Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Anthropic proposes transparency framework for frontier AI development

      July 8, 2025

      Sonatype Open Source Malware Index, Gemini API Batch Mode, and more – Daily News Digest

      July 8, 2025

      15 Top Node.js Development Service Providers for Large Enterprises in 2026

      July 8, 2025

      Droip: The Modern Website Builder WordPress Needed

      July 8, 2025

      The gaming headset I use every day is slashed to its lowest price ever thanks to Amazon Prime Day — “stellar battery life” awaits

      July 9, 2025

      How passkeys work: The complete guide to your inevitable passwordless future

      July 9, 2025

      This Sony OLED TV is my pick for best Prime Day deal – and it’s the last chance to get 50% off

      July 9, 2025

      Blizzard announces release date for World of Warcraft: The War Within’s 3rd major content patch — a patch that will feature the largest, city-sized raid boss in MMORPG history

      July 8, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Top PHP Projects for B.Tech Students: Learn Real Skills with PHPGurukul Projects

      July 8, 2025
      Recent

      Top PHP Projects for B.Tech Students: Learn Real Skills with PHPGurukul Projects

      July 8, 2025

      Deno 2.4: deno bundle is back

      July 8, 2025

      From Silos to Synergy: Accelerating Your AI Journey

      July 8, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      The gaming headset I use every day is slashed to its lowest price ever thanks to Amazon Prime Day — “stellar battery life” awaits

      July 9, 2025
      Recent

      The gaming headset I use every day is slashed to its lowest price ever thanks to Amazon Prime Day — “stellar battery life” awaits

      July 9, 2025

      Blizzard announces release date for World of Warcraft: The War Within’s 3rd major content patch — a patch that will feature the largest, city-sized raid boss in MMORPG history

      July 8, 2025

      Microsoft recently raised the price of the Xbox Series S, but these retailers just dropped it back down again — close to the old price, but not for long

      July 8, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Commvault Nation-State Campaign Could Be Part of Broader SaaS Threat: CISA

    Commvault Nation-State Campaign Could Be Part of Broader SaaS Threat: CISA

    May 23, 2025

    commvault m365 threat campaign saas security cloud security

    Nation-state threat actors targeting Commvault applications hosted in Microsoft Azure may be part of a broader campaign targeting Software-as-a-Service (SaaS) applications, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned in an advisory this week.

    The May 22 CISA advisory builds on a Commvault warning earlier this month that nation-state threat actors were exploiting CVE-2025-3928 to target Commvault applications hosted in their Microsoft Azure cloud environment in an attempt to access customer Microsoft 365 (M365) environments.

    CISA’s new advisory says the agency believes the Commvault M365 threat “may be part of a larger campaign targeting various SaaS companies’ cloud applications with default configurations and elevated permissions.”

    CISA offered no specifics on other SaaS apps that may be targeted, but CISA and Commvault both offered guidance for protecting Commvault and M365 environments, some of which could be applicable to other SaaS apps.

    Commvault M365 Threat Campaign Detailed

    According to CISA, threat actors may have accessed client secrets for Commvault’s Metallic Microsoft 365 backup SaaS solution hosted in Azure. “This provided the threat actors with unauthorized access to Commvault’s customers’ M365 environments that have application secrets stored by Commvault,” the advisory said.

    Commvault’s May 4 update on the incident said the nation-state threat actor “may have accessed a subset of app credentials that certain Commvault customers use to authenticate their M365 environments.” Commvault responded with several remedial actions, including rotating credentials and issuing customer recommendations.

    Commvault also provided guidance for M365, Dynamics 365 and EntraID backups configured with additional single-tenant app registrations.

    Commvault listed known IP addresses associated with the malicious activity for clients to block. Those IP addresses include:

    • 69.148.100
    • 92.80.210
    • 153.42.129
    • 6.189.53
    • 223.17.243
    • 242.42.20

    Guidance for Protecting Commvault and M365

    CISA recommended that organizations apply patches and updates and follow detailed mitigation guidance and best practices, which include:

    • Monitor Entra audit logs for unauthorized modifications or new credentials to service principals initiated by Commvault applications and service principals, and handle deviations from regular login schedules as suspicious
    • Review Microsoft Entra audit, Entra sign-in, and unified audit logs and conduct internal threat hunting
    • For single tenant apps, implement a conditional access policy that limits authentication of an application service principal to an approved IP address listed within Commvault’s allowlisted range of IP addresses (conditional access policies require a Microsoft Entra Workload ID Premium License)
    • Customers who can should establish a policy to regularly rotate credentials at least every 30 days
    • Review the list of Application Registrations and Service Principals in Entra with administrative consent for higher privileges than needed
    • Implement M365 security recommendations outlined in CISA’s Secure Cloud Business Applications (SCuBA) project
    • Where possible, limit access to Commvault management interfaces to trusted networks and administrative systems
    • Detect and block path-traversal attempts and suspicious file uploads by deploying a Web Application Firewall and removing external access to Commvault applications
    • Monitor activity from unexpected directories, especially web-accessible paths.

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
    Next Article ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-49697 – Microsoft Office Heap Buffer Overflow Vulnerability

    July 9, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-49701 – Microsoft Office SharePoint Cross-Site Scripting (XSS)

    July 9, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    The Best Solutions Architects Work at MongoDB

    Databases

    LeetCode Meditations: A Visualized Tour of DSA Concepts (A Handbook)

    Development

    CVE-2024-13419 – WordPress Smart Framework Stored Cross-Site Scripting

    Common Vulnerabilities and Exposures (CVEs)

    DeepSeek vs ChatGPT: Pros, Cons, and Key Differences Explained

    Web Development

    Highlights

    CVE-2025-33117 – IBM QRadar SIEM Command Injection Vulnerability

    June 19, 2025

    CVE ID : CVE-2025-33117

    Published : June 19, 2025, 6:15 p.m. | 23 minutes ago

    Description : IBM QRadar SIEM 7.5 through 7.5.0 Update Package 12 could allow a privileged user to modify configuration files that would allow the upload of a malicious autoupdate file to execute arbitrary commands.

    Severity: 9.1 | CRITICAL

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CISA Alerts on Critical Vulnerabilities in MICROSENS NMP Web+: Attackers Could Gain Full System Access

    June 25, 2025

    A Coding Guide to Different Function Calling Methods to Create Real-Time, Tool-Enabled Conversational AI Agents

    April 29, 2025

    CVE-2025-52883 – Meshtastic-Android PKC Impersonation Vulnerability

    June 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.