Home » IT Security & Technology Blog » What Is a Supply Chain Attack? Inside the Vercel Breach
Supply chain diagram showing OAuth app chain with compromised node

Web infrastructure provider Vercel confirmed last weekend that its internal systems were breached via a compromised third-party AI tool — Context.ai — used by one of its employees. The attackers pivoted through a legitimate OAuth app into the employee’s Google Workspace account, then into Vercel’s deployment environment, as reported by BleepingComputer. It’s a textbook supply chain attack — and it’s a class of risk every business should understand.

The plain-English version

A supply chain attack is when attackers don’t break into their real target directly. They compromise something the target already trusts — a software vendor, an IT provider, an integration, or an OAuth-connected app — and ride that trust inward. Think of it as walking through the front door carrying a delivery, instead of climbing the fence.

The classic examples were software update channels (SolarWinds, 3CX). The modern twist is identity and AI tooling. Every time a staff member connects a third-party app — an AI note-taker, a meeting summariser, a productivity add-in — that app becomes part of your supply chain.

Why it matters for your business

You probably have dozens of OAuth-connected apps in your Microsoft 365 or Google Workspace tenant right now. Most were approved by individual staff, not reviewed by IT. Under Australia’s Privacy Act, if one of those apps is compromised and exposes customer data, you are accountable — not the vendor.

One practical step this week

Audit the OAuth-connected apps in your Microsoft 365 or Google Workspace tenant and remove anything staff no longer use. If you haven’t capped who can consent to new apps, do that today. Talk to us if you need help reviewing your tenant.

Related Guide

Cybersecurity for Sydney SMBs

Explore our complete guide to protecting your business from cyber threats.

Read the Full Guide →

Posted in Strategic