CISA issued an alert on May 22 2025 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform. The attackers specifically targeted and accessed client secrets that Commvault customers use to protect their Microsoft 365 (M365) backups. By obtaining these secrets, the threat actors could potentially access affected customers' M365 environments, manipulate service principal configurations, and gain unauthorized access to business-critical data including email, SharePoint, and OneDrive content.
‍
Initial access: Exploitation of CVE‑2025‑3928 on Commvault Web Server to deploy web shells inside Commvault’s Azure environment.
‍
What was exposed: A subset of stored app credentials (client secrets) that certain customers use for Metallic‑managed M365 backups.
‍
CISA believes this activity is part of a larger wave of attacks abusing default SaaS configurations and over‑privileged service principals across multiple vendors.
‍
Threat hunting
‍
Rotate credentials
‍
Conditional Access
‍
Patch & harden
‍
‍
Stolen application secrets can give attackers privileged, API‑level access to M365 dat often without triggering user sign‑in alerts. Immediate credential rotation, strict Conditional Access, and vigilant log monitoring are critical to contain potential compromise and prevent follow‑on SaaS supply‑chain attacks.
‍