Steal Smarter, Not Harder: Malicious use of Vercel for Credential Phishing
Threat actors are increasingly leveraging Vercel's GenAI capabilities, specifically v0.dev, to rapidly generate and host highly convincing credential phishing pages. By combining AI-generated frontends with Telegram Bot API integrations for real-time credential exfiltration, attackers can deploy resilient, low-effort phishing infrastructure on legitimate cloud services that evades traditional detection mechanisms.
Authors: Micah DeHarty
Source:
Cofense
- domainv0[.]devVercel's GenAI tool abused by attackers to generate phishing templates via text prompts.
- domainvercel[.]appLegitimate Vercel hosting domain frequently abused by threat actors to host GenAI-generated phishing pages.
Detection / HunterGoogle
What Happened
Cybercriminals are using a legitimate web development tool called Vercel, which features Artificial Intelligence, to quickly build fake login websites. These fake sites look exactly like real ones from brands such as Microsoft, Adidas, and Spotify, and are used to steal usernames and passwords. This matters because the AI makes the fake sites look so perfect that traditional advice like "look for spelling mistakes" no longer works. Organizations should train employees to look for other signs of phishing, verify website addresses carefully, and report any suspicious links.
Key Takeaways
- Threat actors are abusing Vercel's GenAI tool, v0.dev, to rapidly generate highly realistic phishing pages via simple text prompts.
- Vercel's cloud hosting allows attackers to easily deploy and redeploy phishing sites, bypassing traditional infrastructure setup and evading domain reputation blocks.
- Attackers are integrating the Telegram Bot API with Vercel-hosted pages to exfiltrate stolen credentials in real-time.
- Commonly spoofed brands include Microsoft, Spotify, and various apparel/luxury brands (Nike, Adidas) using fake job interview lures.
- The use of GenAI eliminates traditional phishing indicators like poor grammar and spelling, making visual identification by end-users much more difficult.
Affected Systems
- Web Browsers
- Email Clients
- End Users
Attack Chain
Attackers use Vercel's v0.dev GenAI tool to generate realistic phishing pages spoofing well-known brands via simple text prompts. The generated pages are hosted on Vercel's cloud infrastructure, providing resilience against takedowns. Lures are distributed via email, often masquerading as job interviews or standard login requests. When victims enter their credentials, integrated Telegram bots exfiltrate the stolen data directly to the attackers in real-time.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
No specific detection rules or queries are provided in the article.
Detection Engineering Assessment
EDR Visibility: None — This is a web-based phishing attack; EDR on the endpoint will not see the server-side generation or network traffic unless intercepting browser telemetry. Network Visibility: Medium — Network sensors can see traffic to vercel.app, but because it is a legitimate service, distinguishing malicious from benign traffic requires SSL inspection and deep URL/content analysis. Detection Difficulty: Hard — Vercel is a legitimate, widely used service, and the AI-generated pages lack traditional phishing kit artifacts, making signature-based detection ineffective.
Required Log Sources
- Web Proxy Logs
- DNS Logs
- Email Gateway Logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Look for unusual spikes in email traffic containing links to vercel.app subdomains, especially from external senders. | Email Gateway Logs | Initial Access | High |
| Monitor for web traffic to vercel.app immediately following clicks on links in emails with subject lines related to job interviews or urgent logins. | Web Proxy Logs, Email Gateway Logs | Execution | Medium |
Control Gaps
- Email filters relying on poor grammar or spelling
- Domain reputation blocks (since vercel.app is a legitimate domain)
Key Behavioral Indicators
- Emails containing vercel.app links combined with HR/Job or Login lures
- Telegram API calls originating from Vercel-hosted web applications
False Positive Assessment
- High
Recommendations
Immediate Mitigation
- Block known malicious vercel.app subdomains identified in phishing campaigns.
- Report identified malicious Vercel sites directly to Vercel for takedown.
Infrastructure Hardening
- Implement strict email filtering rules for vercel.app links originating from unknown or external senders.
- Use web isolation or advanced URL rewriting for cloud-hosted app domains.
User Protection
- Deploy phishing-resistant MFA (e.g., FIDO2 keys) to neutralize credential harvesting.
Security Awareness
- Update phishing awareness training to emphasize that perfect grammar and branding do not guarantee a site is legitimate.
- Train users to verify the URL domain, even if the page looks identical to Microsoft, Spotify, or other known brands.
MITRE ATT&CK Mapping
- T1566.002 - Phishing: Spearphishing Link
- T1583.001 - Acquire Infrastructure: Domains
- T1583.006 - Acquire Infrastructure: Web Services
- T1056.002 - Input Capture: GUI Input Capture
- T1102.002 - Web Service: Bidirectional Communication