Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail

December 12, 2025
Facebook X (Twitter) Instagram
Trending
  • Online rise of Eastern Orthodoxy tests its clergy
  • Hanukkah is Judaism’s ‘festival of lights’
  • Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail
  • Buenos Aires dance hall guarantees tango sessions with pro partners
  • UNESCO gives a shout-out to Switzerland’s yodeling by adding it to list of cultural heritage
  • Rare Dom Pérignon champagne from Charles and Diana’s wedding to be auctioned in Denmark
  • Chase Sui Wonders detoured from Harvard astrophysics to ‘The Studio’
  • Advice for introverts who dread office holiday parties
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Friday, December 12
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Commvault Shares IoCs After Zero-Day Attack Hits Azure Environment
Cybersecurity

Commvault Shares IoCs After Zero-Day Attack Hits Azure Environment

By adminMay 1, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 239


Commvault has shared indicators of compromise (IoCs) associated with the exploitation of a vulnerability recently added to CISA’s Known Exploited Vulnerabilities (KEV) catalog.

Tracked as CVE-2025-3928 (CVSS score of 8.7), the unspecified security defect can be exploited remotely to create and execute webshells, which leads to the complete compromise of vulnerable instances.

The issue impacts Commvault software versions 11.x prior to 11.36.46, 11.32.89, 11.28.141, and 11.20.217, which were released in late February with the necessary patches for Windows and Linux.

While CISA added CVE-2025-3928 to KEV this week, the bug had been exploited as a zero-day before Commvault learned of attacks targeting it.

“On February 20, 2025, Microsoft notified us about unauthorized activity within our Azure environment by a suspected nation-state threat actor. [….] Our forensic investigation discovered that the threat actor exploited a zero-day vulnerability,” the company said in early March.

The incident did not affect backup data that Commvault stores for its customers, and the incident did not have a material impact on its business, nor on its ability to serve its customers.

“Based on new threat intelligence, we continue to investigate recent activity by a nation-state threat actor contained within our Azure environment. This activity has affected a small number of customers we have in common with Microsoft, and we are working with those customers to provide assistance,” the company said in an April 29 update.

Commvault says it has notified the relevant authorities of the attack, and that it has implemented improved key rotation measures, as well as stronger monitoring rules following the attack.

Advertisement. Scroll to continue reading.

Additionally, it has shared best practices and IoCs to help organizations hunt for potential compromise associated with CVE-2025-3928’s exploitation.

The company has identified five IP addresses associated with the attacks on its Azure environment and has urged customers to block them, as well as to monitor their Azure login logs, to identify potential sign-in attempts from these IPs.

Commvault also recommends applying a Conditional Access policy to Microsoft 365, Dynamics 365, and Azure AD, and rotating secrets between Azure and Commvault every 90 days.

“In addition to applying Conditional Access policies, it is recommended to regularly monitor sign-in activity to detect any access attempts originating from IP addresses outside of the whitelisted range. This can help quickly identify potential security breaches or account compromises,” the company says.

Related: Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign

Related: Critical PHP Vulnerability Under Mass Exploitation

Related: Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities

Related: Exploitation Long Known for Most of CISA’s Latest KEV Additions



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

Kalshi’s Cofounder Is Now World’s Youngest Self-Made Woman Billionaire

December 2, 2025

Kalshi is now worth $11 billion, making both its founders billionaires and Luana Lopes Lara…

Billionaire Kwek Leng Beng’s CDL Expands In London With $370 Million Holiday Inn Deal

December 2, 2025

Credo, The Maker Of Purple Cables That Connect Data Centers, Mints Two New Billionaires

December 1, 2025

How A Tiny Polish Startup Became The Multi-Billion-Dollar Voice Of AI

December 1, 2025
Our Picks

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail

December 12, 2025

Buenos Aires dance hall guarantees tango sessions with pro partners

December 12, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.