Rocket Lab Reports Growing Demand for Commercial Space Products. Stock Surges 34%
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Vercel customers are at risk of compromise after an attacker hopped through multiple internal systems to steal credentials and other sensitive data, the company said in a security bulletin Sunday.Β
The attack, which didnβt originate at Vercel, showcases the pitfalls of interconnected cloud applications and SaaS integrations with overly privileged permissions.Β
An attacker traversed third-party systems and connections left exposed by employees before it hit the San Francisco-based company that created and maintains Next.js and other popular open-source libraries.Β
Researchers at Hudson Rock said the seeds of the attack were planted in February when a Context.ai employeeβs computer was infected with Lumma Stealer malware after they searched for Roblox game exploits, a common vector for infostealer deployments.
Each of the companies are pinning at least some blame for the attack on the other vendor.
Context.ai on Sunday said that breach allowed the attacker to access its AWS environment and OAuth tokens for some users, including a token for a Vercel employeeβs Google Workspace account. Vercel is not a Context customer, but the Vercel employee was using Context AI Office Suite and granted it full access, the artificial intelligence agent company said.Β
βThe attacker used that access to take over the employeeβs Vercel Google Workspace account, which enabled them to gain access to some Vercel environments and environment variables that were not marked as sensitive,β Vercel said in its bulletin.Β
The company said a limited number of its customers are impacted and were immediately advised to rotate credentials. Vercel, which declined to answer questions, did not specify which internal systems were accessed or fully explain how the attacker gained access to Vercel customersβ credentials.Β
Vercel CEO Guillermo Rauch said customer data stored by the company is fully encrypted, yet the attacker got further access through enumeration, or by counting and inventorying specific variables.Β
βWe believe the attacking group to be highly sophisticated and, I strongly suspect, significantly accelerated by AI,β he said in a post on X. βThey moved with surprising velocity and in-depth understanding of Vercel.β
A threat group identifying itself as ShinyHunters took responsibility for the attack in a post on Telegram and is attempting to sell the stolen data, which they claim includes access keys, source code and databases.
The attacker βis likely an imposter attempting to use an established name to inflate their notoriety,β Austin Larsen, principal threat analyst at Google Threat Intelligence, wrote in a LinkedIn post. βRegardless of the threat actor involved, the exposure risk is real.β
Vercel also warned that the attack on Contextβs Google Workspace OAuth app βwas the subject of a broader compromise, potentially affecting its hundreds of users across many organizations.β It published indicators of compromise and encouraged customers to review activity logs, review and rotate variables containing secrets.
Context and Vercel said their separate and coordinated investigations into the attack aided by CrowdStrike and Mandiant remain underway.
The post Vercelβs security breach started with malware disguised as Roblox cheats appeared first on CyberScoop.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.