Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      A Week In The Life Of An AI-Augmented Designer

      August 22, 2025

      This week in AI updates: Gemini Code Assist Agent Mode, GitHub’s Agents panel, and more (August 22, 2025)

      August 22, 2025

      Microsoft adds Copilot-powered debugging features for .NET in Visual Studio

      August 21, 2025

      Blackstone portfolio company R Systems Acquires Novigo Solutions, Strengthening its Product Engineering and Full-Stack Agentic-AI Capabilities

      August 21, 2025

      The best AirTag alternative for Samsung users is currently 30% off

      August 24, 2025

      One of the biggest new features on the Google Pixel 10 is also one of the most overlooked

      August 24, 2025

      I tested these viral ‘crush-proof’ Bluetooth speakers, and they’re not your average portables

      August 24, 2025

      I compared the best smartwatches from Google and Apple – and there’s a clear winner

      August 24, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      MongoDB Data Types

      August 23, 2025
      Recent

      MongoDB Data Types

      August 23, 2025

      Building Cross-Platform Alerts with Laravel’s Notification Framework

      August 23, 2025

      Add Notes Functionality to Eloquent Models With the Notable Package

      August 23, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft Teams updated with a feature you probably thought already existed — “Can you hear me?” is now a thing of the past

      August 24, 2025
      Recent

      Microsoft Teams updated with a feature you probably thought already existed — “Can you hear me?” is now a thing of the past

      August 24, 2025

      Xbox Game Pass gets Gears of War: Reloaded, Dragon Age: The Veilguard, and more — here’s what is coming through the rest of August

      August 24, 2025

      Resident Evil ‘9’ Requiem has some of the most incredible lighting I’ve seen in a game — and Capcom uses it as a weapon

      August 24, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Commvault Nation-State Campaign Could Be Part of Broader SaaS Threat: CISA

    Commvault Nation-State Campaign Could Be Part of Broader SaaS Threat: CISA

    May 23, 2025

    commvault m365 threat campaign saas security cloud security

    Nation-state threat actors targeting Commvault applications hosted in Microsoft Azure may be part of a broader campaign targeting Software-as-a-Service (SaaS) applications, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned in an advisory this week.

    The May 22 CISA advisory builds on a Commvault warning earlier this month that nation-state threat actors were exploiting CVE-2025-3928 to target Commvault applications hosted in their Microsoft Azure cloud environment in an attempt to access customer Microsoft 365 (M365) environments.

    CISA’s new advisory says the agency believes the Commvault M365 threat “may be part of a larger campaign targeting various SaaS companies’ cloud applications with default configurations and elevated permissions.”

    CISA offered no specifics on other SaaS apps that may be targeted, but CISA and Commvault both offered guidance for protecting Commvault and M365 environments, some of which could be applicable to other SaaS apps.

    Commvault M365 Threat Campaign Detailed

    According to CISA, threat actors may have accessed client secrets for Commvault’s Metallic Microsoft 365 backup SaaS solution hosted in Azure. “This provided the threat actors with unauthorized access to Commvault’s customers’ M365 environments that have application secrets stored by Commvault,” the advisory said.

    Commvault’s May 4 update on the incident said the nation-state threat actor “may have accessed a subset of app credentials that certain Commvault customers use to authenticate their M365 environments.” Commvault responded with several remedial actions, including rotating credentials and issuing customer recommendations.

    Commvault also provided guidance for M365, Dynamics 365 and EntraID backups configured with additional single-tenant app registrations.

    Commvault listed known IP addresses associated with the malicious activity for clients to block. Those IP addresses include:

    • 69.148.100
    • 92.80.210
    • 153.42.129
    • 6.189.53
    • 223.17.243
    • 242.42.20

    Guidance for Protecting Commvault and M365

    CISA recommended that organizations apply patches and updates and follow detailed mitigation guidance and best practices, which include:

    • Monitor Entra audit logs for unauthorized modifications or new credentials to service principals initiated by Commvault applications and service principals, and handle deviations from regular login schedules as suspicious
    • Review Microsoft Entra audit, Entra sign-in, and unified audit logs and conduct internal threat hunting
    • For single tenant apps, implement a conditional access policy that limits authentication of an application service principal to an approved IP address listed within Commvault’s allowlisted range of IP addresses (conditional access policies require a Microsoft Entra Workload ID Premium License)
    • Customers who can should establish a policy to regularly rotate credentials at least every 30 days
    • Review the list of Application Registrations and Service Principals in Entra with administrative consent for higher privileges than needed
    • Implement M365 security recommendations outlined in CISA’s Secure Cloud Business Applications (SCuBA) project
    • Where possible, limit access to Commvault management interfaces to trusted networks and administrative systems
    • Detect and block path-traversal attempts and suspicious file uploads by deploying a Web Application Firewall and removing external access to Commvault applications
    • Monitor activity from unexpected directories, especially web-accessible paths.

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
    Next Article ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    August 24, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    August 24, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-53603 – Alinto SOPE SOGo NULL Pointer Dereference

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-46690 – Ververica Platform SQL Connector Unauthorized Access Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    I compared the best smartwatches from Google and Apple – and there’s a clear winner

    News & Updates

    Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code – Patch Now

    Security

    Highlights

    CVE-2025-49739 – Visual Studio Link Following Privilege Escalation Vulnerability

    July 9, 2025

    CVE ID : CVE-2025-49739

    Published : July 8, 2025, 5:16 p.m. | 13 hours, 9 minutes ago

    Description : Improper link resolution before file access (‘link following’) in Visual Studio allows an unauthorized attacker to elevate privileges over a network.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Bitstamp hacked for $5 million in Bitcoin

    April 9, 2025

    Route Optimization through Laravel’s Shallow Resource Architecture

    July 31, 2025

    Windows 11 Gets Cross-Device Resume With KB5064093 Update In Dev & Beta Channels

    August 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.