Cyber Threat Brief — April 20 2026

⚠️ This report is AI-generated. Always validate findings.

1. Vercel Supply-Chain Breach via Context.ai Compromise

TL;DR: Attacker compromised Context.ai (third-party AI analytics tool), pivoted through a Vercel employee’s Google Workspace OAuth token to access Vercel internal environments and non-sensitive-marked environment variables. ShinyHunters-affiliated actor selling data for $2M; crypto projects scrambling to rotate API keys.

What’s New:

  • Vercel confirmed breach April 20; root cause is compromised Context.ai OAuth integration → employee Google Workspace takeover → Vercel internal environment access
  • Environment variables NOT marked “sensitive” in Vercel dashboard should be treated as exposed (API keys, tokens, database credentials, signing keys)
  • ShinyHunters-affiliated actor published 580 employee records (names, emails, account status) and demands $2M ransom
  • Mandiant engaged for IR; GitHub community incident response playbook published (OpenSourceMalware/vercel-april2026-incident-response)
  • Broad blast radius: Vercel hosts frontends for major crypto/fintech projects; downstream credential abuse expected

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
Context.ai OAuth app grants in Google WorkspaceOAuth tokenT1550.001Google Workspace Admin audit logAudit — revoke Context.ai OAuth grants immediately
Non-”sensitive” Vercel environment variablesExposed secretsT1552.001Vercel dashboard, CI/CD logsRotate — all API keys, DB creds, signing keys not marked sensitive
Unauthorized Vercel deployments since ~April 15Unauthorized changeT1195.002Vercel deployment logs, git push logsHunt — compare deployment hashes to expected commits
Credential reuse from leaked employee dataCredential stuffingT1078WAF, auth logs, IdPMonitor — watch for stuffing attempts using leaked Vercel employee emails
vercel-april2026-incident-response repo indicatorsCommunity IOCsReference — github.com/OpenSourceMalware/vercel-april2026-incident-response

Detection

SourceRuleGap
Splunk ESCUNoneNo Vercel-specific detection; need OAuth app audit query for Google Workspace
ElasticNoneNo coverage; need Google Workspace OAuth grant anomaly rule
SigmaNoneNeed: Google Workspace OAuth application authorization events for suspicious apps

Sources: Vercel Security Bulletin · BleepingComputer · CoinDesk · The Hacker News

2. Microsoft Defender Triple Zero-Day — New Detection Artifacts (RedSun & UnDefend Still Unpatched)

TL;DR: Multiple threat advisories now provide concrete detection artifacts for the RedSun (LPE via Defender cloud-file rollback) and UnDefend (Defender signature update DoS) zero-days. Both remain unpatched; Huntress confirmed all three Defender exploits (BlueHammer, RedSun, UnDefend) ITW as of April 16.

What’s New:

  • New exact-match IOC: Cloud Files sync provider name SERIOUSLYMSFT used by RedSun exploit
  • Hunt targets: binaries named UnDefend.exe, FunnyApp.exe, RedSun.exe in low-priv user folders (Downloads, Pictures, Desktop)
  • RedSun detection pivot: monitor CfRegisterSyncRoot, CfCreatePlaceholders, CfConnectSyncRoot Windows Cloud Files API calls from non-OneDrive processes
  • UnDefend passive mode symptom: multiple endpoints reporting Error Code 80070643 during Defender signature updates — centralized alert recommended
  • Baseline C:\Windows\System32\TieringEngineService.exe SHA-256 hash enterprise-wide; RedSun overwrites this file
  • BlueHammer patched (CVE-2026-33825, April 14 Patch Tuesday); RedSun and UnDefend remain unpatched with no CVE assigned

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
SERIOUSLYMSFT Cloud Files sync providerExact IOCT1574Sysmon EID 11, ETW CloudFilesAlert — RedSun exploit indicator
UnDefend.exe / FunnyApp.exe / RedSun.exe in user dirsFile nameT1059EDR, Sysmon EID 1/11Alert — known PoC tool names
CfRegisterSyncRoot / CfCreatePlaceholders from non-OneDrive processAPI callT1055ETW, kernel telemetryHunt — RedSun Cloud Files API abuse
Widespread Error 80070643 on Defender signature updatesUpdate failureT1562.001SCCM/Intune, Windows Update logsAlert — UnDefend passive mode symptom
TieringEngineService.exe hash mismatch from baselineFile modificationT1574.001EDR, FIMAlert — RedSun file overwrite
WerFault.exe spawning shell or LOLBin children with integrity elevationProcess chainT1068Sysmon EID 1, EDRAlert — BlueHammer post-exploit
technoherder/BlueHammerFix 7 Sigma + 4 YARA rulesCommunity rulesDeploy — github.com/technoherder/BlueHammerFix

Detection

SourceRuleGap
Splunk ESCUSAM Database File Access Attempt (adjacent, BlueHammer)No rule for RedSun Cloud Files API abuse or UnDefend signature update blocking
ElasticNone specificNo coverage for any of the three Defender exploits
Sigmatechnoherder: 7 rules (samlib.dll non-LSASS load, rapid password cycle, BaseNamedObjects junction, GUID temp services, RstrtMgr.dll handles, Cloud Files API abuse, LSA boot key access)Community rules only; no official Sigma or ESCU rules for RedSun/UnDefend

Sources: Help Net Security · The Hacker News · SOCRadar · Cyderes · Picus Security


Status Updates

  • CVE-2026-34621 (Adobe Acrobat/Reader): ITW exploitation ongoing since Dec 2025; CISA KEV deadline May 4; no new IOCs. Original brief.
  • CVE-2026-3055 (Citrix NetScaler): Active exploitation ongoing via SAMLRequest and /wsfed/passive paths; Metasploit module available; federal deadline passed April 2. Original brief.
  • CVE-2026-4681 (PTC Windchill): Still no patch; German police physically notifying affected orgs; imminent exploitation threat persists. Original brief.
  • CVE-2026-35616 (Fortinet FortiClient EMS): Federal deadline passed April 9; exploitation ongoing since March 31; 7.4.7 full fix still pending. Original brief.
  • CVE-2026-1340/1281 (Ivanti EPMM): Mass exploitation continues; federal deadline passed April 11; RPM detection tool available. Original brief.
  • CVE-2026-34197 (Apache ActiveMQ): ITW exploitation ongoing; CISA KEV deadline April 30. Original brief.
  • CVE-2026-33032 (nginx-ui MCPwn): Mass exploitation confirmed (Recorded Future risk 94/100); 2689 exposed instances; patched in v2.3.4. Original brief.