Web infrastructure provider Vercel recently disclosed a security breach involving unauthorized access to internal systems, which originated from a compromised third-party artificial intelligence tool used by an employee.
Key Points
- The breach occurred after an attacker compromised a Context.ai account, allowing them to hijack an employee's Vercel Google Workspace credentials.
- Unauthorized actors gained access to non-sensitive environment variables and internal Vercel systems following the initial account takeover.
- Context.ai previously reported a separate March 2026 incident involving unauthorized access to its AWS environment and the potential compromise of consumer OAuth tokens.
- Security researchers at Hudson Rock linked the escalation to a February 2026 infection of a Context.ai employee by the Lumma Stealer malware.
- The threat actor persona "ShinyHunters" has claimed responsibility for the Vercel incident, though official confirmation of the perpetrator remains pending.