Vercel Breach via Google Workspace OAuth — Why Every Microsoft 365 and Google Workspace Tenant Needs App Control
Published: 20 April 2026 | Reading time: 11 minutes | Author: AyeTech Cyber Security Team
ACTION REQUIRED: Audit Your OAuth Apps Now
On 19 April 2026, Vercel confirmed it was breached through a compromised Google Workspace OAuth app from a third-party AI tool. One employee's consent to a SaaS tool was all it took. If your business uses Google Workspace or Microsoft 365 without OAuth app governance, you are exposed to the same attack. Contact AyeTech today for an OAuth app audit — we check every connected app, every scope, every user, across your entire tenant.
Key Takeaways
- Root cause: A single Vercel employee had signed in to Context.ai using their Google Workspace account. When Context.ai was compromised, the attacker inherited OAuth access to that Google account — then pivoted into Vercel's internal environments
- MFA did not help: OAuth tokens bypass password and MFA prompts entirely. The attacker never needed to log in — they replayed the token
- Customer data exposed: Environment variables from customer deployments that were not marked as "sensitive" were read by the attacker. Variables marked "sensitive" are, per Vercel, "stored in a manner that prevents them from being read" — no evidence those values were accessed
- This is not a Vercel problem: Any Google Workspace or Microsoft 365 tenant where staff can freely consent to third-party apps faces the same SaaS supply-chain risk
- One admin setting blocks the class of attack: Restricting third-party OAuth apps in Google Workspace or Microsoft Entra removes the attack surface entirely — most SMEs have never touched either setting
What Happened at Vercel
On 19 April 2026, Vercel published an official security bulletin confirming unauthorised access to internal systems. A threat actor posting on BreachForums — claiming affiliation with ShinyHunters, though this attribution is self-claimed and has been disputed by other actors linked to that handle — was offering the stolen data for approximately $2 million. Vercel itself has not attributed the breach to any specific group, describing the attacker only as "highly sophisticated based on their operational velocity and detailed understanding of Vercel's systems."
The root cause was not a Vercel vulnerability. Vercel's investigation revealed that the incident originated from a small, third-party AI tool whose Google Workspace OAuth app was the subject of a broader compromise, affecting hundreds of its users across many organisations. Multiple outlets, including The Hacker News and BleepingComputer, identified the third party as Context.ai, an AI-agent platform used for enterprise workflow automation.
A Vercel employee had connected Context.ai to their work Google account using "Sign in with Google." When Context.ai was compromised, attackers gained OAuth tokens that let them impersonate every user who had consented to the Context.ai app — including the Vercel employee. They then pivoted into Vercel environments and read customer environment variables that were not flagged as sensitive.
Vercel's public advice to other organisations was to immediately check their Google Workspace tenant for the specific OAuth app ID 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com and revoke it if present. That advice is sensible, but it treats the symptom — not the disease. The disease is that staff in most businesses can silently connect any third-party app to their corporate Google or Microsoft account with zero admin oversight.
The Attack Chain Step by Step
Understanding exactly how this attack unfolded is essential — because the same chain works against any Google Workspace or Microsoft 365 tenant.
- A Staff Member Tries a Useful SaaS Tool A Vercel engineer signs up for Context.ai to automate a workflow. Context.ai asks them to "Sign in with Google." The engineer clicks Allow on the consent screen, authorising the Context.ai OAuth app to read their mailbox, calendar, and Drive. This is routine behaviour — it happens in every business every day.
- The OAuth Token Is Stored by Context.ai Context.ai now holds a Google OAuth refresh token tied to the engineer's corporate Google Workspace account. The token sits inside Context.ai's infrastructure for months. It does not expire, and it does not need the user's password or MFA to be used.
- Context.ai Gets Compromised An attacker breaches Context.ai. The specific method has not been publicly disclosed, but the outcome is clear: the attacker gets a dump of every OAuth token Context.ai holds — hundreds of tokens, each one a master key to a customer Google account.
- The Attacker Replays the Token The attacker uses the stolen OAuth token to call Google APIs as the Vercel engineer. To Google Workspace, the request looks legitimate — the token is valid, the client ID matches, MFA is irrelevant because it was already completed when the token was issued.
- Pivot into Vercel Internal Systems Using the hijacked Google Workspace account, the attacker accesses Vercel environments via the employee's Google identity. They read customer environment variables that were not marked as sensitive.
- Data Exfiltration and Extortion The attacker pulls API keys, database connection strings, and other secrets out of customer environment variables. ShinyHunters posts the data for sale on a hacking forum at a $2M price point. Vercel disclosures, breach notifications, and customer credential rotations begin.
Notice what this chain did not require: no phishing email, no malware on an endpoint, no unpatched CVE, no password guessing, no MFA bypass. The only thing the attacker needed was a single employee clicking "Allow" on a SaaS consent screen months earlier.
Why This Can Happen to Any Business on Google Workspace or Microsoft 365
The Vercel breach is a supply-chain attack on the SaaS layer. It is not exotic or unusual — it is the predictable consequence of how Google Workspace and Microsoft 365 handle third-party app consent out of the box.
The Default Settings Are Not Safe
By default, Google Workspace and Microsoft 365 both allow ordinary users to consent to third-party OAuth applications without any admin approval. When your marketing coordinator tries a new AI writing tool, your accountant tries a new bookkeeping plugin, or your sales rep tries a new CRM add-on and clicks "Sign in with Google" or "Sign in with Microsoft" — they are silently granting that vendor persistent access to their corporate mailbox, Drive, or SharePoint.
Nobody asks IT. Nobody audits the vendor. Nobody reads the scopes. The tool works. The employee is happy. The OAuth token sits on the vendor's servers until the vendor gets breached.
Research published by Google Workspace shows that large organisations typically have hundreds of OAuth apps connected to their tenant without central oversight — a phenomenon often called "shadow SaaS." Microsoft publishes similar warnings in its Entra ID app consent documentation, recommending that administrators restrict user consent to verified publishers only and treat unrestricted user consent as unsafe.
For Australian SMEs, the reality is worse. Small businesses rarely have a dedicated identity administrator, rarely know what OAuth apps they have connected, and almost never audit them. The ACSC has repeatedly warned about cyber supply chain risk, and it maps directly to this attack class: your security is only as strong as the weakest SaaS vendor one of your staff connected to their Google or Microsoft account.
If You Cannot Answer These Questions, You Are Exposed
- How many third-party OAuth apps are currently connected to your Microsoft 365 or Google Workspace tenant?
- Which users consented to which apps, and when?
- What scopes did they grant — mailbox read, calendar write, full Drive access?
- Is Context.ai (or any other recently breached vendor) currently holding a live token for one of your users?
- Can a new staff member today consent to an unvetted SaaS tool without anyone in IT knowing?
What Data Can Leak Through a Compromised OAuth App
The impact depends on the scopes the app requested — and most SaaS tools request broad scopes because broad scopes make the product work better. When the vendor gets breached, the attacker inherits whatever the scope allows.
| OAuth Scope Granted | What the Attacker Can Read or Do |
|---|---|
| Mail (Gmail / Graph Mail.Read) | Full mailbox contents, attachments, draft messages, sent items, historic email. Ideal for Business Email Compromise (BEC) and invoice fraud. |
| Drive / OneDrive / SharePoint | Every file the user has access to — including shared company drives, financial spreadsheets, customer data, contracts, and source code. |
| Calendar | Full meeting history including attendees, subjects, descriptions, and attachments. Useful for social engineering and targeting. |
| Contacts / People | Entire organisational directory and personal contacts. Used to build phishing target lists. |
| Teams / Chat | Internal chat history, shared files, and channel conversations — where staff often share credentials and sensitive info. |
| Mail.Send / Gmail Send | Attacker can send email as the user to anyone — internal staff, customers, suppliers — from the real address, not a spoof. |
| Full Directory (Microsoft) | Everything the user has access to across the Microsoft 365 tenant, equivalent to account takeover. |
In the Vercel case, the pivot from the engineer's Google account into Vercel's internal tooling exposed customer environment variables — API keys, database passwords, third-party service credentials. For Australian businesses running Google Workspace or Microsoft 365 with standard scopes, the equivalent leak is typically the CEO's mailbox, the finance team's SharePoint library, or the sales team's customer contact database.
The OAIC's Notifiable Data Breaches scheme requires Australian businesses to notify the OAIC and affected individuals "as soon as practicable" once there are reasonable grounds to believe an eligible breach has occurred, with a 30-day outer limit for completing the assessment of a suspected breach. An OAuth app compromise that exposes personal information — customer contact lists, mailboxes, HR files — is notifiable, and the assessment clock starts the moment the organisation has reasonable grounds to suspect. Businesses without OAuth audit capability typically find out only when the breach is reported in the media.
How to Lock Down OAuth Apps in Google Workspace
Google Workspace provides strong OAuth controls — they are just off by default. Every Google Workspace tenant should do the following.
- Set API access to Restricted In Admin console go to Security > Access and data control > API controls. Move your organisation from Unrestricted to Restricted for Google services. This means only apps you explicitly trust can access restricted scopes — everything else is blocked.
- Review the third-party app inventory Under API controls > Manage third-party app access, list every app currently connected to your tenant. For each app, decide one of four access levels: Trusted (access to all requested Google Workspace services, including restricted scopes), Limited (unrestricted Google services only regardless of what the app requests), Specific Google data (scope-based — app is limited to the OAuth scopes you explicitly allow), or Blocked (users cannot consent to or use the app at all). Anything you do not recognise should be Blocked immediately.
- Enable OAuth app access requests When you set the default to Blocked, staff can still request admin approval for legitimate tools. This turns OAuth app consent into a managed workflow rather than a free-for-all.
- Use scope-based controls Google now allows admins to restrict third-party apps to specific OAuth scopes. A productivity plugin might legitimately need calendar read access, but it should not need mailbox read access. Granular scope enforcement prevents apps from quietly expanding their permissions during an update.
- Audit the OAuth log events The Admin console exposes OAuth log events (Reporting > Audit and investigation > OAuth log events) showing which users have granted access to which apps, with which scopes, and when — along with authorize and revoke events. Review it regularly and revoke tokens for apps that are no longer in use.
- Hunt for the Context.ai OAuth app ID Specifically search for the client ID
110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.comidentified in the Vercel bulletin. If you find it, revoke it across every user account and rotate anything the app could have accessed.
For complete guidance, see Google's official documentation on controlling which apps access Google Workspace data.
How to Lock Down OAuth Apps in Microsoft 365
Microsoft 365 — specifically Microsoft Entra ID — offers equivalent controls, and Microsoft explicitly recommends restricting user consent to verified publishers as a baseline production posture.
- Restrict user consent In the Entra admin centre go to Identity > Applications > Enterprise apps > Consent and permissions > User consent settings. Change from "Allow user consent for apps" to either "Allow user consent for apps from verified publishers, for selected permissions" (safer baseline) or "Do not allow user consent" (fully centralised). Microsoft recommends against unrestricted user consent.
- Enable the admin consent workflow Under the same Consent and permissions menu, enable Admin consent requests. When a user tries to consent to an app they no longer have permission for, Entra generates a request that admins can review and approve through the portal or email. This turns risky app connections into a governed process.
- Review Enterprise apps In Entra admin centre > Enterprise apps, list every OAuth application registered to your tenant. Check permissions, user assignments, last sign-in date, and publisher verification status. Anything with admin-level scopes from an unverified publisher should be investigated or removed.
- Use app governance (Microsoft Defender for Cloud Apps) If you have Defender for Cloud Apps licensing, enable app governance policies to flag apps with risky scope combinations, unusual data access patterns, or connections from anomalous locations. This provides ongoing behavioural detection on top of the one-time lockdown.
- Review sign-in logs for token replay Entra sign-in logs capture application token use. Filter for app-only or workload identity sign-ins from unexpected IP ranges (cloud hosting providers, non-AU geos) and investigate. The Vercel breach was only possible because nobody was watching for token replay.
- Rotate app secrets and review conditional access Ensure Conditional Access policies cover service principals and workload identities, not just users. Many organisations apply strong MFA to users but leave automated app access wide open.
For full technical guidance, see Microsoft's application consent management documentation.
How AyeTech Protects Managed Tenants
OAuth App Governance Is Already Enforced Across Every AyeTech-Managed Tenant
The Vercel breach is a headline today, but the underlying risk — a staff member granting an unknown SaaS app access to their corporate account — has been standard attack methodology for years. AyeTech treats OAuth app governance as a core part of Microsoft 365 and Google Workspace hardening for every managed client.
- User consent is restricted on day one When AyeTech onboards a Microsoft 365 or Google Workspace tenant, we immediately restrict user consent to verified publishers (M365) or move API access to Restricted (Google). Staff cannot silently authorise risky apps.
- Admin consent workflow is enabled Legitimate tools still get approved — but through a controlled workflow where we review the app, the publisher, and the requested scopes before granting access.
- OAuth app inventory is audited regularly We maintain an inventory of every connected app per tenant and review scope, usage, and publisher status on an ongoing schedule.
- Known malicious app IDs are hunted across every tenant When a breach like Vercel/Context.ai is disclosed with a specific malicious OAuth app ID, we hunt for that ID across every managed tenant within hours of disclosure and revoke it if present.
- Sign-in and audit logs are monitored for token replay Unusual application sign-ins from cloud hosting IPs, impossible-travel patterns, and bulk API reads of mailboxes or Drives are flagged automatically.
- Incident response is ready If a client staff member's account is connected to a compromised SaaS vendor, we revoke tokens, review mail rules, audit SharePoint/Drive access logs, and rotate anything the app could have accessed — before the attacker can pivot further.
Result: No AyeTech-managed tenant was exposed to the Context.ai OAuth app. And if any future SaaS breach follows the same pattern, our clients will be protected by the same controls that were already in place.
Not Sure If Your Tenant Is Exposed?
If you manage your own Microsoft 365 or Google Workspace, the first step is an audit. AyeTech runs a full OAuth app audit across your tenant: every app, every user, every scope, every risky consent. We check for the Context.ai app ID, map your exposure to recent SaaS breaches, and deliver a concrete hardening plan. Book a free SaaS security assessment or call 02 9188 8000.
Why You Cannot Do This Alone
OAuth app governance is not difficult in theory. The Google Admin console has the settings. The Microsoft Entra portal has the settings. Microsoft explicitly tells administrators to change the defaults. Google explicitly tells administrators to audit the inventory.
But in practice, self-managed SMEs almost never do this — because they do not know the risk exists, do not have the licensing, do not have the time, or assume that because Microsoft and Google are big companies, the defaults must be safe. They are not.
| AyeTech-Managed Business | Self-Managed Business |
|---|---|
| User OAuth consent restricted on day one | Staff can consent to any app, to any scope, without approval |
| Full app inventory reviewed regularly | Does not know what apps are connected |
| Admin consent workflow in place | No visibility when a new app connects |
| Malicious OAuth app IDs hunted within hours of disclosure | Finds out from the news — weeks later, if ever |
| Token replay monitored continuously | No detection capability |
| Incident response ready for SaaS vendor breaches | Discovers breach when customer data shows up on a hacking forum |
The Vercel breach is a single high-profile example. The same attack vector is used every week against smaller, less newsworthy organisations — law firms, accountants, manufacturers, medical practices — whose data never makes the headlines but whose clients still suffer the consequences. Under the Notifiable Data Breaches scheme, "we did not know that app was connected" is not a defence.
What AyeTech Does for Every Managed Tenant
- OAuth app governance: Restricted user consent, admin consent workflow, verified publisher enforcement, and ongoing scope review for Microsoft 365 and Google Workspace
- SaaS inventory management: Every connected third-party app is catalogued, risk-rated, and reviewed regularly — shadow SaaS is eliminated
- Threat intelligence response: When a SaaS vendor is breached, we hunt for its OAuth app ID across every managed tenant and revoke access immediately
- Token replay detection: Sign-in logs are monitored for application-only authentications from unexpected sources
- Incident response: Compromised OAuth access triggers token revocation, mail rule audits, OAuth consent reviews, and full remediation
- Staff training: Your team learns why "Sign in with Google" or "Sign in with Microsoft" is not the same as downloading a local app — and what to check before clicking Allow
The cost of managed IT is a fraction of a single OAuth-driven data breach. The cost of not having it is discovering your data for sale on a hacking forum alongside Vercel's.
Is Your Microsoft 365 or Google Workspace Tenant Audited?
If you do not know what OAuth apps are connected to your tenant, you are exposed to the same attack class that breached Vercel. AyeTech runs a full OAuth app audit, locks down user consent, and monitors for future SaaS vendor breaches — across both Microsoft 365 and Google Workspace.
Book a SaaS Security Audit Call Now: 02 9188 8000Or email us at [email protected] and we will check your tenant exposure within 24 hours.
Frequently Asked Questions
Vercel was breached through a compromised Google Workspace OAuth application belonging to Context.ai, a third-party AI tool used by a Vercel employee. When Context.ai was compromised, attackers gained access to every Google Workspace account that had previously consented to the Context.ai OAuth app — including the Vercel employee's account. From there, they pivoted into Vercel's internal environments and read customer environment variables that were not marked as sensitive. Vercel confirmed the incident in an official bulletin on 19 April 2026.
Yes — and it is one of the most common ways SaaS tenants are breached in 2026. Any staff member who signs in to a third-party SaaS tool using "Sign in with Google" or "Sign in with Microsoft" grants that tool an OAuth token with access to their mailbox, files, or calendar. If that third-party SaaS tool is compromised, the attacker inherits that access. Without OAuth app governance in Google Workspace or Microsoft Entra, any employee can authorise any app with no visibility or approval. AyeTech locks this down across every managed tenant.
Whatever the user granted the app access to — and most apps request broad scopes. Common leaked data includes full mailbox contents, attachments, OneDrive and Google Drive files, SharePoint libraries, Teams or Slack messages, calendar entries with meeting contents, contact lists, and — in dev-heavy organisations like Vercel — source code, environment variables, API keys, and database credentials. OAuth tokens survive password resets and typical MFA, so compromise can persist for months undetected. AyeTech's cyber security services audit every connected app across your tenant.
In Microsoft Entra ID, navigate to Enterprise apps > Consent and permissions and set user consent to either "Do not allow user consent" (fully centralised) or "Allow user consent for apps from verified publishers for selected permissions" (a safer baseline). You should also enable the admin consent workflow so users can request access through a managed process. This requires Entra ID licensing and an understanding of which apps your business legitimately needs. AyeTech configures this across all managed Microsoft 365 tenants. Get in touch to have your tenant checked and locked down.
In the Google Admin console, go to Security > Access and data control > API controls and move your organisation to "Restricted" for Google services. Then individually review every third-party OAuth app under "Third-party app access" and mark each as Trusted, Limited, or Blocked. You should also enable OAuth scope-based controls so apps cannot quietly expand their permissions in the future. Finally, review the OAuth Token audit log to see which apps your staff have already connected. AyeTech can audit your tenant and implement the full hardening baseline.
You need to audit every app consent across every user account, cross-reference against known malicious app IDs (Vercel published the Context.ai app ID as 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com), review API access logs for unusual bulk reads of mailboxes or files, and check for new mail forwarding rules the attacker may have created. This is not a five-minute job. AyeTech runs this audit across every managed tenant and continues to monitor for new OAuth consents every day. Call us on 02 9188 8000 for an immediate assessment.
Yes. AyeTech performs OAuth app audits across Google Workspace and Microsoft 365 tenants as part of our cyber security services. We list every connected app, review scopes, flag risky consents, revoke unused access, enforce admin consent workflows, and hunt for known malicious OAuth app IDs in your tenant. Contact AyeTech on 02 9188 8000 for a free SaaS security assessment.
An OAuth token is a credential issued by an identity provider (Google or Microsoft) after a user successfully authenticates and consents to a third-party app. The token lets the app access defined resources without prompting the user again. Because MFA was completed at the moment of consent, subsequent API calls using the token do not re-challenge the user — the token itself is proof of a completed authentication. If an attacker steals the token, they inherit that completed authentication. This is why MFA, password resets, and most Conditional Access sign-in controls do not stop token replay.
Context.ai is an AI-agent platform used for enterprise workflow automation. Multiple outlets, including The Hacker News and BleepingComputer, identified Context.ai as the compromised third-party tool referenced in Vercel's 19 April 2026 bulletin. It is the kind of SaaS that employees in tech-forward businesses sign up for individually without IT involvement — often to trial AI workflows, summarisation, or agent-driven automation. That routine self-service signup created the consent that gave attackers access.
ShinyHunters is a threat actor handle that has been associated with numerous high-profile data theft and extortion incidents since 2020. In the Vercel incident, a threat actor using that name posted on a hacking forum claiming to have breached Vercel and offered the stolen data for approximately $2 million. Vercel has not officially attributed the incident to any specific group in its public bulletin. Claims made under the ShinyHunters brand should be treated as the stated identity of the seller rather than verified attribution.
Access tokens are typically valid for about one hour, but refresh tokens — which let an app obtain a new access token without reprompting the user — commonly stay valid for 90 days or longer and can be automatically renewed. In practice, if nothing revokes the consent, a refresh token can persist for months or years. This is the critical problem with OAuth app compromise: a token granted today can still be working silently for an attacker long after the employee has left the company, changed their password, or forgotten the app even exists.
No. OAuth tokens are independent of the user's password. A password reset does not invalidate existing tokens for most third-party OAuth apps. To revoke access, you must explicitly remove the app's consent: in Google, at myaccount.google.com > Security > Third-party apps & services > See all connections > select app > Remove access; in Microsoft, at myapplications.microsoft.com > profile > Manage your account / app permissions; or from the admin console at a tenant level. In an incident, admins should revoke all refresh tokens, remove the app consent, and rotate any secrets the app could have accessed — all of which AyeTech handles as part of incident response.
Shadow SaaS is the collection of third-party cloud applications that staff sign up for and connect to corporate accounts without IT visibility or approval. Each connection creates an OAuth consent — which is effectively a persistent access grant to your corporate data stored in someone else's infrastructure. The danger is that IT does not know the app exists, does not know what data it accesses, does not know the vendor's security posture, and will not know when the vendor gets breached. The Vercel/Context.ai incident is a textbook shadow SaaS outcome.
The core user-consent restriction (disabling user consent or limiting it to verified publishers) is available with any Microsoft Entra ID tier, including the free tier bundled with Microsoft 365 Business Basic. The admin consent request workflow is also available without paid Entra licensing. Advanced behavioural detection — app governance via Microsoft Defender for Cloud Apps — requires a higher-tier license. The baseline lockdown is therefore available to every Microsoft 365 customer at no extra cost; most businesses just never change the defaults.
The Google Workspace Admin console API controls for third-party app access are available across all paid Google Workspace tiers, including Business Starter, Business Standard, Business Plus, and Enterprise. Any Google Workspace admin can move the tenant to Restricted for Google services, review third-party app access, and block or allow apps individually. Some advanced scope-based controls were rolled out to general availability in late 2024 and are widely available today.
If the breach involves personal information and is likely to result in serious harm, yes — under the Notifiable Data Breaches scheme operated by the Office of the Australian Information Commissioner (OAIC), eligible data breaches must be reported to the OAIC and affected individuals as soon as practicable. The "we did not know the app was connected" defence does not exempt an organisation from notification obligations. If an OAuth app had access to customer emails, contact lists, HR files, or other personal data and a breach is suspected, the notification clock starts when the organisation becomes aware.
MITRE ATT&CK technique T1528 is "Steal Application Access Token" — the technique of obtaining OAuth or other application tokens to gain access to resources. The Vercel/Context.ai incident is a textbook T1528 case: attackers obtained OAuth tokens from a compromised third-party application and used them to access resources as the token owner. Defensive mapping involves restricting user consent, reviewing granted scopes, monitoring for unusual token use, and maintaining an inventory of approved applications.
A full audit should happen at least quarterly, and ideally monthly. New apps should trigger review on connection (which is exactly what the admin consent workflow does). A baseline audit is essential on day one for any tenant that has been running with default settings — because the existing consent backlog is usually large. AyeTech runs continuous OAuth inventory review for managed tenants, so new consents are reviewed as they happen rather than once per quarter.
A Microsoft verified publisher is an app developer whose Microsoft AI Cloud Partner Program account (formerly the Microsoft Partner Network) has been verified and whose app has been confirmed to be associated with that verified publisher's Entra tenant. A verified badge appears in the consent prompt and Enterprise apps page. Limiting user consent to verified publishers raises the bar significantly — unverified publisher apps cannot be consented to by end users and require admin approval — without blocking legitimate vendors. It is a middle ground between free-for-all consent and fully centralised control.
In Google Workspace Admin console API controls, each third-party OAuth app can be categorised as Trusted (the app has access to all requested Google Workspace services, including restricted scopes), Limited (the app can only access unrestricted Google services, regardless of what it requests), Specific Google data (the app is restricted to only the OAuth scopes you explicitly allow — scope-based control, generally available from late 2024), or Blocked (users cannot consent to or use the app at all). Best practice is to default the tenant to Restricted, mark only vetted apps as Trusted, leave most apps Limited or scope-restricted, and Block anything unnecessary or unknown.
Partially, but not by default. Standard Conditional Access policies are typically scoped to interactive user sign-ins — they do not automatically apply to service principals or workload identities using OAuth tokens. Microsoft offers Conditional Access for Workload Identities (a separately licensed SKU — "Workload Identities Premium") and app governance through Defender for Cloud Apps, both of which can detect and block suspicious token activity. Combining user-consent restriction, admin consent workflow, Token Protection / Continuous Access Evaluation, and workload identity Conditional Access provides the strongest layered defence.
Yes — arguably worse, because corporate controls do not apply to personal accounts. If a staff member connects a SaaS tool to a personal Gmail or Outlook.com account that also receives work email, and the SaaS vendor gets breached, corporate data in that mailbox is exposed without any way for IT to audit, monitor, or revoke. This is one of the reasons AyeTech recommends strict separation between personal and corporate accounts and enforces forwarding/delegation restrictions on corporate mailboxes.
A phishing attack tricks the user into entering credentials on a fake site or approving a rogue MFA prompt. Defences like phishing-resistant MFA (FIDO2, passkeys), user training, and email filtering can prevent or detect it. An OAuth app breach does not involve fake sites, stolen passwords, or MFA prompts. The user legitimately authenticated to a legitimate app months earlier. The attacker exploits the third party's compromise, not the user's behaviour. This is why the defence is consent governance — not awareness training. See our related post on device code phishing for another OAuth-based attack vector.
Yes. Vercel CEO Guillermo Rauch said on X that he suspects the attackers were "significantly accelerated by AI," citing the velocity and depth of understanding they demonstrated of Vercel's systems — framed as his personal assessment rather than a formal attribution. AI-assisted attackers can more quickly parse stolen tokens, map scopes, fingerprint internal systems, and identify the highest-value pivot paths. The defensive implication is that the window between initial compromise and full exploitation is shrinking — making proactive controls like consent restriction and continuous token monitoring more important, not less.
Tell them the truth: their corporate Google or Microsoft account is the crown jewel, and connecting it to a random SaaS tool gives that vendor persistent access to company data. When the vendor gets breached — which happens regularly — the attacker inherits their access. Explain that they can still request access to legitimate tools through the admin consent workflow, usually approved within hours. Framing this as "we want you to use great tools safely" rather than "no" preserves productivity while eliminating silent exposure.
It depends on the policy, but many cyber insurance policies are tightening exclusions around supply chain attacks and around breaches caused by inadequate access controls. If your tenant allowed unrestricted user consent and no OAuth app inventory was maintained, an insurer may argue inadequate security controls as grounds to reduce or deny a claim. Review your policy wording and talk to your broker. Implementing OAuth consent restriction, admin consent workflow, and continuous audit is increasingly considered baseline due diligence.
For Google Workspace, log in to the Admin console, go to Security > API controls > App access control > Manage third-party app access, and search for the app client ID published by Vercel (110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com). If present, block it and revoke consent for every user. For Microsoft 365, review Enterprise apps in the Entra admin centre for any Context.ai-related app and remove it. Beyond this specific incident, the broader question — how many other unknown apps have access — requires a full OAuth audit. Call AyeTech on 02 9188 8000 and we will run the full audit for you.
No. Vercel also suffered an OAuth-related incident earlier through the Nx package / GitHub supply-chain compromises, which is why several commentators have framed the April 2026 Context.ai incident as "Vercel got pwned by an OAuth app — again." The lesson is that OAuth app compromise is a recurring class of attack, not a one-off. Organisations that treat it as an ongoing governance discipline — inventory, consent restriction, audit — suffer fewer incidents than organisations that treat each breach as an isolated surprise.
OAuth 2.0 is the industry-standard protocol that lets a user grant a third-party application limited access to their account data on another service — without sharing their password. When you click "Sign in with Google" or "Sign in with Microsoft" and consent to a list of permissions, the service issues the third-party app a token that represents that authorised access. The app can then call APIs on your behalf until the token expires or consent is revoked. OAuth is everywhere in modern SaaS — which is exactly why compromised OAuth apps are such a high-impact attack vector.
An access token is a short-lived credential (typically about one hour) that lets an app call APIs on the user's behalf. A refresh token is a longer-lived credential the app uses to obtain a new access token without re-prompting the user — Microsoft's default refresh token lifetime is 90 days, and Google production apps often have effectively indefinite refresh tokens unless unused for six months or revoked. If an attacker steals a refresh token, they can silently keep generating new access tokens for months. This is why revocation of the app's consent — not just password rotation — is essential in incident response.
Any business running Microsoft 365 or Google Workspace is at risk, but the sectors most exposed are those where staff enthusiastically adopt new SaaS tools without central IT approval: professional services (legal, accounting, consulting), creative agencies, tech and SaaS companies, health and wellness, property, and financial services. Industries handling regulated data (health, finance, legal) also face the highest downstream cost because a breach automatically triggers OAIC NDB obligations, client confidentiality breaches, and potential professional-conduct consequences.
Revoking consent invalidates the refresh token and prevents the app from minting new access tokens — but any already-issued access token remains valid for its remaining lifetime (up to about an hour). Additionally, if the attacker used the OAuth access to create mail-forwarding rules, create new OAuth consents to secondary apps, add new sign-in methods, or exfiltrate data to external storage, those persistence mechanisms survive the revocation. Proper incident response requires full remediation — not just consent removal. AyeTech handles this end-to-end for managed clients.
Report to the Office of the Australian Information Commissioner using the Notifiable Data Breach form at oaic.gov.au. The form captures the nature of the breach, the personal information involved, the steps the organisation has taken to contain and assess it, and the notification being made to affected individuals. Reports should be lodged as soon as practicable after reasonable grounds to believe an eligible breach has occurred. AyeTech's incident response includes preparation of NDB paperwork, engagement with the OAIC where required, and coordinated notification to affected individuals.
Microsoft Defender for Cloud Apps is Microsoft's Cloud Access Security Broker (CASB) product, which includes an "app governance" feature that continuously discovers OAuth apps registered in your Entra tenant, profiles their behaviour, and alerts on suspicious activity — over-permissioned apps, unusual bulk API reads, consent by a risky user, or tokens being used from anomalous locations. It is a higher-tier licensed feature (typically bundled in Microsoft 365 E5 or purchased standalone) and it is the strongest continuous-monitoring layer on top of user-consent restriction.
Token Protection (sometimes called token binding) is a Conditional Access feature that cryptographically ties a refresh token to the device that originally received it. If an attacker steals the token and tries to use it from a different device, Microsoft rejects the authentication. Token Protection is one of the strongest defences against token replay attacks like the Vercel/Context.ai scenario, but it requires modern client support and specific Conditional Access licensing. It is still rolling out across the Microsoft ecosystem and is not yet a complete solution, but it is the trajectory of where enterprise token security is heading.
Continuous Access Evaluation is a Microsoft Entra feature that allows real-time revocation of access tokens in response to critical events — password change, user disablement, MFA credential revocation, high-risk sign-in detection. Without CAE, access tokens remain valid for their full lifetime regardless of what happens to the underlying user. With CAE enabled and supported by the client, a compromised account can be locked out within minutes rather than hours. CAE is on by default for most modern Microsoft 365 scenarios, but administrators should verify it is enforced and that legacy clients are not bypassing it.
Delegated permissions are scopes granted to an app acting on behalf of a signed-in user — the app can only access what the user can access. Application permissions (often called "app-only" or "workload identity" permissions) let the app act without any user — typically with broader, tenant-wide access. Application permissions are more powerful and should always require admin consent. Many high-impact OAuth breaches involve apps that were granted application permissions (for example Mail.Read at tenant scope) without adequate review. AyeTech audits both permission types across managed tenants.
Not entirely — "Sign in with Google" or "Sign in with Microsoft" is often more secure than letting staff create separate passwords per SaaS tool, because it centralises authentication and MFA. The risk is not the SSO button; it is the OAuth consent that usually accompanies it. The right answer is to keep SSO but control what apps are allowed to request consent (via the admin consent workflow) and what scopes they can be granted (via scope-based restrictions). AyeTech configures this balance across every managed tenant.
At minimum: confirm the vendor has SOC 2 Type II or ISO 27001 certification, review their security and privacy pages for evidence of encryption, access control, and breach response, check their status page for past incident history, review the OAuth scopes they require against what they actually need, check the publisher verification badge in the consent prompt, and search for the vendor's name alongside "breach" or "incident" before granting access. Large organisations run this through a formal vendor risk assessment. Smaller organisations rely on their MSP — AyeTech performs this evaluation for managed clients on request.
OAuth app governance is not a named Essential Eight strategy, but it directly supports several of them: Restrict Administrative Privileges (by preventing silent delegation of access via consent), Multi-Factor Authentication (by preserving MFA's effectiveness against token replay), Application Control (by treating OAuth apps as application-layer code that needs control), and User Application Hardening. Many maturity level 2 and 3 organisations find that OAuth app governance is required to pass a full Essential Eight audit, even though the framework does not name it explicitly. See our Essential Eight compliance guide for more detail.
Underwriters increasingly ask whether user consent is restricted in Microsoft 365 and Google Workspace, whether a third-party app inventory exists, how often it is reviewed, and how OAuth consent is monitored. Documentation should include: a screenshot or configuration export of user-consent settings, a current app inventory with risk ratings, the most recent audit log, and a policy statement describing consent and revocation procedures. AyeTech provides managed clients with underwriting-ready OAuth governance documentation as part of cyber security services.
Very similar pattern. In the 2025 Salesforce/Drift incident, attackers compromised the Drift chatbot vendor and inherited OAuth tokens that gave access to every Salesforce customer that had connected Drift. In April 2026, attackers compromised Context.ai and inherited OAuth tokens that gave access to every Google Workspace tenant that had connected Context.ai — Vercel being the highest-profile victim. The recurring pattern is: one upstream SaaS vendor breached, hundreds of downstream customers exposed. The only reliable defence is consent governance and continuous app audit on the downstream side — because you cannot control the upstream vendor's security.
Act in this order: revoke the app's consent and delete the enterprise application / remove third-party app access; revoke all refresh tokens for every user who consented; reset the users' passwords and sign them out of all sessions; audit mail-forwarding rules, inbox rules, and OAuth consents for secondary apps the attacker may have created; review audit logs for bulk mailbox or file reads, data exfiltration, and sign-ins from unfamiliar IPs; rotate any secrets the app could have accessed (API keys, connection strings); and begin the NDB assessment if personal information is involved. Call AyeTech on 02 9188 8000 if you want this run for you.
A service principal is the identity that a third-party application uses inside your Microsoft Entra tenant when it acts on your organisation's behalf. Every time a user consents to an app, a service principal for that app is created in your tenant. Service principals hold the permissions that were consented to — which is why auditing them is the core activity of OAuth governance. If a service principal has broad scopes and belongs to an obscure vendor, that is exactly what an attacker inherits if the vendor is breached.
Yes — both platforms expose per-user app consent data. In Google Workspace, the Admin console OAuth log events and the OAuth grant activity report break down consents by user, app, and scope. In Microsoft Entra, Enterprise apps and the Sign-in logs show which users have consented to which apps and when. This data lets you identify the "shadow SaaS power users" who have granted the most consents — a common risk pattern, because those users become the highest-value accounts for attackers to target.
About AyeTech
AyeTech is a Sydney-based managed IT services provider specialising in Microsoft 365 and Google Workspace security for Australian small and medium businesses. We proactively lock down OAuth app consent, audit connected SaaS applications, hunt for known malicious OAuth app IDs, and respond to emerging SaaS supply-chain incidents like the Vercel/Context.ai breach before our clients are impacted.
Contact Information:
- Phone: 02 9188 8000
- Email: [email protected]
- Address: Suite 203, Level 8, 99 Walker St, North Sydney, NSW 2060
- Service Areas: Sydney, Melbourne, Brisbane, Perth, Adelaide
Sources:
- Vercel — April 2026 Security Incident Official Bulletin
- The Hacker News — Vercel Breach Tied to Context AI Hack
- BleepingComputer — Vercel Confirms Breach as Hackers Claim to Sell Stolen Data
- iTnews — Cloud Deployment Firm Vercel Breached, Advises Secrets Rotation
- Google — Control Which Apps Access Google Workspace Data
- Microsoft — Configure How Users Consent to Applications
- Microsoft — Application Consent Management
- ACSC — Cyber Supply Chains
- OAIC — Notifiable Data Breaches Scheme
Related Resources: