The Vercel security incident disclosed on April 19 escalated significantly within 24 hours as multiple investigations converged on the full attack chain. The compromised third-party AI tool is Context.ai, the initial infection vector was Lumma Stealer malware on a Context.ai employee’s machine, and a threat actor using the ShinyHunters persona is attempting to sell stolen data for $2 million.

This is a developing story. NCT covered the initial disclosure on April 19.

The Full Attack Chain

Hudson Rock published forensics on April 20 showing that a Context.ai employee was compromised with Lumma Stealer in February 2026. The stolen corporate credentials included Google Workspace logins, plus keys for Supabase, Datadog, and Authkit. Logs indicate the infected user “was actively searching for and downloading game exploits, specifically Roblox ‘auto-farm’ scripts and executors,” which are notorious vectors for infostealer deployment.

Context.ai confirmed in its own security bulletin that an unauthorized actor “used a compromised OAuth token to access Vercel’s Google Workspace.” Context.ai noted that Vercel is not a Context customer, but “at least one Vercel employee signed up for the AI Office Suite using their Vercel enterprise account and granted ‘Allow All’ permissions.” Vercel’s internal OAuth configurations allowed this action to grant broad permissions across the enterprise Google Workspace.

From there, the attacker took over the employee’s Vercel Google Workspace account, enabling access to “some Vercel environments and environment variables that were not marked as ‘sensitive,’” according to The Hacker News. Vercel described the attacker as “sophisticated” based on their “operational velocity and detailed understanding of Vercel’s systems.”

ShinyHunters Claims Responsibility

A threat actor using the ShinyHunters persona posted on BreachForums claiming responsibility for the hack, offering stolen data including access keys and source code for $2 million. These claims have not been independently verified. Vercel has engaged Mandiant and law enforcement and is investigating what data was exfiltrated.

Crypto Projects in Emergency Mode

The breach triggered immediate action across Web3 teams because Vercel underpins frontend infrastructure for many crypto applications. CoinDesk reported that environment variables exposed in the breach include API keys that connect wallet interfaces and trading dashboards to blockchain data providers and backend services.

Solana-based decentralized exchange Orca confirmed its frontend is hosted on Vercel and that it rotated all deployment credentials as a precaution, adding that onchain protocol and user funds were not affected.

The Supply Chain Pattern

GitGuardian’s analysis emphasized that the real lesson extends beyond Vercel: any third-party OAuth compromise can cascade into internal systems quickly. The firm recommends all Vercel customers pull environment variables locally using vercel env pull and scan them for exposed secrets, then rotate everything that isn’t flagged as “sensitive,” since those unflagged variables are the ones at risk.

Vercel CEO Guillermo Rauch confirmed that supply chain analysis of Next.js, Turbopack, and open source projects found no compromise, and that new dashboard capabilities for environment variable management have already shipped.

The AI Tool Risk Vector

The incident is now the clearest documented case of an AI SaaS tool acting as the entry point for a major infrastructure breach. A single employee installing Context.ai’s “AI Office Suite” with overly broad OAuth permissions created a supply chain path from a malware-infected personal download into one of the most widely used deployment platforms in web development. For teams running AI tools with workspace integrations, the lesson is immediate: audit every OAuth grant, enforce least-privilege configurations, and treat AI tool permissions with the same scrutiny as production credentials.