سامي
سامي الغامدي
مستشار Fyntralink · متاح الآن
مدعوم بالذكاء الاصطناعي · Fyntralink

Vercel-Context AI OAuth Breach: SaaS Supply Chain Lessons for SAMA Banks

A single employee-installed AI plugin gave attackers OAuth access to Vercel's corporate Google environment. The blast radius reached hundreds of downstream organizations — and exposes a control gap that SAMA-regulated banks routinely overlook.

F
FyntraLink Team

Vercel — the cloud platform behind a large share of the world's modern web applications — has confirmed that attackers breached its internal Google Workspace environment by abusing an OAuth grant given to a third-party AI assistant called Context AI. The intrusion exposed unencrypted customer credentials and is now being investigated as a downstream supply chain incident affecting hundreds of organizations across the tech ecosystem. For Saudi banks running heavy SaaS estates, the lesson is uncomfortable: your weakest authentication boundary is no longer the perimeter — it is every "Sign in with Google" button an employee has ever clicked.

How the OAuth Supply Chain Attack Worked

According to Vercel's public bulletin and reporting from Trend Micro and TechCrunch, the chain began when a Vercel employee installed Context AI and granted it OAuth scopes against their corporate Google account. Context AI itself was then compromised, and the attacker pivoted through the existing OAuth grant directly into the employee's mailbox and connected Workspace assets. From there, they harvested cleartext credentials, API tokens, and environment variables that opened access to Vercel's internal systems. No password was phished. No malware was deployed on the endpoint. The trust relationship Vercel had pre-authorized for a SaaS plugin became the entire attack path.

Why OAuth Grants Are the New Backdoor

OAuth was designed to replace password sharing with scoped, revocable tokens — but in practice, modern Workspaces have hundreds of long-lived grants accumulated by individual users with little governance. A single grant with mail.readonly, drive.readonly, or admin.directory.readonly scopes is functionally equivalent to a persistent foothold inside the tenant. Attackers know this. ShinyHunters-style actors, the Storm-0501 cluster, and several IAB groups have shifted measurable share of their initial access tradecraft from credential phishing to OAuth consent phishing and post-compromise OAuth pivoting. The Vercel incident is simply the latest, highest-profile example of a pattern that has been quietly building since 2024.

Impact on Saudi Financial Institutions Under SAMA and NCA

Saudi banks and fintechs have aggressively adopted Microsoft 365, Google Workspace, Salesforce, ServiceNow, and an expanding constellation of AI productivity tools — many onboarded under shadow IT. Under the SAMA Cyber Security Framework, control 3.3 (Identity and Access Management) and the third-party cyber security requirements in domain 4 explicitly cover external service integrations, yet most banks we assess have no inventory of OAuth grants in their tenants. The NCA ECC subdomain 2-15 (Third-Party and Cloud Computing Cybersecurity) and PDPL Article 30 on processor obligations both create regulatory exposure when a compromised OAuth token leads to personal data leakage. A Vercel-style incident in a Saudi bank would simultaneously trigger SAMA breach-notification timelines, NCA reporting under the National Cybersecurity Authority's incident framework, and PDPL data-subject notification obligations — three concurrent regulatory clocks running on the same root cause.

Recommended Mitigations and Practical Steps

  1. Enumerate every active OAuth grant in your Microsoft 365 and Google Workspace tenants today. In Microsoft Entra ID use the Enterprise Applications and User consented apps reports; in Google Workspace use Security > API controls > App access control. Treat any grant older than 180 days or with sensitive scopes as a finding.
  2. Switch tenant-wide consent policy to admin-approval-required for any third-party app requesting non-trivial scopes. The default "user consent for verified publishers" setting is too permissive for a SAMA-regulated environment.
  3. Forbid storage of cleartext secrets, customer credentials, or API keys in mailboxes, shared drives, and ticketing systems. The Vercel incident only became material because credentials were sitting in plaintext where the OAuth token could reach them.
  4. Add OAuth grant monitoring to your SOC use-case library. High-value detections include new grant of mail.read or drive.read scopes, mass mailbox enumeration via Graph API, and token issuance from non-corporate IP space.
  5. Map every SaaS vendor in your estate against SAMA CSCF subdomain 4.1 third-party requirements and NCA ECC 2-15. Vendors handling authentication tokens or production data require an executed cybersecurity addendum, evidence of independent assurance (SOC 2 Type II or ISO 27001 minimum), and documented incident-notification SLAs measured in hours, not days.
  6. Run a tabletop exercise this quarter on the exact Vercel scenario: a downstream SaaS provider notifies you that an OAuth-linked credential of yours was exposed. Time the response. Most Saudi banks discover they cannot revoke and rotate at scale in under 48 hours.

Conclusion

The Vercel-Context AI breach is not a story about one cloud company's bad day. It is a preview of how breaches will increasingly reach Saudi financial institutions: not through the firewall, not through the VPN, but through an AI plugin a junior analyst installed last Tuesday. The institutions that survive the next wave will be the ones that treat OAuth grants as privileged access and govern them accordingly.

Is your organization prepared? Contact Fyntralink for a complimentary SAMA Cyber Maturity Assessment that includes a full OAuth and SaaS supply chain exposure review across your Microsoft 365 and Google Workspace tenants.