SynRadar

Uncategorized

Uncategorized

From One Infected Machine to Vercel’s Breach in April 2026: Lumma, OAuth

Why this matters? Supply chain attacks are not new — Codecov in 2021, CircleCI in 2023, Snowflake in 2024, and now Vercel in 2026. The pattern remains consistent. Attackers compromise a trusted third party, leverage that trust to gain access, and exfiltrate credentials at scale. The concerning part is not just the sophistication, but how simple the initial entry point often is. In this case, the attack reportedly began with commodity malware — Lumma Infostealer — which is available at low cost on underground forums (Source 3, 5). Who is responsible Context[.]ai, a third-party AI tool used by a Vercel employee, was compromised. A Lumma infostealer infection on the employee’s machine reportedly harvested 16 corporate credentials and 343 sensitive cookies. The impacted accounts included Google, Qualcomm OAuth, Datadog, Cal[.]com, and others associated with @context[.]ai. Password reuse was also observed across multiple accounts. Lumma is a commodity malware strain sold on underground forums that silently harvests browser-stored credentials and session cookies from infected machines. It typically relies on social engineering rather than sophisticated exploitation. On Vercel’s side, the OAuth configuration allowed a non-authorized vendor to be granted broad permissions by an employee. Context[.]ai was not an authorized Vercel vendor, yet “Allow All” permissions were granted. Vercel’s internal OAuth configuration permitted this level of access. Both Vercel and Context AI have acknowledged aspects of the incident in their respective security statements (Sources 1, 2). The Attack Chain One infected machine. One employee. One trusted third-party tool — that was sufficient. Reported attack sequence: The dwell time is notable. Initial compromise traces back to approximately June 2024, while public disclosure occurred in April 2026 — suggesting a potential exposure window of up to 22 months. Additionally, one customer reported receiving a leaked API key notification from OpenAI nine days prior to Vercel’s official bulletin (Source 4). The Threat Actor An individual or group claiming to be ShinyHunters posted on BreachForums, stating they were selling Vercel-related data — including source code, employee accounts, and GitHub/NPM tokens — for $2 million. However, some individuals associated with ShinyHunters have denied involvement in statements to BleepingComputer. Attribution in such cases is often uncertain, as threat actor identities can be misrepresented or exaggerated. These claims should therefore be treated as unverified. What Is Confirmed Safe As of 21st April 2026 (08:00 AM IST), Vercel’s security team, in collaboration with GitHub, Microsoft, npm, and Socket, has stated that: Check If Your Google Workspace Was Exposed Navigate to your Google Admin Console:Admin Console → Security → API Controls → Accessed Apps Direct link:https://admin.google.com/ac/owl/list?tab=apps Steps: Interpretation: IMG_1 IMG_2 IMG_3 If you are a Vercel Customer Final Note OAuth applications should not be treated as simple integrations. They function as third-party vendors with persistent access to your corporate identity. Regularly audit these applications, monitor their access, and revoke permissions that are no longer required. Sources

Uncategorized

A Moment of Pride for SynRadar: Leadership That Shapes the Future

We are proud to share that our Chief Strategy Advisor, Vijay Banda, has been recognized with the prestigious award “Most Innovative Leader Shaping the Future to Watch in 2026.” This recognition is not just a personal milestone—it strongly reflects SynRadar’s vision and momentum in building cyber resilience across Bharat and the world. As highlighted in the feature published by The Enterprise World, Vijay Banda’s leadership stands out for its forward-looking approach to cybersecurity, blending deep industry experience with innovation-driven strategy to address evolving digital risks. The article underscores his role in helping organizations move beyond reactive security toward resilient, future-ready security ecosystems. This recognition further reinforces what we at SynRadar are building—a platform-led, strategy-first approach to cybersecurity, compliance, and risk management. With new strategies focused on cyber resilience engineering, integrated GRC, intelligent risk insights, and scalable security operations, SynRadar is gearing up for its next phase of growth and global impact. Leadership that shapes the future creates systems that last. This milestone energizes our mission to help enterprises anticipate threats, adapt faster, and build trust by design—today and for the years ahead. 🔗 Read the full feature here: https://theenterpriseworld.com/vijay-banda-synradar/ The future of cyber resilience is being shaped now—and we’re just getting started.

Uncategorized

NEWS: SynRadar Signs MoU with IIIT Hyderabad to Build AI-First Cyber Governance Platform

SynRadar is proud to announce a major milestone with the signing of a Memorandum of Understanding (MoU) with the prestigious International Institute of Information Technology, Hyderabad (IIIT-H). This strategic collaboration marks a significant step toward advancing AI-driven cybersecurity and strengthening India’s leadership in cyber assurance technology. Under this partnership, SynRadar will work closely with IIIT-H’s renowned cyber wing—including Cyber Manthan and Vyuha Labs—to enhance the research, design, and development of its next-generation AI-First Cyber Governance platform, aimGRC. Leveraging IIIT-H’s deep academic expertise, research capabilities, and innovation ecosystem, SynRadar aims to accelerate the development of a globally competitive cyber assurance product. IIIT-H will not only mentor and guide the product development but will also serve as SynRadar’s first pilot customer, providing real-world validation, continuous feedback, and enterprise-grade insights. This early adoption underscores the confidence in SynRadar’s vision of modern, automated, and ROI-driven cyber governance. Pioneering an AI-First Vision for Cyber Governance The partnership strengthens SynRadar’s commitment to building aimGRC as an AI-First cyber governance suite, designed to automate risk, compliance, vulnerability, and control assurance end-to-end. By embedding advanced AI models across governance workflows, SynRadar aims to support CISOs in achieving measurable ROI from their cyber programs. This AI-driven approach represents a transformative leap from traditional, manual, and siloed governance methods toward continuous, proactive, and data-led cyber assurance. A “Made in India, Built for the World” Vision With this MoU, SynRadar aims to set a benchmark for how academia and industry can co-create advanced cybersecurity technologies. The collaboration will combine: The goal is clear: to build a world-class cyber assurance platform rooted in Indian innovation and engineered for global adoption. Shaping the Future of Cybersecurity As cyber threats evolve rapidly and governance demands intensify, SynRadar’s AI-First vision positions aimGRC as a transformative platform for CISOs and enterprises worldwide. SynRadar is committed to shaping the next era of cybersecurity innovated in India, powered by AI, and built for the world.

Scroll to Top