Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 22, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 22, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 22, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 22, 2025

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025

      How to get started with Microsoft Copilot on Windows 11

      May 22, 2025

      Microsoft blocks employees from sending emails that mention “Palestine” or “Gaza”

      May 22, 2025

      I missed out on the Clair Obscur: Expedition 33 Collector’s Edition but thankfully, the developers are launching something special

      May 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025
      Recent

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025

      Opal – Optimizely’s AI-Powered Marketing Assistant

      May 22, 2025

      Content Compliance Without the Chaos: How Optimizely CMP Empowers Financial Services Marketers

      May 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025
      Recent

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025

      How to get started with Microsoft Copilot on Windows 11

      May 22, 2025

      Microsoft blocks employees from sending emails that mention “Palestine” or “Gaza”

      May 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Commvault Nation-State Campaign Could Be Part of Broader SaaS Threat: CISA

    Commvault Nation-State Campaign Could Be Part of Broader SaaS Threat: CISA

    May 23, 2025

    commvault m365 threat campaign saas security cloud security

    Nation-state threat actors targeting Commvault applications hosted in Microsoft Azure may be part of a broader campaign targeting Software-as-a-Service (SaaS) applications, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned in an advisory this week.

    The May 22 CISA advisory builds on a Commvault warning earlier this month that nation-state threat actors were exploiting CVE-2025-3928 to target Commvault applications hosted in their Microsoft Azure cloud environment in an attempt to access customer Microsoft 365 (M365) environments.

    CISA’s new advisory says the agency believes the Commvault M365 threat “may be part of a larger campaign targeting various SaaS companies’ cloud applications with default configurations and elevated permissions.”

    CISA offered no specifics on other SaaS apps that may be targeted, but CISA and Commvault both offered guidance for protecting Commvault and M365 environments, some of which could be applicable to other SaaS apps.

    Commvault M365 Threat Campaign Detailed

    According to CISA, threat actors may have accessed client secrets for Commvault’s Metallic Microsoft 365 backup SaaS solution hosted in Azure. “This provided the threat actors with unauthorized access to Commvault’s customers’ M365 environments that have application secrets stored by Commvault,” the advisory said.

    Commvault’s May 4 update on the incident said the nation-state threat actor “may have accessed a subset of app credentials that certain Commvault customers use to authenticate their M365 environments.” Commvault responded with several remedial actions, including rotating credentials and issuing customer recommendations.

    Commvault also provided guidance for M365, Dynamics 365 and EntraID backups configured with additional single-tenant app registrations.

    Commvault listed known IP addresses associated with the malicious activity for clients to block. Those IP addresses include:

    • 69.148.100
    • 92.80.210
    • 153.42.129
    • 6.189.53
    • 223.17.243
    • 242.42.20

    Guidance for Protecting Commvault and M365

    CISA recommended that organizations apply patches and updates and follow detailed mitigation guidance and best practices, which include:

    • Monitor Entra audit logs for unauthorized modifications or new credentials to service principals initiated by Commvault applications and service principals, and handle deviations from regular login schedules as suspicious
    • Review Microsoft Entra audit, Entra sign-in, and unified audit logs and conduct internal threat hunting
    • For single tenant apps, implement a conditional access policy that limits authentication of an application service principal to an approved IP address listed within Commvault’s allowlisted range of IP addresses (conditional access policies require a Microsoft Entra Workload ID Premium License)
    • Customers who can should establish a policy to regularly rotate credentials at least every 30 days
    • Review the list of Application Registrations and Service Principals in Entra with administrative consent for higher privileges than needed
    • Implement M365 security recommendations outlined in CISA’s Secure Cloud Business Applications (SCuBA) project
    • Where possible, limit access to Commvault management interfaces to trusted networks and administrative systems
    • Detect and block path-traversal attempts and suspicious file uploads by deploying a Web Application Firewall and removing external access to Commvault applications
    • Monitor activity from unexpected directories, especially web-accessible paths.

     

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
    Next Article ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

    Related Posts

    Development

    International Operation Targets Qakbot Hacker, $24M in Crypto Seized

    May 23, 2025
    Development

    AI Finds What Humans Missed: OpenAI’s o3 Spots Linux Zero-Day

    May 23, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    5 GitHub Actions every maintainer needs to know

    News & Updates

    Ten Wild Examples of Llama 3.1 Use Cases

    Development

    AI governance and clear roadmap lacking across enterprise adoption

    Development

    Tailor of Email Marketing

    Development

    Highlights

    Open Source GenAI powered chat based Data Engineering tool – Ask On Data

    November 5, 2024

    Post Content Source: Read More 

    Better Digital Banking Experiences with AI and MongoDB

    November 26, 2024

    6 Best VPNs for Australia in 2024

    June 12, 2024

    Total.js UI :Two Beginner Projects to understand Paths and Data Binding

    August 13, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.