Commvault Cloud Chaos: Cyber Threats Targeting Microsoft 365 Backup Secrets in Azure
Commvault is on high alert as cyber threats target their Microsoft Azure-hosted applications. Threat actors may have snagged client secrets for Commvault’s Metallic Microsoft 365 backup SaaS, granting sneaky access to customers’ M365 environments. CISA urges vigilance, log monitoring, and applying patches to outsmart these digital mischief-makers.

Hot Take:
Well, it looks like Commvault is having a bit of a “cloudy” situation. Who knew that storing client secrets in the cloud was like leaving your diary open at a slumber party? CISA is stepping in as the responsible parent, urging everyone to update their cybersecurity hygiene practices. Remember folks, even in the cloud, secrets don’t stay secret for long if you’re not careful!
Key Points:
- Commvault’s SaaS solution for Microsoft 365 may have been exploited, allowing unauthorized access to customer environments.
- CISA suspects this breach is part of a larger campaign targeting SaaS applications with default configurations and elevated permissions.
- Mitigation strategies have been suggested, including monitoring Entra audit logs and rotating application secrets.
- On-premises users are advised to restrict access to management interfaces and apply necessary patches.
- CVE-2025-3928 added to the Known Exploited Vulnerabilities Catalog as the investigation continues.
Already a member? Log in here