CybersecurityApril 19, 2026

Vercel Confirms Breach After Hackers Claim to Sell Employee Data and API Keys

Vercel confirmed a security incident after threat actors posted employee records and claimed to have accessed internal API keys, source code, and deployment credentials, discussing a purported $2 million ransom.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Vercel Confirms Breach After Hackers Claim to Sell Employee Data and API Keys

**TL;DR** Vercel confirmed a security incident after threat actors posted employee records and claimed to have accessed internal API keys, source code, and deployment credentials. The attackers said they discussed a $2 million ransom with the company.

## Context Vercel provides hosting and deployment tools for JavaScript frameworks, including Next.js, and offers serverless functions, edge computing, and CI/CD pipelines. The company disclosed the incident in a security bulletin after a hacking forum post alleged access to internal systems.

## Key Facts - Vercel identified unauthorized access to certain internal systems and engaged incident response experts. - A threat actor using the handle “ShinyHunters” shared a text file containing 580 employee records: names, Vercel email addresses, account status, and timestamps. - The same post claimed possession of access keys, source code, database data, internal deployment access, API keys, NPM tokens, and GitHub tokens, accompanied by a screenshot of an internal Enterprise dashboard. - In Telegram messages, the actor stated they contacted Vercel and discussed a purported $2 million ransom; Vercel has not confirmed payment discussions. - Vercel says its customer‑facing services remain operational and only a limited subset of customers was affected; law enforcement has been notified. - While the actor claims affiliation with the ShinyHunters group, members of that extortion gang have denied involvement to BleepingComputer.

Technical details suggest the attackers likely obtained valid credentials or API keys (MITRE ATT&CK T1078, T1552.004) and may have exfiltrated data via standard web channels (T1041). No specific CVE has been linked to the breach at this time.

## What It Means The exposure of employee emails and status enables phishing or social‑engineering campaigns. Compromised NPM or GitHub tokens could allow attackers to publish malicious packages or alter source‑code repositories, posing a supply‑chain risk. Vercel advises customers to review environment variables, use its sensitive environment variable feature, and rotate any potentially exposed secrets.

**Mitigations / What Defenders Should Do** - Rotate all API keys, NPM tokens, and GitHub tokens that may have been stored in Vercel environments. - Enable multi‑factor authentication on Vercel accounts and associated developer accounts. - Review audit logs for unusual API key usage or unexpected deployments; enforce least‑privilege scopes on tokens. - Deploy secret‑scanning tools in CI pipelines to detect inadvertently committed credentials. - Apply the principle of least privilege to service accounts and limit token lifetimes. - Monitor for phishing attempts targeting Vercel employees using the leaked email list. - Keep incident‑response playbooks updated and consider engaging external forensic firms if anomalous activity is detected.

Watch for Vercel’s detailed post‑mortem and any evidence that the stolen tokens were used in downstream supply‑chain attacks.

TweetLinkedIn

Reader notes

Loading comments...