Connect with us

CyberSecurity

Cloud Hosting Giant Vercel Confirms Hack: Customer Credentials Stolen and Sold Online

Published

on

Cloud Hosting Giant Vercel Confirms Hack: Customer Credentials Stolen and Sold Online

The cloud app hosting platform Vercel has confirmed that hackers infiltrated its internal systems and made off with sensitive customer data. This breach, which came to light over the weekend, has already led to stolen credentials being listed for sale on cybercriminal forums. The incident underscores the growing threat of supply chain attacks targeting widely used software infrastructure.

How the Vercel Hack Unfolded: A Supply Chain Entry Point

According to Vercel’s official statement, the breach originated from a third-party software maker, Context AI. One of Vercel’s employees downloaded a Context AI app and linked it to their corporate Google account using OAuth. The attackers exploited this connection to hijack the employee’s Google account, gaining unauthorized access to internal systems—including unencrypted credentials.

This attack method is a classic supply chain maneuver: instead of directly targeting the primary company, hackers compromise a smaller, less secure vendor. By doing so, they bypass robust defenses and gain access to a treasure trove of data. In this case, the stolen credentials included customer API keys, source code, and database contents.

What Data Was Stolen from Vercel?

The threat actor, who claimed to represent the notorious ShinyHunters hacking group, posted an advertisement on a cybercriminal forum. The listing, reviewed by TechCrunch, offered access to Vercel customer API keys, source code, and database dumps. However, ShinyHunters themselves later denied involvement in the incident, telling cybersecurity news site Bleeping Computer that they were not responsible.

Vercel has assured customers that its open source projects—Next.js and Turbopack—were not compromised. Nevertheless, the company has begun notifying affected clients and advises all users to rotate any keys or credentials marked as “non-sensitive” in their deployments. CEO Guillermo Rauch shared this warning on X, urging developers to take immediate action.

Context AI’s Role in the Breach

Context AI, which builds evaluation tools for AI models, acknowledged on its website that it suffered a breach in March involving its Office Suite consumer app. The app allowed users to automate workflows across third-party services—and the hackers likely stole OAuth tokens during that intrusion. Context AI initially notified only one customer but now believes the incident is broader than first thought.

The company has not disclosed why it delayed reporting the breach or whether it received any ransom demands. This lack of transparency raises questions about how many other organizations might be affected downstream. Vercel warned that the hack could impact “hundreds of users across many organizations,” potentially triggering a cascade of secondary breaches throughout the tech industry.

Protecting Your Data After the Vercel Breach

If you use Vercel for hosting or deployment, here are immediate steps to take:

  • Rotate all API keys and credentials that are not marked as “sensitive” in your Vercel dashboard.
  • Audit OAuth connections linked to your corporate accounts. Revoke any that you don’t recognize or no longer use.
  • Enable multi-factor authentication on all Google Workspace accounts to add an extra layer of security.
  • Monitor your logs for unusual activity, especially from third-party apps.

For broader guidance on securing your development pipeline, check out our article on best practices for securing CI/CD pipelines. You might also find our guide on how to prevent supply chain attacks useful for long-term protection.

The Bigger Picture: Supply Chain Attacks on the Rise

This incident is the latest in a string of supply chain breaches targeting software developers whose code powers a significant portion of the web. By compromising widely used tools, hackers can steal credentials from a massive pool of targets simultaneously. The Vercel hack is a stark reminder that even industry leaders are vulnerable when their vendors have weak security postures.

As investigations continue, both Vercel and Context AI are under pressure to provide more details. For now, developers must remain vigilant. The stolen credentials are already circulating on dark web forums, and the full extent of the damage may not be known for weeks.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

CyberSecurity

Infosecurity Magazine Server Error: How to Resolve It Quickly

Published

on

Infosecurity Magazine Server Error: How to Resolve It Quickly

Seeing a server error on Infosecurity Magazine can be frustrating, especially when you need critical cybersecurity news or analysis. This Infosecurity Magazine server error typically appears as a generic message urging you to refresh or return to the homepage. While the cause might be temporary, understanding how to handle it can save you time and hassle.

What Causes the Infosecurity Magazine Server Error?

Server errors often stem from temporary glitches on the website’s end, such as high traffic, maintenance, or a misconfigured server. In some cases, your browser’s cache or network settings might trigger the issue. However, the error does not usually indicate a serious problem with your device or account.

Common Triggers for This Error

High demand for content, such as during a major cybersecurity event, can overload the server. Additionally, scheduled updates or unexpected downtime may lead to the error. On the user side, outdated browser data or conflicting extensions can sometimes mimic server problems.

Step-by-Step Fixes for the Infosecurity Magazine Server Error

Before contacting support, try these straightforward solutions. Most users resolve the issue within minutes by following these steps.

1. Refresh the Page

Start by pressing F5 or clicking the refresh button on your browser. This forces the server to reload the page. If the error was temporary, the content should appear normally. Repeat this once or twice, but avoid excessive refreshing, which could strain the server.

2. Clear Your Browser Cache and Cookies

Outdated cached data can conflict with the server’s latest version. Clear your browser’s cache and cookies, then restart the browser. For Chrome, go to Settings > Privacy and Security > Clear browsing data. This often resolves persistent errors.

3. Use a Different Browser or Device

Sometimes, browser-specific issues cause the error. Try accessing Infosecurity Magazine using a different browser like Firefox or Edge, or switch to a mobile device. If the site loads, the problem lies with your original browser’s configuration.

4. Check Your Internet Connection

A weak or unstable internet connection can mimic server errors. Restart your router or try connecting via a different network. Use a site like Down for Everyone or Just Me to verify if the error is widespread.

When to Wait or Contact Support

If the above steps don’t work, the error might be server-side. In such cases, waiting 30 minutes to an hour often resolves it. The original message advises checking back shortly, which is sound advice for temporary issues.

How to Reach Infosecurity Magazine Help

For persistent problems, contact the Infosecurity Magazine support team via their contact page. Provide details like the error message, your browser type, and any steps you’ve tried. This helps them diagnose the issue faster.

Preventing Future Server Errors

While you can’t control the server, you can minimize disruptions. Bookmark the homepage for quick access, and consider subscribing to their newsletter for updates during outages. Additionally, keep your browser updated to avoid compatibility issues.

As a final note, server errors are common on high-traffic sites. By following these troubleshooting steps, you can resolve the Infosecurity Magazine server error efficiently. If all else fails, the support team is just a message away.

Continue Reading

CyberSecurity

Mastodon Confirms DDoS Attack on Its Flagship Server: What Happened and What It Means

Published

on

Mastodon Confirms DDoS Attack on Its Flagship Server: What Happened and What It Means

A Mastodon DDoS attack targeted the platform’s primary server, mastodon.social, on Monday, causing intermittent outages and error messages for users. The decentralized social networking software maker confirmed the distributed denial-of-service (DDoS) attack in a status update around 7 a.m. ET, noting that the site was largely inaccessible for a period.

By 9:05 a.m. ET, Mastodon announced it had implemented countermeasures, restoring access. However, the company warned that some instability might persist as the attack continued. This incident comes just days after Bluesky, another decentralized social network, resolved a prolonged DDoS attack that caused days-long outages.

How Mastodon Responded to the DDoS Attack

Mastodon’s team quickly deployed countermeasures within two hours of the attack’s start. According to Andy Piper, Mastodon’s head of communications, the millions of malicious requests matched the pattern of a typical DDoS attack. So far, only the mastodon.social instance has been targeted, leaving other servers unaffected.

Piper emphasized the advantages of decentralization: “Users with accounts on other Mastodon or Fediverse servers were completely unaffected, and in most cases, the outage would have been invisible to them — they have been able to access the network, read and share posts as usual.” This resilience highlights a key benefit of the Fediverse architecture.

Understanding DDoS Attacks and Their Impact

Distributed denial-of-service attacks flood a server with junk traffic to overwhelm it and knock it offline. While these cyberattacks do not involve data theft, they can severely disrupt user access. In 2024, Cloudflare mitigated what it called the largest DDoS attack ever, peaking at 29.7 terabits per second — equivalent to filling thousands of hard drives with data every minute.

For decentralized networks like Mastodon, DDoS attacks can cause instability but rarely take the entire ecosystem offline. For example, during Bluesky’s recent attack, users who migrated to providers like Blacksky remained unaffected. Similarly, this Mastodon DDoS attack only impacted the flagship server, not the many smaller instances that form the broader network.

Decentralization as a Defense Against Cyberattacks

This incident underscores a critical advantage of decentralized social networks: their ability to withstand targeted attacks. Unlike centralized platforms where a single server failure can cripple the entire service, Mastodon’s distributed nature means that a DDoS attack on one instance leaves others operational.

As cyberattacks grow more powerful, the Fediverse’s architecture offers a natural defense. Users on other servers can continue posting, reading, and sharing without interruption. For more on how decentralized networks handle security, check out our guide on securing your Fediverse presence.

Lessons from the Mastodon and Bluesky Attacks

Both Mastodon and Bluesky have faced DDoS attacks recently, highlighting the persistent threat to social media platforms. However, their responses demonstrate that rapid countermeasures and decentralized design can minimize disruption. Mastodon’s team restored access within hours, while Bluesky stabilized after days of effort.

Building on this, users should consider diversifying their accounts across multiple instances to enhance resilience. For tips on choosing a reliable server, see our guide to Mastodon server selection.

In summary, the Mastodon DDoS attack was a temporary setback for the flagship server, but the broader network remained robust. As decentralized social media grows, such incidents may become more common, but the Fediverse’s inherent strengths offer a powerful countermeasure.

Continue Reading

CyberSecurity

Operation Atlantic Freezes $12 Million in Crypto Losses: How Approval Phishing Scams Were Disrupted

Published

on

Operation Atlantic Freezes $12 Million in Crypto Losses: How Approval Phishing Scams Were Disrupted

In a coordinated crackdown spanning three continents, law enforcement agencies from the United Kingdom, the United States, and Canada have joined forces to combat a rising tide of digital theft. The initiative, known as Operation Atlantic, has already frozen $12 million in crypto losses tied to a deceptive technique called approval phishing. This marks a significant victory in the ongoing battle against cryptocurrency fraud, which continues to drain billions from victims worldwide.

What Is Approval Phishing and How Does It Work?

Approval phishing is a sophisticated form of cybercrime where scammers trick victims into granting full access to their cryptocurrency wallets. Typically, this involves fake alerts or pop-ups that appear to come from trusted apps or services. Once the victim approves the transaction, the scammer can drain the wallet without needing passwords or private keys.

This method has become increasingly common, partly because it exploits the trust users place in legitimate platforms. According to a report from blockchain analytics firm Chainalysis, approval phishing scams netted criminals at least $1 billion between May 2021 and December 2023. The technique often incorporates romance fraud tactics, where scammers build emotional connections with victims before convincing them to sign approval transactions.

Operation Atlantic: A Global Response to Crypto Fraud

Operation Atlantic, led by the UK’s National Crime Agency (NCA) with support from the US Secret Service, Ontario Provincial Police, and Ontario Securities Commission, ran for one week last month. The operation resulted in the freezing of $12 million in crypto losses and identified an additional $33 million stolen through similar schemes.

Private sector partners, including Binance, Coinbase, Tether, and blockchain analytics firms Elliptic, TRM Labs, and Chainalysis, played a crucial role. The NCA reported that multiple fraud networks were “disrupted” during the operation, with over 20,000 crypto wallets linked to fraud victims across more than 30 countries identified. Authorities also contacted 3,000 victims directly and disrupted over 120 web domains used for fraudulent schemes.

Miles Bonfield, NCA deputy director of investigations, emphasized the power of collaboration: “This intensive action has led to the safeguarding of thousands of victims in the UK and overseas, stopped criminals in their tracks, and helped save others from losing their funds.” He added, “We know that fraudsters operate globally and, together with our international partners, so will the NCA to target them wherever they are based.”

The Scale of Crypto Crime: Billions Lost Annually

The success of Operation Atlantic highlights a broader problem. According to the FBI’s Internet Crime Report 2025, cryptocurrency-related crime cost victims over $11.3 billion last year. Cryptocurrency investment fraud alone accounted for $7.2 billion in losses—the vast majority of the $8.6 billion lost to all investment scams. This makes crypto fraud the highest-earning crime category for cybercriminals, far surpassing traditional phishing, which accounted for an estimated $215 million.

Brent Daniels, assistant director for the US Secret Service’s Office of Field Operations, noted: “Operation Atlantic demonstrated the importance and need for international collaboration to stop cryptocurrency fraud. Through this operation, investigators prevented millions of dollars in fraud losses and disrupted millions more in fraudulent transactions, denying criminals the ability to prey on innocent victims.”

How to Protect Yourself from Approval Phishing

Protecting against approval phishing requires vigilance. Never approve transactions from unsolicited pop-ups or emails, even if they appear legitimate. Always verify the source by contacting the service directly through official channels. Use hardware wallets for large holdings and enable multi-factor authentication where possible.

For more insights, read our guide on how to avoid crypto scams. Additionally, stay updated on the latest cryptocurrency fraud trends to recognize emerging threats.

Conclusion: A Model for Future Enforcement

Operation Atlantic serves as a powerful example of what global cooperation can achieve. By freezing $12 million in crypto losses and disrupting extensive fraud networks, the initiative has sent a clear message to cybercriminals. However, with billions still at stake, continued collaboration between law enforcement and the private sector remains essential. As the crypto landscape evolves, so too must the strategies to protect investors from exploitation.

Continue Reading

Trending