Cloud platform provider Vercel disclosed on Wednesday that its investigation into a security breach has identified additional customer accounts that were compromised. The incident, which is linked to a prior compromise at the AI startup Context.ai, allowed unauthorized parties to gain access to Vercel’s internal systems.
The company stated that it expanded its investigation after reviewing a broader set of compromise indicators. This review included an analysis of requests made to the Vercel network and its internal environment. The expanded probe led to the discovery of the newly compromised customer accounts.
Background of the Breach
The initial breach was first reported in early April 2025. At that time, Vercel confirmed that an attacker had leveraged credentials stolen from Context.ai, a customer, to access parts of Vercel’s infrastructure. The attacker reportedly used these credentials to access Vercel’s internal systems, including source code repositories and customer data.
Context.ai is an artificial intelligence startup that uses Vercel’s platform to deploy its services. The exact method by which the attacker obtained Context.ai’s credentials remains under investigation by both companies.
Scope of the Incident
In its Wednesday update, Vercel did not specify the exact number of newly compromised accounts. However, the company emphasized that the attacker’s access was limited in scope and duration. Vercel said it has since revoked all unauthorized access and has implemented additional security measures.
The company confirmed that it has notified all affected customers directly. It also stated that it is working with law enforcement and cybersecurity experts to understand the full scope of the attack and to prevent future incidents.
Response and Mitigation Efforts
Vercel has advised all customers to review their account activity for any suspicious behavior. The company is urging users to enable multi-factor authentication (MFA) and to rotate any API tokens or access keys that may have been exposed during the incident.
The company has also deployed additional monitoring tools and enhanced its intrusion detection systems. Vercel stated that it is conducting a comprehensive review of its security architecture to identify any other potential vulnerabilities.
Implications for Customers and the Industry
The breach highlights the risks that come with third-party integrations and supply chain dependencies in the cloud computing industry. Security experts note that attackers often target smaller companies, such as Context.ai, as an entry point to reach larger platforms like Vercel.
For Vercel’s customer base, which includes many developers and startups, the incident serves as a reminder of the importance of robust credential management and network segmentation. The event also raises questions about the security practices of AI companies, which frequently rely on external cloud infrastructure for rapid deployment.
Industry observers are watching to see if the incident will lead to stricter security requirements for partners and customers of major cloud platforms. Regulatory bodies in several jurisdictions have also been notified of the breach.
Looking Ahead
Vercel expects to complete its internal investigation within the next several weeks. The company plans to release a full post-mortem report detailing the root cause, the timeline of the attack, and the lessons learned.
Additionally, Vercel is working on implementing a new set of security standards for all customers with administrative access. These standards are expected to include mandatory MFA, stricter API key rotation policies, and enhanced activity logging.
The company has not yet provided a timeline for when these new policies will take effect. It has, however, committed to providing regular updates to its customer community as the investigation progresses.
Source: Delimiter Online