Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Commvault Nation-State Campaign Could Be Part of Broader SaaS Threat: CISA

    Commvault Nation-State Campaign Could Be Part of Broader SaaS Threat: CISA

    May 23, 2025

    commvault m365 threat campaign saas security cloud security

    Nation-state threat actors targeting Commvault applications hosted in Microsoft Azure may be part of a broader campaign targeting Software-as-a-Service (SaaS) applications, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned in an advisory this week.

    The May 22 CISA advisory builds on a Commvault warning earlier this month that nation-state threat actors were exploiting CVE-2025-3928 to target Commvault applications hosted in their Microsoft Azure cloud environment in an attempt to access customer Microsoft 365 (M365) environments.

    CISA’s new advisory says the agency believes the Commvault M365 threat “may be part of a larger campaign targeting various SaaS companies’ cloud applications with default configurations and elevated permissions.”

    CISA offered no specifics on other SaaS apps that may be targeted, but CISA and Commvault both offered guidance for protecting Commvault and M365 environments, some of which could be applicable to other SaaS apps.

    Commvault M365 Threat Campaign Detailed

    According to CISA, threat actors may have accessed client secrets for Commvault’s Metallic Microsoft 365 backup SaaS solution hosted in Azure. “This provided the threat actors with unauthorized access to Commvault’s customers’ M365 environments that have application secrets stored by Commvault,” the advisory said.

    Commvault’s May 4 update on the incident said the nation-state threat actor “may have accessed a subset of app credentials that certain Commvault customers use to authenticate their M365 environments.” Commvault responded with several remedial actions, including rotating credentials and issuing customer recommendations.

    Commvault also provided guidance for M365, Dynamics 365 and EntraID backups configured with additional single-tenant app registrations.

    Commvault listed known IP addresses associated with the malicious activity for clients to block. Those IP addresses include:

    • 69.148.100
    • 92.80.210
    • 153.42.129
    • 6.189.53
    • 223.17.243
    • 242.42.20

    Guidance for Protecting Commvault and M365

    CISA recommended that organizations apply patches and updates and follow detailed mitigation guidance and best practices, which include:

    • Monitor Entra audit logs for unauthorized modifications or new credentials to service principals initiated by Commvault applications and service principals, and handle deviations from regular login schedules as suspicious
    • Review Microsoft Entra audit, Entra sign-in, and unified audit logs and conduct internal threat hunting
    • For single tenant apps, implement a conditional access policy that limits authentication of an application service principal to an approved IP address listed within Commvault’s allowlisted range of IP addresses (conditional access policies require a Microsoft Entra Workload ID Premium License)
    • Customers who can should establish a policy to regularly rotate credentials at least every 30 days
    • Review the list of Application Registrations and Service Principals in Entra with administrative consent for higher privileges than needed
    • Implement M365 security recommendations outlined in CISA’s Secure Cloud Business Applications (SCuBA) project
    • Where possible, limit access to Commvault management interfaces to trusted networks and administrative systems
    • Detect and block path-traversal attempts and suspicious file uploads by deploying a Web Application Firewall and removing external access to Commvault applications
    • Monitor activity from unexpected directories, especially web-accessible paths.

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
    Next Article ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Stealth Falcon APT Exploits Microsoft RCE Zero-Day in Mideast

    Security
    Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots

    Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots

    Development

    Ubuntu 25.10 is Officially Named ‘Questing Quokka’

    Linux

    Elden Ring Nightreign: How to unlock character skins and change garb

    News & Updates

    Highlights

    CVE-2025-5797 – Laundry Laundry System Cross-Site Scripting Vulnerability

    June 6, 2025

    CVE ID : CVE-2025-5797

    Published : June 6, 2025, 7:15 p.m. | 33 minutes ago

    Description : A vulnerability was found in Laundry Laundry System 1.0 and classified as problematic. This issue affects some unknown processing of the file /data/insert_type.php. The manipulation of the argument Type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

    Severity: 3.5 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    This Extension Adds Night Light Intensity Slider to Quick Settings

    May 24, 2025

    Playwright Visual Testing: A Comprehensive Guide to UI Regression

    May 8, 2025

    CVE-2025-6915 – PHPGurukul Student Record System SQL Injection Vulnerability

    June 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.