Google Threat Intelligence, assessed the claimant as "likely an imposter." Actors previously linked to ShinyHunters have denied involvement. None of these claims has been independently verified. Six governance failures the Vercel breach exposed 1. AI tool OAuth scopes go unaudited. Context.ai's own bulletin states that a Vercel employee granted "Allow All" permissions using a corporate account. Most security teams have no inventory of which AI tools their employees have granted OAuth access to. CrowdStrike CTO Elia Zaitsev put it bluntly at RSAC 2026: "Don't give an agent access to everything just because you're lazy. Give it access to only what it needs to get the job done." Jeff Pollard, VP and principal analyst at Forrester, told Cybersecurity Dive that the attack is a reminder about third-party risk management concerns and AI tool permissions. 2. Environment variable classification is doing real security work. Vercel distinguishes between variables marked "sensitive" (stored in a manner that prevents reading) and those without that designation (accessible in plaintext through the dashboard and API). Attackers used the accessible variables as the escalation path. A developer convenience toggle determined the blast radius. Vercel has since changed its default: new environment variables now default to sensitive. "Modern controls get deployed, but if legacy tokens or keys aren't retired, the system quietly favors them," Merritt Baer, CSO at Enkrypt AI and former Deputy CISO at AWS, told VentureBeat. 3. Infostealer-to-SaaS-to-supply-chain escalation chains lack detection coverage. Hudson Rock's reporting reveals a kill chain that crossed four organizational boundaries. No single detection layer covers that chain. Context.ai's updated bulletin acknowledged that the scope extended beyond what was initially identified during its CrowdStrike-led investigation. 4. Dwell time between vendor detection and customer notification exceeds attacker timelines. Context.ai detected the AWS compromise in March. Vercel disclosed on Sunday. Every CISO should ask their vendors: what is your contractual notification window after detecting unauthorized access that could affect downstream customers? 5. Third-party AI tools are the new shadow IT. Vercel's bulletin describes Context.ai as "a small, third-party AI tool." Grip Security's March 2026 analysis of 23,000 SaaS environments found a 490% year-over-year increase in AI-related attacks. Vercel is the latest enterprise to learn this the hard way. 6. AI-accelerated attackers compress response timelines. Rauch's assessment of AI acceleration comes from what his IR team observed. CrowdStrike's 2026 Global Threat Report puts the baseline at a 29-minute average eCrime breakout time, 65% faster than 2024. Security director action plan Run both IoC checks today Search your Google Workspace admin console (Security > API Controls > Manage Third-Party App Access) for two OAuth App IDs. The first is 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com, tied to Context.ai's Office Suite. The second is 110671459871-f3cq3okebd3jcg1lllmroqejdbka8cqq.apps.googleusercontent.com, tied to Context.ai's Chrome extension and granting Google Drive read access. If either touched your environment, you are in the blast radius regardless of what Vercel discloses next. What this means for security directors Forget the Vercel brand name for a moment. What happened here is the first major proof case that AI agent OAuth integrations create a breach class that most enterprise security programs cannot detect, scope, or contain. A Roblox cheat download in February led to production infrastructure access in April. Four organizational boundaries, two cloud providers, and one identity perimeter. No zero-day required. For most enterprises, employees have connected AI tools to corporate Google Workspace, Microsoft 365 or Slack instances with broad OAuth scopes -- without security teams knowing. The Vercel breach is the case study for what that exposure looks like when an attacker finds it first.
