📰 Full Story
Vercel, the U.S. cloud platform behind Next.js, disclosed a security incident on April 19–20, 2026 after attackers gained access to parts of its internal Google Workspace and non‑sensitive environment variables via a compromised third‑party AI tool, Context.ai.
Vercel said the breach affected a “limited subset” of customers and that environment variables flagged as “sensitive” (encrypted at rest) show no evidence of being read.
Multiple cybersecurity outlets reported a threat actor — using a ShinyHunters alias — offering alleged Vercel data and employee records for $2 million.
Vercel has engaged incident‑response firms including Mandiant, notified law enforcement and encouraged affected customers to rotate credentials, audit activity logs and enable sensitive variable protections.
Independent researchers and vendors have suggested the compromise followed an infostealer infection at Context.ai that exposed OAuth tokens; Vercel says its services and open‑source projects (Next.js, Turbopack) remain operational and, so far, intact.
🔗 Based On
🤝 Social Media Insights
Social Summary
The breach stemmed from OAuth tokens stolen via a Lumma Stealer infection at Context.ai, giving attackers Workspace access that exposed non‑sensitive env vars; Vercel says sensitive vars and OSS projects are intact. Customers should audit OAuth grants and rotate credentials immediately.







💬 Commentary