PROBABLYPWNED
Data BreachesApril 19, 20264 min read

Vercel Breach Traced to Compromised Third-Party OAuth App

Hackers demand $2M after accessing Vercel internal systems via compromised AI tool. Company urges credential rotation as data surfaces on BreachForums.

Sarah Mitchell

Vercel disclosed a security incident today after threat actors claimed to have breached the popular cloud hosting platform and begun selling stolen data. The company traced the intrusion to a compromised third-party AI tool whose Google Workspace OAuth integration was exploited to gain unauthorized access.

A threat actor claiming to be part of the ShinyHunters extortion gang posted samples on BreachForums, demanding $2 million for the complete dataset. However, individuals associated with recent ShinyHunters operations have denied involvement in this particular breach to BleepingComputer, raising questions about the attacker's actual identity.

What Was Stolen

According to the attacker's claims and Vercel's disclosure, the breach exposed:

  • Access keys and API credentials: Including NPM and GitHub tokens stored in Vercel environments
  • Source code: Internal repositories and deployment configurations
  • Employee records: 580 entries containing names, Vercel email addresses, account status, and activity timestamps
  • Internal system data: Information from Vercel's Linear project management and user management systems
  • Database access: Unspecified internal database contents

Vercel stated that "a limited subset of customers" was impacted and the company is engaging with affected users directly. Services remain fully operational.

The OAuth Attack Vector

The root cause marks a troubling trend in supply chain compromises. According to Vercel's security bulletin, attackers compromised "a third-party AI tool with hundreds of users whose Google Workspace OAuth app was compromised."

This attack pattern—exploiting trusted integrations rather than targeting the primary victim directly—mirrors the ShinyHunters supply chain attack on Anodot that compromised multiple Snowflake customers earlier this month. In both cases, attackers leveraged legitimate third-party access to bypass security controls that would have detected direct intrusion attempts.

Vercel published one indicator of compromise for organizations to check immediately:

  • OAuth App ID: 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com

Google Workspace administrators should audit their authorized applications for this identifier and revoke access if found.

Ransom Negotiations Claimed

The threat actor claimed in Telegram messages, shared by BleepingComputer, that they had been in contact with Vercel regarding a $2 million ransom demand. The legitimacy of these communications couldn't be independently verified.

If the ShinyHunters attribution is accurate—even if the specific individual isn't part of the core group—the demand aligns with the gang's established playbook. ShinyHunters recently breached Rockstar Games through the same Anodot compromise, demanding payment to prevent leaking GTA 6 development data. The group has successfully extorted AT&T, Ticketmaster, and Microsoft in the past.

The denial from known ShinyHunters operators could indicate a copycat using the notorious name for credibility, or internal fragmentation within the loosely organized collective.

Why This Matters for Developers

Vercel hosts deployments for millions of developers and enterprises using Next.js, React, and other JavaScript frameworks. The platform's environment variables often contain production database credentials, API keys, payment processor tokens, and other secrets that would grant attackers access to downstream systems.

The disclosure specifically noted that environment variables marked as "sensitive" receive additional protection—but variables not explicitly flagged may have been exposed. This distinction is critical because many developers store secrets in environment variables without understanding the security implications of different storage tiers.

Organizations with Vercel deployments should:

  1. Review activity logs immediately for suspicious behavior
  2. Rotate all environment variables regardless of sensitivity marking
  3. Audit OAuth integrations connected to development workflows
  4. Check for the published OAuth App ID in Google Workspace
  5. Monitor for credential abuse on GitHub, NPM, and connected services

For organizations unfamiliar with how breaches propagate through credential theft, our data breach fundamentals guide explains common attack chains and post-incident response procedures.

Third-Party AI Tools Under Scrutiny

The compromise of a third-party AI tool raises broader questions about the security of the rapidly proliferating ecosystem of AI-powered developer tools. Many of these tools request OAuth access to GitHub, Google Workspace, Slack, and other platforms to provide their functionality—but their own security practices vary widely.

The attack surface expands every time a development team authorizes a new AI coding assistant, documentation tool, or workflow automation. Each integration creates a potential pivot point for attackers who compromise the tool's infrastructure.

Vercel stated it has engaged incident response experts and notified law enforcement. The company will provide updates as the investigation continues.


Vercel customers can contact support through vercel.com/help for technical assistance with credential rotation.

Related Articles