Vercel Blog post (1)

Vercel Security Breach: When 3rd Party AI Tools Become a Security Risk

A recent security incident involving Vercel has highlighted a growing and often overlooked cyber risk: third-party AI tools and supply chain attacks. 

In this blog, we break down what happened, who was involved, what data was exposed, and what your organisation should be doing about it. 

Who Are the Companies Involved? 

Vercel 

Vercel is a platform that helps businesses build and run websites and apps. Many modern websites rely on it behind the scenes to stay fast, secure, and available. 

Context AI 

Context AI builds tools that help businesses understand and improve how their AI systems perform. 

These tools often connect to other systems to work properly, which is where the risk came in. 

What Happened? 

Step 1: The Initial Compromise (Context AI)
-An employee at Context AI downloaded a cheat tool for the game Roblox
-Hidden inside that download was malware (malicious software) designed to steal login details
-This malware quietly captured access to the employee’s accounts and systems

In other words:
A seemingly harmless download gave attackers the keys to Context AI’s systems.

Step 2: Access to Context AI Systems
-Using those stolen details, attackers gained access to Context AI’s internal systems
-They were able to see and collect information about users and connected accounts
-This included access to “trusted connections” between Context AI and other platforms

Step 3: Jumping to Vercel
-A Vercel employee had connected their work account to Context AI
-That connection gave Context AI certain permissions to access their account

The attackers took advantage of this and:
-Gained control of the employee’s account
-Used it to access parts of Vercel’s internal systems

Step 4: Accessing Internal Data
-Once inside, attackers were able to access some internal data and systems
-This included certain credentials and configuration data (essentially “behind-the-scenes” settings used to run systems)
-Some of this information has reportedly been put up for sale online, with a ransom demand of around $2 million

The Big Takeaway

What makes this incident so important is how simple the starting point was:

One unsafe download → one compromised employee → multiple companies affected.

This is a textbook example of a supply chain attack, where attackers don’t go straight for the main target, they work their way in through a smaller, connected company.

What Information Was Affected? 

Reports suggest the attackers accessed some sensitive business data, including: 

-Information used by apps to connect to services (API keys) 
-Parts of website or application code 
-Database Information 

There were also reports of limited employee information being accessed, such as names and email addresses. 

Vercel has said that only a small number of customers were affected, but the type of data involved means it’s still a serious incident. 

Why This Matters 

This breach highlights a few important lessons for all businesses: 

1. Your Suppliers Can Be a Risk 

Even if your own systems are secure, the tools you connect to can introduce risk. 

2. “Connected Apps” Can Open Doors 

Many businesses connect tools to their email or cloud systems to save time and improve productivity. 

But each connection is effectively giving that tool permission to access part of your business. 

3. AI Tools Are Powerful, but Need Care 

AI tools are becoming more common, but they often require deeper access to your systems. 

That makes them useful, but also something that needs to be carefully managed. 

How to Protect Your Business 

The good news is there are simple, practical steps you can take: 

1. Review Connected Apps 

Check which tools are connected to your systems (like Microsoft 365 or Google Workspace). 

Remove anything you no longer use or don’t fully trust. 

2. Limit Access 

Only give tools access to what they actually need, nothing more. 

3. Keep an Eye on Activity 

Regularly review account activity and look out for anything unusual, such as unexpected logins or new connections. 

4. Change Access Details Regularly 

Update important access credentials periodically, especially after any suspected incident. 

5. Take Third-Party Risk Seriously 

Treat external tools and suppliers as part of your overall cybersecurity, not as an afterthought. 

How Consider IT Can Help 

At Consider IT, this is exactly the type of risk we help organisations manage every day. 

We don’t just secure your systems, we look at the entire ecosystem around them, including: 

-Third-party integrations and SaaS tools 
-Microsoft 365 and Google Workspace security 
-Credential and access management 
Cyber Essentials and Cyber Essentials Plus certification 
-Ongoing monitoring and threat detection 

Our onboarding process includes a comprehensive review of your environment, ensuring risks like this are identified and mitigated early. If you want to know more, get in touch today for some friendly advice.

Final Thoughts 

The Vercel breach is a clear reminder that: 

-Your security is only as strong as your weakest integration. 
-As businesses adopt more AI tools and cloud services, the attack surface continues to grow. 

Taking a proactive approach to access control, third-party risk, and monitoring is no longer optional, it’s essential.