Vercel’s CEO has attributed the recent security breach, which led to some customer credentials being exposed, to a “highly sophisticated” hacking group potentially using AI. Guillermo Rauch tweeted that he suspects this group operates with significant AI assistance, highlighting their rapid and informed actions against Vercel.
In an update shared on Twitter, Rauch provided insights into the ongoing investigation of the incident. He explained that it began when a Vercel employee’s account was compromised through a breach at an AI platform called Context.ai. This allowed attackers to access the employee’s Google Workspace and some internal Vercel environments.
The company confirmed Sunday that unauthorized access had occurred in certain systems, affecting only a limited number of customers who were advised to change their credentials immediately. The incident has raised concerns about third-party integrations and AI tools’ security risks, with attackers increasingly exploiting supply chain vulnerabilities.
Natalie Newson from CertiK highlighted the urgency felt by crypto developers due to many using Vercel for hosting UIs, which could be exploited to insert malicious code like wallet drainers. She stressed that even secure smart contracts are vulnerable if front ends are compromised, referencing a recent CoW Swap incident resulting in $316k loss.
Rauch detailed the attack’s progression from an employee’s compromised account to broader internal access, noting that attackers accessed certain non-sensitive environment variables despite encryption measures for customer data at rest. Vercel believes the number of affected customers is small and has prioritized contacting those potentially impacted while enhancing security protocols across its supply chain.
John Woods of Nillion explained that a “limited subset” of affected users does not preclude broader risks, emphasizing that compromised systems might have hidden reach. He advised stringent best practices to mitigate such threats, including tightening OAuth grants, adhering to the principle of least privilege, and closely monitoring deployments.
While the attackers’ identity remains uncertain, forum posts attributed to “ShinyHunters” claim they breached Vercel, offering data for sale, including source code and API keys. They reportedly discussed a $2 million ransom with Vercel, though the company has not confirmed these claims.