Threat actors use Vercel AI tools to create realistic phishing sites at scale


Threat actors are abusing Vercel and its AI website-building tools to create realistic phishing pages that imitate trusted brands and steal login credentials.

Cofense researchers say attackers use Vercel’s GenAI capabilities, hosting, quick deployment, and third-party integrations to build convincing fake sign-in pages with far less effort than traditional phishing kits required.

The risk is practical and immediate. A phishing page that looks clean, loads quickly, and copies a familiar brand can trick users who still rely on spelling mistakes or poor design to spot scams.

Vercel phishing abuse at a glance

DetailInformation
Main platform abusedVercel
AI tool mentioned by researchersv0, previously known as v0.dev
Main attack typeCredential phishing
Common luresFake sign-in pages, job offers, interview invitations, and brand impersonation
Brands observed in examplesMicrosoft, Adidas, Nike, and Spotify
Extra abuse pathTelegram bot integrations for credential delivery
Main defenseVerify domains before entering credentials

How attackers abuse AI-generated web pages

Vercel’s v0 product lets users create web apps and pages from text prompts. In normal use, this helps developers, designers, founders, and teams build faster.

Attackers are using the same speed for phishing. Cofense says a threat actor can prompt the tool to create a fake Microsoft sign-in page, then adjust the page until it resembles the real service.

This lowers the skill barrier. A criminal no longer needs to write the full page by hand, buy a phishing kit, or run complex hosting infrastructure to create a polished login page.

Why these phishing pages are harder to spot

Older phishing training often told users to look for spelling errors, broken layouts, strange colors, or poor grammar. AI-generated pages can remove many of those obvious warning signs.

Cofense says Vercel-hosted phishing pages can closely copy legitimate layouts, logos, colors, and page behavior. That makes visual inspection less reliable.

The URL becomes the most important clue. Even a convincing fake login page still needs to run on a different domain or subdomain than the real service.

Telegram makes credential theft faster

Cofense also observed attackers combining Vercel phishing pages with Telegram bot integrations. This gives criminals a quick way to receive stolen credentials after a victim enters them.

Telegram bots can send messages, upload files, and automate data delivery through the Telegram Bot API. Cofense has separately reported that threat actors use Telegram bots for credential theft and other data exfiltration activity.

This combination makes phishing operations easier to run. Vercel can host the fake page, while Telegram can deliver stolen credentials to the attacker in near real time.

Real campaigns used job and brand lures

Cofense documented phishing campaigns that used fake job offers and interview invitations to pull users into brand-themed pages. In one case, attackers posed as an Adidas hiring manager and led users to a fake careers page.

Researchers also described Nike job-posting lures and Microsoft-themed sign-in pages. These campaigns take advantage of familiar brands and common workflows that employees already trust.

Another example involved a fake Spotify login page. Cofense said the page copied the real service’s logos, wording, color scheme, and functionality before sending stolen credentials to the attacker and redirecting the victim to a page asking for payment card details.

Why Vercel is attractive to attackers

  • AI prompts can generate realistic phishing pages quickly.
  • Cloud hosting removes the need for attackers to manage their own infrastructure.
  • Pages can be redeployed if one version gets removed.
  • Different AI outputs help attackers create variations of the same lure.
  • Integrations with other services can support automation and credential collection.
  • Trusted-looking hosted pages can bypass a user’s visual expectations.

Vercel says it uses moderation and abuse reporting

Vercel’s transparency report says the company uses proactive and reactive moderation against harmful content. This includes detection systems, reporting tools, human review, and content moderation workflows.

Example of a Spotify spoofing web page created using Vercel (Source – Cofense)

The company also has an abuse reporting page for malicious or illegal activity involving Vercel-hosted sites. The form includes categories for phishing or malware, copyright complaints, trademark violations, and other abuse.

That reporting path matters because phishing pages often move quickly. Security teams should report active Vercel-hosted phishing pages while also blocking the domains in email, DNS, proxy, and browser controls.

How organizations should defend users

RiskRecommended action
Convincing fake login pagesTrain users to verify the domain before entering credentials
Vercel-hosted phishing linksMonitor inbound mail for suspicious vercel.app URLs
Credential theftUse phishing-resistant MFA or passkeys where possible
Fast page redeploymentBlock confirmed malicious URLs and related infrastructure quickly
Brand impersonationUse domain monitoring and takedown workflows
User confusionMake reporting suspicious links simple inside email clients

What users should check before signing in

Users should not trust a page only because it looks professional. AI-generated phishing pages can look clean, polished, and familiar.

The safest habit is to check the full browser address before typing a password. Users should confirm that the domain belongs to the service they intended to visit.

When a login page appears after clicking an email link, users should stop and open the service directly from a saved bookmark or by typing the known address manually.

Practical steps for security teams

  • Search mail logs for suspicious Vercel-hosted links.
  • Block confirmed phishing URLs at the email gateway, DNS layer, and secure web gateway.
  • Report malicious Vercel-hosted pages through Vercel’s abuse form.
  • Update phishing training to focus on domains, login flows, and unexpected redirects.
  • Deploy phishing-resistant MFA for high-risk accounts.
  • Review credential use after any user submits data to a suspected phishing page.
  • Monitor for Telegram bot indicators in phishing investigations where available.

The bottom line

AI website builders have made phishing faster, cheaper, and more polished. Attackers can now create pages that look credible without advanced web development skills.

That does not make phishing impossible to detect. It changes what users and defenders should focus on.

Organizations should move away from training that relies mainly on spelling mistakes or ugly page design. Domain checks, phishing-resistant authentication, mail filtering, browser protections, and fast takedown reporting now matter more.

FAQ

How can users spot these phishing sites?

Users should check the full domain in the browser address bar before entering credentials and avoid logging in through unexpected email links.

Why are AI-generated phishing pages dangerous?

They can look polished and familiar, which makes them harder for users to spot through design mistakes or grammar errors.

What is v0?

v0 is Vercel’s AI builder for creating apps and websites from prompts. Vercel says v0.dev became v0.app in 2025.

How are attackers using Vercel for phishing?

Attackers are using Vercel’s AI web-building and hosting features to create realistic fake login pages that imitate trusted brands and collect credentials.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages