By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs
Computing

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

News Room
Last updated: 2025/05/23 at 1:23 AM
News Room Published 23 May 2025
Share
SHARE

May 23, 2025Ravie LakshmananCloud Security / Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment.

“Threat actors may have accessed client secrets for Commvault’s (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure,” the agency said.

“This provided the threat actors with unauthorized access to Commvault’s customers’ M365 environments that have application secrets stored by Commvault.”

CISA further noted that the activity may be part of a broader campaign targeting various software-as-a-service (SaaS) providers’ cloud infrastructures with default configurations and elevated permissions.

The advisory comes weeks after Commvault revealed that Microsoft notified the company in February 2025 of unauthorized activity by a nation-state threat actor within its Azure environment.

The incident led to the discovery that the threat actors had been exploiting a zero-day vulnerability (CVE-2025-3928), an unspecified flaw in the Commvault Web Server that enables a remote, authenticated attacker to create and execute web shells.

“Based on industry experts, this threat actor uses sophisticated techniques to try to gain access to customer M365 environments,” Commvault said in an announcement. “This threat actor may have accessed a subset of app credentials that certain Commvault customers use to authenticate their M365 environments.”

Cybersecurity

Commvault said it has taken several remedial actions, including rotating app credentials for M365, but emphasized that there has been no unauthorized access to customer backup data.

To mitigate such threats, CISA is recommending that users and administrators follow the below guidelines –

  • Monitor Entra audit logs for unauthorized modifications or additions of credentials to service principals initiated by Commvault applications/service principals
  • Review Microsoft logs (Entra audit, Entra sign-in, unified audit logs) and conduct internal threat hunting
  • For single tenant apps, implement a conditional access policy that limits authentication of an application service principal to an approved IP address that is listed within Commvault’s allowlisted range of IP addresses
  • Review the list of Application Registrations and Service Principals in Entra with administrative consent for higher privileges than the business need
  • Restrict access to Commvault management interfaces to trusted networks and administrative systems
  • Detect and block path-traversal attempts and suspicious file uploads by deploying a Web Application Firewall and removing external access to Commvault applications

CISA, which added CVE-2025-3928 to its Known Exploited Vulnerabilities Catalog in late April 2025, said it’s continuing to investigate the malicious activity in collaboration with partner organizations.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Pro-AI, pro-pollution, pro-surveillance: what you should know about Trump’s budget
Next Article Yes, an Elden Ring Live-Action Movie Directed by Alex Garland Is Coming
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Understanding Goal Based Agents for AI Optimization |
Computing
Instead of waiting for the Pixel 10 Pro, I’d just buy the Pixel 9 Pro and save big
Gadget
Chicharito faces backlash in Mexico for ‘very sexist’ remarks on gender roles
News
Mystery object zooming towards Sun may be ‘hostile alien probe,’ claims prof
News

You Might also Like

Computing

Understanding Goal Based Agents for AI Optimization |

25 Min Read
Computing

Redefining Induction: Multi-Token vs. Next-Token on High-Quality LLM Data | HackerNoon

1 Min Read
Computing

Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware

4 Min Read
Computing

systemd 258-rc1 Is A Massive Feature Release With New Tools, More Than 260 Changes

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?