Original Article Text

Click to Toggle View

Commvault says recent breach didn't impact customer backup data. Commvault, a leading provider of data protection solutions, says a nation-state threat actor who breached its Azure environment didn't gain access to customer backup data. Listed on NASDAQ since March 2006, Commvault is included in the S&P MidCap 400 Index and provides cyber resilience services to over 100,000 organizations. As the company first revealed on March 7, 2025, Commvault discovered the incident after being notified by Microsoft on February 20 of suspicious activity within its Azure environment. A follow-up investigation into the breach found that the incident only affected a small number of Commvault customers and had not impacted the company's operations. "Importantly, there has been no unauthorized access to customer backup data that Commvault stores and protects, and no material impact on our business operations or our ability to deliver products and services," Danielle Sheer, the company's Chief Trust Officer, said in a Wednesday update. "We are working closely with two leading cybersecurity firms and are coordinating with the appropriate authorities, including the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and others." In a support document containing indicators of compromise, Commvault advises customers to apply a Conditional Access policy to all Microsoft 365, Dynamics 365, and Azure AD single-tenant App registrations to protect their data against similar attack attempts. It also recommended to regularly monitor sign-in activity to detect access attempts originating from IP addresses outside of allowed ranges and to rotate and sync client secrets between Commvault and the Azure portal every 90 days. "This can help quickly identify potential security breaches or account compromises. If any unauthorized access is detected, immediately report the incident to Commvault Support for further investigation and remediation," the company says. The company also noted in the original disclosure that the threat actors exploited a now-patched zero-day vulnerability (CVE-2025-3928) in its Commvault Web Server software that remote authenticated attackers with low privileges can exploit remotely to plant webshells on target servers. CISA has also added the CVE-2025-3928 vulnerability to its Known Exploited Vulnerabilities Catalog on Monday, requiring federal agencies to secure their Commvault software by May 19, 2025, as mandated by the Binding Operational Directive (BOD) 22-01 issued in November 2021. "These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise," CISA warned.

Daily Brief Summary

NATION STATE ACTIVITY // Commvault Confirms Nation-State Attack on Azure, No Data Breached

Commvault reported a security breach in its Azure environment by a nation-state actor, confirmed on March 7, 2025.

Microsoft alerted Commvault of suspicious activities on February 20, which led to the discovery of the breach.

The incident affected a limited number of Commvault customers and did not disrupt overall business operations.

No customer backup data was accessed or compromised during the attack.

Commvault is working with cybersecurity firms and coordinating with the FBI and CISA to manage the situation.

A recent zero-day vulnerability (CVE-2025-3928) in Commvault software was patched; however, this vulnerability was exploited in the attack.

Commvault recommends customers enhance security by monitoring sign-in activities and rotating credentials every 90 days.

CISA included the CVE-2025-3928 in its Known Exploited Vulnerabilities Catalog, mandating federal agencies to secure their Commvault software by May 19, 2025.