Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Vidar Stealer Campaign Evades EDR to Stealthy Bypass
May 12, 2026
Home/Threats/Threat Actors Exploit Vercel AI Tools for Leverage Vercel’s
Threats

Threat Actors Exploit Vercel AI Tools for Leverage Vercel’s

A new wave of phishing attacks is leveraging Vercel, an AI-powered web development platform, to streamline credential theft. Threat actors are exploiting Vercel’s capabilities to rapidly...

Jennifer sherman
Jennifer sherman
May 12, 2026 3 Min Read
1 0

A new wave of phishing attacks is leveraging Vercel, an AI-powered web development platform, to streamline credential theft. Threat actors are exploiting Vercel’s capabilities to rapidly construct highly convincing fake login pages that closely mirror legitimate websites, as detailed in a recent report:

Vercel offers a GenAI tool called v0.dev that generates fully functional web pages from simple text prompts. An attacker can type something as basic as “create a Microsoft sign-in page with official logos and colors,” and the tool will produce a working replica within seconds.

This means someone with little technical background can now launch a phishing campaign that looks nearly identical to a real corporate login page.

Researchers at Cofense, a cybersecurity firm specializing in phishing defense, tracked a sharp rise in Vercel-based phishing campaigns since 2022. Analysts noted the platform has been used across attacks of varying skill levels and complexity. The data shows that Vercel abuse continued climbing well into 2025 and shows no signs of slowing down.

What makes this threat particularly dangerous is how effortlessly it replaces traditional phishing infrastructure. In the past, threat actors had to set up their own hosting servers, buy phishing kits from dark web marketplaces, and manage technical back-end systems. Vercel eliminates all of that by handling hosting, deployment, and page generation in one place.

The implications extend beyond individual users. Organizations of all sizes are at risk because attackers are spoofing brands that employees interact with daily, including Microsoft, Spotify, and popular job platforms.

Vercel Enables Mass Phishing

Vercel’s GenAI tool introduces a dangerous level of automation for phishing. With each prompt submitted, the AI produces a slightly different output, meaning threat actors can continuously generate new page versions without writing new prompts every time. If a site gets taken down, they simply generate a fresh one.

The platform also integrates with Telegram through its Bot API, which allows attackers to receive real-time alerts whenever a victim submits credentials. The Telegram bot monitors the Vercel-hosted page and sends stolen login details directly to the attacker’s account. This combination turns what used to require multiple tools and technical expertise into a near fully automated operation.

Cofense analysts documented specific campaigns where attackers posed as hiring managers for brands including Adidas, Nike, Ferrari, and Louis Vuitton. These phishing emails mimicked job offers and interview invitations, leading victims to fake career pages and then to fraudulent Facebook or Google login portals. All of these pages were built using Vercel’s GenAI product.

Fake Adidas Careers page created using Vercel from ATR 403225 (Source - Cofense)
Fake Adidas Careers page created using Vercel from ATR 403225 (Source – Cofense)

In one documented case, attackers created a Spotify login page so convincing it replicated the exact logos, color scheme, and layout of the real site.

Example of a Spotify spoofing web page created using Vercel (Source - Cofense)
Example of a Spotify spoofing web page created using Vercel (Source – Cofense)

Once victims submitted their credentials, the page forwarded the stolen information to the attacker and redirected users to a second page requesting credit card details.

Protecting Against AI-Generated Phishing

Security awareness training must evolve alongside this threat. Because AI tools like v0.dev rarely produce the typos and formatting errors users have traditionally been taught to watch for, old advice about spotting “obvious mistakes” in phishing emails no longer holds up.

Users and organizations should now focus on verifying the actual URL in the browser bar before entering any login credentials. Even a pixel-perfect replica of a legitimate website cannot change the web address it operates from.

Checking for subtle variations in domain names remains one of the most reliable ways to catch a fake site.

Organizations can also report malicious Vercel-hosted sites directly to Vercel for takedowns. Security teams should monitor for vercel.app subdomains in inbound email links, as this is a common indicator of a hosted phishing page.

Staying current with updated threat intelligence and keeping staff trained on emerging attack patterns is now essential.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitphishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Hackers Hijack Microsoft Teams to Deliver ModeloRAT

Next Post

Vidar Stealer Campaign Evades EDR to Stealthy Bypass

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform
May 12, 2026
Critical Cline AI Agent Vulnerability Allows RCE Attacks
May 12, 2026
Malicious Chrome MV3 Extension Steals TronLink Crypto
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us