CUDA Proves Nvidia Is a Software Company
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Vercel said the fallout from an attack on its internal systems hit more customers than previously known, as ongoing analysis uncovered additional evidence of compromise.ย
The company, which makes tools and hosts cloud infrastructure for developers, maintains a โsmall numberโ of accounts were impacted, but it has yet to share a number or range of known incidents linked to the attack. Vercel created and maintains Next.js, a platform supporting AI agents thatโs downloaded more than 9 million times per week, and other popular open-source projects.ย
Vercel CEO Guillermo Rauch said the company and partners have analyzed nearly a petabyte of logs across the Vercel network and API, and learned malicious activity targeting the company and its customers extends beyond an initial attack that originated at Context.ai.ย
โThreat intel points to the distribution of malware to computers in search of valuable tokens like keys to Vercel accounts and other providers,โ Rauch said in a post on X.ย
โOnce the attacker gets ahold of those keys, our logs show a repeated pattern: rapid and comprehensive API usage, with a focus on enumeration of non-sensitive environment variables,โ he added.
The attack exemplifies the widespread and compounded risk posed by interconnected systems that rely on OAuth tokens, trusted relationships and overly privileged permissions linking multiple services together.
โThe real vulnerability was trust, not technology,โ Munish Walther-Puri, head of critical digital infrastructure at TPO Group, told CyberScoop. โOAuth turned a productivity app into a backdoor. Every AI tool an employee connects to their work account is now a potential attack surface.โ
An attacker traversed Vercelโs internal systems to steal and decrypt customer data, including environment variables it stored, posing significant downstream risk.ย
The company insists the breach originated at Context.ai, a third-party AI tool used by one of its employees. Researchers at Hudson Rock previously said the seeds of that attack were planted in February when a Context.ai employeeโs computer was infected with Lumma Stealer malware after they searched for Roblox game exploits, a common vector for infostealer deployments.ย
Vercel has not specified the systems and customers data compromised, nor has it described the threat eradicated or contained. The company said itโs found no evidence of tampering across the software packages it publishes, concluding โwe believe the supply chain remains safe.โย
The company fueled further intrigue in its updated security bulletin, noting that it also identified a separate โsmall number of customersโ that were compromised in attacks unrelated to the breach of its systems.ย
โThese compromises do not appear to have originated on Vercel systems,โ the company said. โThis activity does not appear to be a continuation or expansion of the April incident, nor does it appear to be evidence of an earlier Vercel security incident.โ
Itโs unclear how Vercel became aware of those attacks and why itโs disclosing them publicly.ย
Vercel declined to answer questions, and Mandiant, which is running incident response and an investigation into the attack, referred questions back to Vercel.ย
Vercel has not attributed the breach to any named threat group or described the attackersโ objectives.ย
An online persona identifying themselves as ShinyHunters took responsibility for the attack and is attempting to sell the stolen data, which they claim includes access keys, source code and databases. Austin Larsen, principal threat analyst at Google Threat Intelligence Group, said the attacker is โlikely an imposter,โ but emphasized the risk of exposure is real.
Walther-Puri warned that the downstream blast radius from the attack on its systems remains undefined. โStolen API keys and source code snippets from internal views are potentially keys to customer production environments,โ he said.
The stolen data attackers claim to have โsounds almost boring โฆ but itโs infrastructure intelligence,โ Walther-Puri added. โThe right environment variable doesnโt just unlock a system โ it lets adversaries become that system, silently, from the inside.โ
The post Vercel attack fallout expands to more customers and third-party systems appeared first on CyberScoop.