In a recent advisory, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed active cyber threat activity against Commvault's Microsoft Azure-hosted applications. The attack seems to have exposed client secrets related to Commvault's Metallic Microsoft 365 (M365) backup SaaS solution, giving unauthorized access to customers' M365 environments. The attack is due to exploitation of a zero-day vulnerability, CVE-2025-3928, in the Commvault Web Server through which a remote, authenticated attacker can create and run web shells. Originally detected by Microsoft in February 2025, the activity has been linked to a nation-state actor using sophisticated methods to gain access to sensitive app credentials. CISA advised that this event is possibly part of a wider campaign targeting cloud infrastructures of multiple SaaS vendors. Threat actors are seemingly taking advantage of default settings and high-level permissions prevalent in the two environments. While no backup data was apparently breached, some app credentials utilized for authenticating M365 environments potentially reached the attackers. The attackers most likely wanted to use these credentials to exfiltrate data or move laterally from integrated systems, an upsurge in targeting cloud-based platforms and software services. In order to counteract these risks, CISA suggests a number of countermeasures. Organizations are advised to keep an eye out for unexpected changes in Entra audit logs and examine all Microsoft and Entra logs for signs of suspicious activity. Limiting application service principal authentication to particular IP addresses, checking privilege levels of app registrations, and limiting access to Commvault interfaces to known systems are also suggested. In addition, the use of Web Application Firewalls (WAFs) and the blocking of path traversal or illegal file uploads can prevent exploitation. CISA continues to research the threat in collaboration with partner agencies.
Hackers linked to the ShinyHunters extortion group have claimed responsibility for a data breach affecting Spanish fashion retailer exposing information belonging to more than 197,...
A cyber intrusion targeting the source code infrastructure of Trellix has reportedly been linked to the ransomware and extortion collectiveRansomHouse. The group recently posted se...
Cybersecurity researchers have uncovered a large-scale Android scam campaign involving fraudulent “call history” applications distributed through the Google Play Store. The mal...