Vercel Breach Linked to Context.ai, ShinyHunters Says It’s Not Involved

Vercel Breach Linked to Context.ai, ShinyHunters Says It’s Not Involved

Vercel confirms a breach linked to Context.ai as a hacker lists alleged data for $2M. ShinyHunters denies involvement and flags imposters.

A threat actor using the name ShinyHunters had listed what they claimed was stolen internal data from Vercel, a frontend cloud platform. The listing was published on a newly surfaced domain of the cybercrime platform BreachForums, asking $2 million from the company.

The post appeared on April 19, 2026, around the same time Vercel also publicly confirmed a security incident linked to a compromise at a third-party service.

While the listing described a large dataset that includes source code, databases, and internal access, Vercel has not verified those claims. The company, however, says the incident affected a limited portion of its environment and that the investigation is still ongoing.

How the Breach Happened

Vercel has confirmed that it was not a direct attack on its infrastructure. Instead, the issue traces back to a compromise at Context.ai, a third-party service connected to its systems.

According to the company, attackers gained access to a Context.ai employee’s Google Workspace account. From there, they used existing OAuth permissions to access systems connected to Vercel.

Vercel also said the compromised OAuth app was part of a larger attack that affected multiple companies, not just its own systems.

What Data Was Accessed

Vercel has confirmed that the attacker accessed employee information, internal logs, and a subset of environment variables. Environment variables are commonly used to store configuration data such as API keys and service credentials. According to the company, sensitive variables are encrypted, and the accessed set did not include the most sensitive data.

The BreachForums listing, however, claims far broader access, including source code, databases, and authentication tokens. These claims have not been confirmed.

Vercel’s stolen data is being advertised on a BreachForum

Disputed Details Around the Initial Infection

Hudson Rock’s research and statements by its co-founder, Alon Gal, the incident involved an infostealer infection on a Context.ai employee’s device. According to the research, the infection may have started with malicious Roblox-related scripts that delivered the Lumma infostealer, a type of malware that can extract browser credentials and session tokens.

Exported data logs reveal compromised corporate credentials, exposing critical internal systems (Via Hudson Rock)

Context.ai’s Response

Context.ai confirmed the security incident in a statement published on April 19, 2026, saying attackers gained unauthorized access to its systems and abused OAuth tokens to access connected services. The company acknowledged that the compromised access was used in downstream environments, including Vercel.

However, Context.ai did not confirm the reported malware infection chain or how the initial compromise occurred, leaving key details about the origin of the attack unresolved.

      ShinyHunters Denies Involvement, Flags BreachForums Domain as Fake

      In a statement posted on its leak site, ShinyHunters, which was previously linked to reviving BreachForums, said it is no longer connected to the forum and denied any role in the Vercel breach. The group stated that BreachForums has been run by impostors since the FBI seizure in October 2025 and rejected any presence on Telegram or similar platforms.

      “BreachForums has been run by many fakes, but not by us anymore, following the FBI seizure on 10 Oct 2025. We (the real ShinyHunters group) also do not operate on any Telegram platform or leak forum platforms. People claiming to be us are fake, impersonators, and scammers. Including breachforums.ai being a scam and a fake,” the group said.

      Vercel Breach Linked to Context.ai, ShinyHunters Says It’s Not Involved
      ShinyHunters on its dark web leak site (Image credit: Hackread.com)

      This points to the seller using the ShinyHunters name without any confirmed link to the real group. Attribution remains unclear, and there is no verified connection between the incident and ShinyHunters. At the time of writing, the BreachForums post advertising the alleged Vercel data had been deleted.

      Mitigation

      Vercel said it has engaged incident response teams, including Mandiant, to investigate the breach and contain any further impact. The company has also notified affected customers and advised them to rotate environment variables, API keys, and other credentials as a precaution.

      In addition, Vercel has introduced enhanced monitoring and tighter controls around access to internal systems. According to the company, only a limited number of customers were affected by the incident.

      There is currently no confirmed ransom demand made directly to Vercel.

      I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cybersecurity and tech world. I am also into gaming, reading and investigative journalism.
      Leave a Reply

      Your email address will not be published. Required fields are marked *

      Related Posts