AUTO-UPDATED

⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

Web infrastructure provider Vercel recently disclosed a security breach involving unauthorized access to internal systems, which originated from a compromised third-party artificial intelligence tool used by an employee.

Key Points

  • The breach occurred after an attacker compromised a Context.ai account, allowing them to hijack an employee's Vercel Google Workspace credentials.
  • Unauthorized actors gained access to non-sensitive environment variables and internal Vercel systems following the initial account takeover.
  • Context.ai previously reported a separate March 2026 incident involving unauthorized access to its AWS environment and the potential compromise of consumer OAuth tokens.
  • Security researchers at Hudson Rock linked the escalation to a February 2026 infection of a Context.ai employee by the Lumma Stealer malware.
  • The threat actor persona "ShinyHunters" has claimed responsibility for the Vercel incident, though official confirmation of the perpetrator remains pending.

Why it Matters

This incident highlights the growing risk of supply-chain attacks where third-party AI tools serve as a gateway into secure corporate environments. It underscores the necessity for organizations to strictly manage third-party integrations and enforce robust identity verification to prevent lateral movement from compromised external accounts.
Internet Published by info@thehackernews.com (The Hacker News)
Read original