Vercel CEO Says Hackers Used AI in Data Breach

icon币界网
Share
Share IconShare IconShare IconShare IconShare IconShare IconCopy
AI summary iconSummary

expand icon
Vercel CEO Guillermo Rauch confirmed a security breach involving a sophisticated group that likely used AI to accelerate the attack. The incident exposed customer credentials after a third-party AI tool was compromised. CertiK’s Natalie Newman warned that AI and crypto news now carry risks for crypto projects hosting on Vercel. Vercel has contacted affected users and strengthened its security measures.
CoinDesk reports:

The CEO of Vercel stated that a recent security incident was carried out by a “highly sophisticated” hacking group, possibly leveraging artificial intelligence, which compromised internal systems and led to the exposure of some customer credentials.

“We believe the attacking group is highly sophisticated, and I strongly suspect that AI has greatly accelerated their attacks,” said CEO Guillermo Rauch on Twitter, adding that the attackers “moved at an astonishing pace and had deep knowledge of Vercel.”

The company, a cloud platform for developers, said on Sunday that it discovered unauthorized access to some of its internal systems and is actively investigating. The incident affected some customers whose credentials were compromised, and the company advises customers to rotate their credentials immediately.

This security vulnerability originated from a third-party AI tool, Context.ai, used by a Vercel employee, which was compromised. Attackers exploited this tool to take over the employee’s Google Workspace account and gained access to certain Vercel environments and non-sensitive environment variables.

This disclosure highlights growing concerns about security risks posed by third-party integrations and AI tools, as attackers increasingly exploit supply chain vulnerabilities to infiltrate organizations.

Vercel and cryptocurrency

Natalie Newson, a senior blockchain security researcher at CertiK, told Decrypt that this incident has particularly drawn the attention of cryptocurrency developers. "Since many cryptocurrency frontends use Vercel to host their user interfaces, once compromised, attackers could embed malicious code designed to steal wallet funds. Users interacting with what appears to be a trusted page would not expect any malicious activity," she said, adding, "Vulnerabilities in the cryptocurrency space can lead to..." significant financial losses

Even though the smart contract remains secure, frontend breaches still pose a risk. “Frontend breaches are particularly harmful to end users,” she noted, emphasizing this point. In April, Niu Exchange experienced an incident in which users’ wallets were stolen of $316,000.

She said the upward trend in AI agents has led many users to release the latest applications and extensions to improve productivity, while malicious actors are also exploiting this trend. She stated, "Enterprises should exercise extra caution when using new AI applications and extensions, and review their internal security models to ensure that, even in the event of a security breach, the impact is minimized."

Rauh stated that the attack was carried out through “a series of methods,” beginning with compromised employee accounts, followed by gradual escalation to gain broader access to internal environments. Although Vercel statically encrypts customer environment variables, the company allows certain variables to be marked as non-sensitive, enabling the attackers to access them.

The company believes the number of affected customers is limited and states that it has prioritized contacting customers who may have been impacted. Vercel has since deployed additional monitoring and protection measures and reviewed its supply chain to ensure the security of projects such as Next.js and Turbopack.

Nillion CEO John Woods told Decrypt that this "limited subset" typically means the affected customer base observed so far appears limited, but this does not necessarily rule out broader internal spread or wider downstream risks. Woods said, "In modern cloud platforms, the scope of impact depends not only on how many customers are initially apparent but also on how far the compromised systems can reach in the background."

He recommended that businesses follow a series of best practices to avoid such situations: “Strengthen OAuth authorization security, adopt the principle of least privilege, enforce strict controls on sensitive environment variables, separate frontend deployment from key or signing permissions, and closely monitor deployments and logs.”

“For anyone whose credentials may have been compromised, the priority is to revoke access, rotate credentials, and review every system those credentials could have accessed,” he added, noting that “on a higher level, the lesson is to avoid architectures where a single breach could have widespread impact.”

It is currently unclear who orchestrated the attack. Screenshot A user from a hacker group called “ShinyHunters” claimed on a forum to have breached Vercel and is selling access to the company’s data, including source code, API keys, and internal systems.

The actor (who may also be impersonating ShinyHunters) claimed to have discussed a $2 million ransom demand with the company. Vercel has not yet commented.

Disclaimer: The information on this page may have been obtained from third parties and does not necessarily reflect the views or opinions of KuCoin. This content is provided for general informational purposes only, without any representation or warranty of any kind, nor shall it be construed as financial or investment advice. KuCoin shall not be liable for any errors or omissions, or for any outcomes resulting from the use of this information. Investments in digital assets can be risky. Please carefully evaluate the risks of a product and your risk tolerance based on your own financial circumstances. For more information, please refer to our Terms of Use and Risk Disclosure.