New Warning: Potential SaaS Attacks Targeting App Secrets and Cloud Misconfigurations

Published:

spot_img

gpt]
Rewrite the content fetched from

May 23, 2025Ravie LakshmananCloud Security / Vulnerability

New Warning: Potential SaaS Attacks Targeting App Secrets and Cloud Misconfigurations

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment.

“Threat actors may have accessed client secrets for Commvault’s (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure,” the agency said.

“This provided the threat actors with unauthorized access to Commvault’s customers’ M365 environments that have application secrets stored by Commvault.”

CISA further noted that the activity may be part of a broader campaign targeting various software-as-a-service (SaaS) providers’ cloud infrastructures with default configurations and elevated permissions.

The advisory comes weeks after Commvault revealed that Microsoft notified the company in February 2025 of unauthorized activity by a nation-state threat actor within its Azure environment.

The incident led to the discovery that the threat actors had been exploiting a zero-day vulnerability (CVE-2025-3928), an unspecified flaw in the Commvault Web Server that enables a remote, authenticated attacker to create and execute web shells.

“Based on industry experts, this threat actor uses sophisticated techniques to try to gain access to customer M365 environments,” Commvault said in an announcement. “This threat actor may have accessed a subset of app credentials that certain Commvault customers use to authenticate their M365 environments.”

Cybersecurity

Commvault said it has taken several remedial actions, including rotating app credentials for M365, but emphasized that there has been no unauthorized access to customer backup data.

To mitigate such threats, CISA is recommending that users and administrators follow the below guidelines –

  • Monitor Entra audit logs for unauthorized modifications or additions of credentials to service principals initiated by Commvault applications/service principals
  • Review Microsoft logs (Entra audit, Entra sign-in, unified audit logs) and conduct internal threat hunting
  • For single tenant apps, implement a conditional access policy that limits authentication of an application service principal to an approved IP address that is listed within Commvault’s allowlisted range of IP addresses
  • Review the list of Application Registrations and Service Principals in Entra with administrative consent for higher privileges than the business need
  • Restrict access to Commvault management interfaces to trusted networks and administrative systems
  • Detect and block path-traversal attempts and suspicious file uploads by deploying a Web Application Firewall and removing external access to Commvault applications

CISA, which added CVE-2025-3928 to its Known Exploited Vulnerabilities Catalog in late April 2025, said it’s continuing to investigate the malicious activity in collaboration with partner organizations.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

into a completely fresh, human-written article that feels authentic and naturally written. The tone must reflect everyday human communication—professional, clear, and engaging without sounding like it’s generated by AI. Strictly avoid generic AI-style phrases, exaggerations, filler lines, or hallucinated content.

Structure the article with appropriate subheadings (H2, H3, etc.) and ensure it is *at least 500 words*. Each paragraph should be well-structured, focusing on a specific angle or detail from the source.

Incorporate *high-ranking SEO keywords* relevant to the topic where naturally appropriate—never forced. Prioritize keyword-rich phrases commonly searched online while maintaining readability and flow.

Use real-world phrasing, straight facts, and simple but intelligent language as used in human-authored blogs or news articles. Avoid summaries or conclusions; focus purely on rewriting the key points into a compelling narrative without inventing new ideas.

Do not add your own opinions or additional content—strictly rephrase and rewrite the original source material in a fresh, optimized, and human-sounding format.
[/gpt3]

spot_img

Related articles

Recent articles

Umm Suqeim Street Project Nears 70% Completion, Promising Improved Traffic Flow with AI Monitoring

gpt] Rewrite the content fetched from Dubai’s Roads and Transport Authority (RTA) has completed 70 per cent of the Umm Suqeim Street Improvement Project, which...

Thriving Amid Challenges: A Reflection on Resilience and Success in Uncertain Times

Lenovo Reports Impressive Growth in Fiscal Year 2024/25 Lenovo Group Limited has released its financial results for the fourth quarter and full fiscal year 2024/25,...

Data Breach Exposes 1.2 Billion Facebook Accounts: Check If Your Information is on the Dark Web

Major Privacy Breach Affects Over 1.2 Billion Facebook Users In one of the largest privacy incidents in Meta's history, reports indicate that records of more...