Vercel identifies several accounts “with evidence of prior compromise” exposed during the security incident


  • Vercel expanded its investigation into the breach and confirmed more compromised accounts than initially reported.
  • Researchers linked the attack to a Context.ai account infected with the Lumma Stealer malware, which was used to access Vercel environments.
  • A dark web actor attempted to sell stolen Vercel data and claimed ties to ShinyHunters, though the group denied involvement.

The number of customers affected by the latest breach at Vercel is higher than first thought, as the company confirmed finding even more compromised accounts.

Earlier this week, the cloud development platform confirmed it suffered a cyber attack and lost “non-sensitive” customer data. In the initial report, Vercel said one of its employees used a third-party AI tool called Context.ai, which appears to have been used as an entry point.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top