AUTO-UPDATED

Smashing Security podcast #465: This developer wanted to cheat at Roblox. It cost millions

A security breach at cloud software company Vercel occurred after an employee’s malware-infected device exposed corporate credentials, highlighting the risks of overprivileged access and third-party software integrations.

Key Points

  • A Vercel employee downloaded a malicious Roblox auto-farming script, which contained the Lumma info-stealer malware.
  • The malware harvested OAuth tokens, granting attackers unauthorized access to the employee's corporate Google Workspace and Vercel’s internal systems.
  • Attackers gained access to sensitive API keys and database credentials, which were subsequently listed for sale on a dark web forum.
  • The incident underscores the danger of "configuration drift" and the lack of native rollback features for tenant-level settings in Microsoft 365 environments.
  • Security experts emphasize that overprivileged administrative accounts remain a primary target for nation-state actors and cybercriminals.

Why it Matters

This incident demonstrates how a single user's poor security hygiene can cascade into a massive corporate data breach through interconnected cloud services. It serves as a critical reminder for organizations to implement the principle of least privilege and maintain strict visibility over third-party application permissions.
Graham Cluley Security News Published by Graham Cluley
Read original