Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

April 22, 2026

NCSC Unveils SilentGlass Device to Protect Monitors from Cyber-Attacks

April 22, 2026

MacOS Native Tools Enable Stealthy Enterprise Attacks

April 22, 2026
Facebook X (Twitter) Instagram
Wednesday, April 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Vercel Confirms Cyber Incident – Infosecurity Magazine
News

Vercel Confirms Cyber Incident – Infosecurity Magazine

Team-CWDBy Team-CWDApril 21, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Next.js developer Vercel has confirmed a cyber-incident  conducted by a “highly sophisticated” attacker which may have resulted in threat actors getting hold of sensitive internal data.

The US firm, which provides developer tools and cloud infrastructure, said in an updated April 21 notice that the unauthorized access originated from an employee’s use of a third-party tool, Context.ai.

“The attacker used that access to take over the employee’s Vercel Google Workspace account, which enabled them to gain access to some Vercel environments and environment variables that were not marked as sensitive,” it added.

“Environment variables marked as ‘sensitive’ in Vercel are stored in a manner that prevents them from being read, and we currently do not have evidence that those values were accessed.”

Read more on Vercel: NCSC Urges Users to Patch Next.js Flaw Immediately

Vercel claimed that the attacker was “highly sophisticated based on their operational velocity and detailed understanding of Vercel’s systems”.

However, it confirmed that none of its npm packages were compromised and there’s no evidence of tampering, meaning projects like popular React framework Next.js are safe.

Vercel said it has already reached out to “a limited subset of customers whose non-sensitive environment variables stored on Vercel” were compromised.

According to screenshots posted to X (formerly Twitter), a threat actor purporting to be part of the ShinyHunters collective is trying to extort Vercel to the tune of $2m. They claim to have access to multiple employee accounts “with access to several internal deployments,” as well as API keys, npm/GitHub tokens, source code and databases.

Vercel Customers Urged to Follow Best Practices

As it works with Mandiant to ascertain the validity of the threat actor’s claims, Vercel has issued the following advice for customers:

  • Enable multi-factor authentication (MFA) via authenticator app or passkey
  • Review and rotate environmental variables not marked as “sensitive” as these may have been potentially exposed. They include API keys, tokens, database credentials and signing keys
  • Use the sensitive environmental variables feature to protect secret values
  • Review activity log for suspicious activity
  • Investigate suspicious or unexpected recent deployments
  • Ensure deployment protection is set to standard, at a minimum
  • Rotate deployment protection tokens

Cory Michal, CISO at AppOmni, traced the breach back to the OAuth access Context.ai provided to the Vercel employee’s Google Workspace account.

“Once a user authorizes one app, that trust can extend into email, identity, CRM, development, and other systems in ways many organizations do not fully inventory or monitor, which makes a single compromised integration a powerful pivot point,” he added.

“The key lesson is that third-party risk management cannot stop at reviewing a vendor’s SOC 2 report or penetration test results. Organizations need continuous visibility into how third-party applications are actually connected across their SaaS estate, what OAuth grants and integration tokens they hold, and how those relationships could be abused if one provider is compromised.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNorth Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware
Next Article Your MTTD Looks Great. Your Post-Alert Gap Doesn't
Team-CWD
  • Website

Related Posts

News

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

April 22, 2026
News

MacOS Native Tools Enable Stealthy Enterprise Attacks

April 22, 2026
News

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

April 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Top IRS scams to look out for in 2026

February 10, 2026

Your information is on the dark web. What happens next?

January 13, 2026

2025’s most common passwords were as predictable as ever

January 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.