Vercel Finds More Compromised Accounts in Context.ai-Linked Breach
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要内容。 文章主要讲的是Vercel公司发生了安全事件,导致客户账户被入侵。他们发现除了这次事件外,还有其他客户的账户在更早的时候就被入侵了,可能是通过社会工程学或恶意软件。此外,事件起因是Context.ai被入侵,攻击者利用了Google Workspace和Vercel的环境变量。Hudson Rock的调查发现,Context.ai的一名员工感染了恶意软件Lumma Stealer,这可能触发了整个攻击链。最后提到OAuth的风险和防御的重要性。 接下来,我需要把这些要点浓缩到100字以内。重点包括:Vercel的安全事件、客户账户被入侵、原因来自Context.ai的漏洞、攻击者利用环境变量、恶意软件的影响以及OAuth的风险。 现在组织语言:Vercel报告安全事件,部分客户账户被入侵;攻击起因于Context.ai漏洞;攻击者利用环境变量;调查发现员工感染恶意软件;强调OAuth风险和防御的重要性。 检查字数是否在限制内,并确保内容准确。 </think> Vercel报告称其安全事件导致部分客户账户被入侵,并发现另有少量账户早前遭独立入侵。攻击起因于Context.ai漏洞,使攻击者控制Google Workspace并进入Vercel系统。调查发现一名员工感染恶意软件Lumma Stealer或为事件源头。该事件凸显OAuth集成风险及防御重要性。 2026-4-23 08:40:0 Author: thehackernews.com(查看原文) 阅读量:16 收藏

Artificial Intelligence / SaaS Security

Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems.

The company said it made the discovery after expanding its investigation to include an extra set of compromise indicators, alongside a review of requests to the Vercel network and environment variable read events in its logs.

"Second, we have uncovered a small number of customer accounts with evidence of prior compromise that is independent of and predates this incident, potentially as a result of social engineering, malware, or other methods," the company said in an update.

In both cases, Vercel said it notified affected parties. It did not disclose the exact number of customers who were impacted.

The development comes after the company that created the Next.js framework acknowledged the breach originated with a compromise of Context.ai after it was used by a Vercel employee, enabling the attacker to seize control of their Google Workspace account and then use it to gain access to their Vercel account.

"From there, they were able to pivot into a Vercel environment, and subsequently maneuvered through systems to enumerate and decrypt non-sensitive environment variables," Vercel noted.

Further investigation by Hudson Rock has revealed that one of Context.ai employees was infected with Lumma Stealer in February 2026 after searching for Roblox auto-farm scripts and game exploit executors, indicating that this event may have been the "patient zero" that triggered the whole chain of malicious actions.

"We now understand that the threat actor has been active beyond that startup's [referring to Context.ai] compromise," Vercel CEO Guillermo Rauch said in an X post. "Threat intel points to the distribution of malware to computers in search of valuable tokens like keys to Vercel accounts and other providers."

It's unclear if Vercel employees' use of the Context AI Office Suite was sanctioned or an instance of shadow AI, which refers to the unauthorized use of artificial intelligence (AI) tools within SaaS apps without formal IT review or vetting, exposing organizations to unintended risks. The AI Office Suite has since been deprecated by Context.ai.

"OAuth integrations are useful because they reduce friction," Tanium said. "They're also dangerous because they can inherit trust from the user and the organization. When attackers abuse an approved integration, they may avoid some of the controls teams rely on for direct account compromise."

"What stands out operationally is less the volume of data exposed and more the attackers' velocity and ability to enumerate internal environments before detection. That changes the job for defenders. The challenge shifts from prevention to rapid scoping and blast-radius reduction."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/vercel-finds-more-compromised-accounts.html
如有侵权请联系:admin#unsafe.sh