Vercel development platform compromised via third-party AI tool vulnerability
The cloud deployment service confirmed a breach affecting a limited customer subset, traced to a compromised third-party AI tool's Google Workspace OAuth integration.
1 source · cross-referenced
- Vercel, a major web app deployment platform, disclosed a security incident on April 19, 2026 affecting a 'limited subset' of customers.
- Hackers claiming affiliation with ShinyHunters (responsible for the Rockstar Games breach) posted employee data including names and email addresses online and attempted to sell additional data.
- Vercel attributed the attack to a compromised third-party AI tool whose Google Workspace OAuth app was breached, potentially affecting hundreds of users across multiple organizations.
- The company advised customers to review activity logs, rotate API keys and tokens, and check for unauthorized third-party app access in Google Workspace accounts.
Vercel, a cloud development platform widely used to host and deploy web applications, confirmed on April 19, 2026 that it experienced a security breach. The company disclosed the incident via X (formerly Twitter), stating that it impacted a 'limited subset' of its customer base, though no specific number was provided.
An individual claiming membership in ShinyHunters—the hacking group linked to the Rockstar Games breach—posted employee data from Vercel online, including names, email addresses, and activity timestamps. The same actor indicated intent to sell additional stolen data, though Vercel did not specify what further information may have been exposed.
In its security advisory, Vercel traced the compromise to a third-party AI tool whose Google Workspace OAuth app had been compromised in a broader attack. The company did not name the specific tool or vendor involved, but noted the breach potentially affected hundreds of users across multiple organizations using the same OAuth app.
Vercel's response guidance instructed administrators to audit activity logs for suspicious access, rotate environmental variables including API keys and tokens, and immediately review Google Workspace settings to identify and remove unauthorized third-party app integrations. The company also published indicators of compromise to help the broader security community assess their own exposure.
- Apr 20, 2026 · Schneier on Security
Schneier scheduled to speak at multiple AI and cybersecurity events through July 2026
Trust62 - Apr 19, 2026 · arXiv
Controlled experiment shows humans shift strategy when playing against LLMs in competitive games
Trust62 - Apr 19, 2026 · Ars Technica — Technology Lab
Iranian-linked hackers compromise programmable logic controllers across US critical infrastructure sectors
Trust65