Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware

May 3, 2026

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

May 3, 2026

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

May 2, 2026
Facebook X (Twitter) Instagram
Sunday, May 3
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Vercel Finds More Compromised Accounts in Context.ai-Linked Breach
News

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Team-CWDBy Team-CWDMay 2, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems.

The company said it made the discovery after expanding its investigation to include an extra set of compromise indicators, alongside a review of requests to the Vercel network and environment variable read events in its logs.

“Second, we have uncovered a small number of customer accounts with evidence of prior compromise that is independent of and predates this incident, potentially as a result of social engineering, malware, or other methods,” the company said in an update.

In both cases, Vercel said it notified affected parties. It did not disclose the exact number of customers who were impacted.

The development comes after the company that created the Next.js framework acknowledged the breach originated with a compromise of Context.ai after it was used by a Vercel employee, enabling the attacker to seize control of their Google Workspace account and then use it to gain access to their Vercel account.

“From there, they were able to pivot into a Vercel environment, and subsequently maneuvered through systems to enumerate and decrypt non-sensitive environment variables,” Vercel noted.

Further investigation by Hudson Rock has revealed that one of Context.ai employees was infected with Lumma Stealer in February 2026 after searching for Roblox auto-farm scripts and game exploit executors, indicating that this event may have been the “patient zero” that triggered the whole chain of malicious actions.

“We now understand that the threat actor has been active beyond that startup’s [referring to Context.ai] compromise,” Vercel CEO Guillermo Rauch said in an X post. “Threat intel points to the distribution of malware to computers in search of valuable tokens like keys to Vercel accounts and other providers.”

It’s unclear if Vercel employees’ use of the Context AI Office Suite was sanctioned or an instance of shadow AI, which refers to the unauthorized use of artificial intelligence (AI) tools within SaaS apps without formal IT review or vetting, exposing organizations to unintended risks. The AI Office Suite has since been deprecated by Context.ai.

“OAuth integrations are useful because they reduce friction,” Tanium said. “They’re also dangerous because they can inherit trust from the user and the organization. When attackers abuse an approved integration, they may avoid some of the controls teams rely on for direct account compromise.”

“What stands out operationally is less the volume of data exposed and more the attackers’ velocity and ability to enumerate internal environments before detection. That changes the job for defenders. The challenge shifts from prevention to rapid scoping and blast-radius reduction.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleZero-Day Flaw in Linux Kernel Found by AI-Equipped Security Researcher
Next Article China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
Team-CWD
  • Website

Related Posts

News

UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware

May 3, 2026
News

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

May 3, 2026
News

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

May 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

Children and chatbots: What parents should know

January 23, 2026

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.