Vercel Breach Traced to Compromised Third-Party OAuth App
Hackers demand $2M after accessing Vercel internal systems via compromised AI tool. Company urges credential rotation as data surfaces on BreachForums.
Vercel disclosed a security incident today after threat actors claimed to have breached the popular cloud hosting platform and begun selling stolen data. The company traced the intrusion to a compromised third-party AI tool whose Google Workspace OAuth integration was exploited to gain unauthorized access.
A threat actor claiming to be part of the ShinyHunters extortion gang posted samples on BreachForums, demanding $2 million for the complete dataset. However, individuals associated with recent ShinyHunters operations have denied involvement in this particular breach to BleepingComputer, raising questions about the attacker's actual identity.
What Was Stolen
According to the attacker's claims and Vercel's disclosure, the breach exposed:
- Access keys and API credentials: Including NPM and GitHub tokens stored in Vercel environments
- Source code: Internal repositories and deployment configurations
- Employee records: 580 entries containing names, Vercel email addresses, account status, and activity timestamps
- Internal system data: Information from Vercel's Linear project management and user management systems
- Database access: Unspecified internal database contents
Vercel stated that "a limited subset of customers" was impacted and the company is engaging with affected users directly. Services remain fully operational.
The OAuth Attack Vector
The root cause marks a troubling trend in supply chain compromises. According to Vercel's security bulletin, attackers compromised "a third-party AI tool with hundreds of users whose Google Workspace OAuth app was compromised."
This attack pattern—exploiting trusted integrations rather than targeting the primary victim directly—mirrors the ShinyHunters supply chain attack on Anodot that compromised multiple Snowflake customers earlier this month. In both cases, attackers leveraged legitimate third-party access to bypass security controls that would have detected direct intrusion attempts.
Vercel published one indicator of compromise for organizations to check immediately:
- OAuth App ID:
110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com
Google Workspace administrators should audit their authorized applications for this identifier and revoke access if found.
Ransom Negotiations Claimed
The threat actor claimed in Telegram messages, shared by BleepingComputer, that they had been in contact with Vercel regarding a $2 million ransom demand. The legitimacy of these communications couldn't be independently verified.
If the ShinyHunters attribution is accurate—even if the specific individual isn't part of the core group—the demand aligns with the gang's established playbook. ShinyHunters recently breached Rockstar Games through the same Anodot compromise, demanding payment to prevent leaking GTA 6 development data. The group has successfully extorted AT&T, Ticketmaster, and Microsoft in the past.
The denial from known ShinyHunters operators could indicate a copycat using the notorious name for credibility, or internal fragmentation within the loosely organized collective.
Why This Matters for Developers
Vercel hosts deployments for millions of developers and enterprises using Next.js, React, and other JavaScript frameworks. The platform's environment variables often contain production database credentials, API keys, payment processor tokens, and other secrets that would grant attackers access to downstream systems.
The disclosure specifically noted that environment variables marked as "sensitive" receive additional protection—but variables not explicitly flagged may have been exposed. This distinction is critical because many developers store secrets in environment variables without understanding the security implications of different storage tiers.
Organizations with Vercel deployments should:
- Review activity logs immediately for suspicious behavior
- Rotate all environment variables regardless of sensitivity marking
- Audit OAuth integrations connected to development workflows
- Check for the published OAuth App ID in Google Workspace
- Monitor for credential abuse on GitHub, NPM, and connected services
For organizations unfamiliar with how breaches propagate through credential theft, our data breach fundamentals guide explains common attack chains and post-incident response procedures.
Third-Party AI Tools Under Scrutiny
The compromise of a third-party AI tool raises broader questions about the security of the rapidly proliferating ecosystem of AI-powered developer tools. Many of these tools request OAuth access to GitHub, Google Workspace, Slack, and other platforms to provide their functionality—but their own security practices vary widely.
The attack surface expands every time a development team authorizes a new AI coding assistant, documentation tool, or workflow automation. Each integration creates a potential pivot point for attackers who compromise the tool's infrastructure.
Vercel stated it has engaged incident response experts and notified law enforcement. The company will provide updates as the investigation continues.
Vercel customers can contact support through vercel.com/help for technical assistance with credential rotation.
Related Articles
ShinyHunters Breach Anodot, Steal Data From Snowflake Customers
ShinyHunters compromised SaaS analytics provider Anodot, using stolen authentication tokens to access and exfiltrate data from dozens of Snowflake customers.
Apr 10, 2026Grubhub Hit by Second Breach, ShinyHunters Demanding Ransom
Food delivery giant confirms hackers stole data and are now extorting the company. Attack traced to credentials stolen in August 2025 Salesloft breach.
Jan 16, 2026ShinyHunters Breaches Rockstar Games via Anodot Token Theft
GTA 6 developer Rockstar Games confirms third-party breach after ShinyHunters stole Snowflake credentials through Anodot. Ransom deadline set for April 14.
Apr 12, 2026Hims & Hers Discloses Breach After Zendesk System Compromise
Telehealth company Hims & Hers reveals data breach affecting customer support tickets. ShinyHunters gang exploited Okta SSO to access Zendesk platform.
Apr 5, 2026