A threat actor using the name ShinyHunters had listed what they claimed was stolen internal data from Vercel, a frontend cloud platform. The listing was published on a newly surfaced domain of the cybercrime platform BreachForums, asking $2 million from the company.
The post appeared on April 19, 2026, around the same time Vercel also publicly confirmed a security incident linked to a compromise at a third-party service.
While the listing described a large dataset that includes source code, databases, and internal access, Vercel has not verified those claims. The company, however, says the incident affected a limited portion of its environment and that the investigation is still ongoing.
How the Breach Happened
Vercel has confirmed that it was not a direct attack on its infrastructure. Instead, the issue traces back to a compromise at Context.ai, a third-party service connected to its systems.
According to the company, attackers gained access to a Context.ai employee’s Google Workspace account. From there, they used existing OAuth permissions to access systems connected to Vercel.
Vercel also said the compromised OAuth app was part of a larger attack that affected multiple companies, not just its own systems.
What Data Was Accessed
Vercel has confirmed that the attacker accessed employee information, internal logs, and a subset of environment variables. Environment variables are commonly used to store configuration data such as API keys and service credentials. According to the company, sensitive variables are encrypted, and the accessed set did not include the most sensitive data.
The BreachForums listing, however, claims far broader access, including source code, databases, and authentication tokens. These claims have not been confirmed.
Vercel’s stolen data is being advertised on a BreachForum
Disputed Details Around the Initial Infection
Hudson Rock’s research and statements by its co-founder, Alon Gal, the incident involved an infostealer infection on a Context.ai employee’s device. According to the research, the infection may have started with malicious Roblox-related scripts that delivered the Lumma infostealer, a type of malware that can extract browser credentials and session tokens.
Exported data logs reveal compromised corporate credentials, exposing critical internal systems (Via Hudson Rock)
Context.ai’s Response
Context.ai confirmed the security incident in a statement published on April 19, 2026, saying attackers gained unauthorized access to its systems and abused OAuth tokens to access connected services. The company acknowledged that the compromised access was used in downstream environments, including Vercel.
However, Context.ai did not confirm the reported malware infection chain or how the initial compromise occurred, leaving key details about the origin of the attack unresolved.
ShinyHunters Denies Involvement, Flags BreachForums Domain as Fake
In a statement posted on its leak site, ShinyHunters, which was previously linked to reviving BreachForums, said it is no longer connected to the forum and denied any role in the Vercel breach. The group stated that BreachForums has been run by impostors since the FBI seizure in October 2025 and rejected any presence on Telegram or similar platforms.
“BreachForums has been run by many fakes, but not by us anymore, following the FBI seizure on 10 Oct 2025. We (the real ShinyHunters group) also do not operate on any Telegram platform or leak forum platforms. People claiming to be us are fake, impersonators, and scammers. Including breachforums.ai being a scam and a fake,” the group said.
ShinyHunters on its dark web leak site (Image credit: Hackread.com)
This points to the seller using the ShinyHunters name without any confirmed link to the real group. Attribution remains unclear, and there is no verified connection between the incident and ShinyHunters. At the time of writing, the BreachForums post advertising the alleged Vercel data had been deleted.
> Not really real ShinyHunters
> Claims to have compromised Vercel
> Real ShinyHunters say “wtf that’s not me”
> Impersonator ShinyHunters says stole source code, customer data, databases etc
> Vercel makes security bulletin
> Announces compromise
> Real ShinyHunters “wtf that’s… https://t.co/8t8AFx3jll
— vx-underground (@vxunderground) April 19, 2026
Mitigation
Vercel said it has engaged incident response teams, including Mandiant, to investigate the breach and contain any further impact. The company has also notified affected customers and advised them to rotate environment variables, API keys, and other credentials as a precaution.
In addition, Vercel has introduced enhanced monitoring and tighter controls around access to internal systems. According to the company, only a limited number of customers were affected by the incident.
There is currently no confirmed ransom demand made directly to Vercel.
