Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why “hold forever” investors catch venture capital “zombies”

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

OpenAI and Perplexity are launching AI shopping assistants, but competing startups aren’t keen on it

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » ToddyCat’s new hacking tool steals Outlook emails and Microsoft 365 access tokens
Identity

ToddyCat’s new hacking tool steals Outlook emails and Microsoft 365 access tokens

userBy userNovember 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 25, 2025Ravi LakshmananMalware/vulnerabilities

The attacker known as ToddyCat has been observed employing new methods to access corporate email data belonging to targeted companies, including using a custom tool called TCSectorCopy.

“This attack allows the user’s browser to be used to obtain OAuth 2.0 authentication protocol tokens, which can be used to access corporate email outside the perimeter of the compromised infrastructure,” Kaspersky said in technical details.

ToddyCat is believed to have been active since 2020 and has a track record of targeting various organizations in Europe and Asia using various tools, Samurai and TomBerBil, to maintain access and steal cookies and credentials from web browsers such as Google Chrome and Microsoft Edge.

DFIR retainer service

In early April of this year, the hacker group was blamed for exploiting a security flaw in ESET Command Line Scanner (CVE-2024-11859, CVSS score: 6.8) to distribute previously undocumented malware codenamed TCESB.

Kaspersky announced that it detected a PowerShell variant of TomBerBil (as opposed to previously flagged C++ and C# versions) with the ability to extract data from Mozilla Firefox in attacks that occurred between May and June 2024. A notable feature of this version is that it runs on a domain controller and allows privileged users to access browser files over shared network resources using the SMB protocol.

The company added that the malware was launched by a scheduled task that executed PowerShell commands. Specifically, it searches browser history, cookies, and credentials stored on remote hosts over SMB. The copied files containing the information are encrypted using the Windows Data Protection API (DPAPI), and TomBerBil has the ability to retrieve the encryption key needed to decrypt the data.

The researchers said, “An earlier version of TomBerBil ran on the host and copied the user token. As a result, DPAPI was used to decrypt the master key in the user’s current session and then the files themselves.” “In new server versions, TomBerBil copies files containing user encryption keys used by DPAPI. An attacker can use these keys and the user’s SID and password to locally decrypt all copied files.”

Threat actors have also been found to use TCSectorCopy (‘xCopy.exe’) to access corporate email stored in local Microsoft Outlook storage in the form of OST (Offline Storage Table) files, bypassing restrictions that restrict access to such files while applications are running.

Written in C++, TCSectorCopy takes as input the file to be copied (in this case an OST file), opens the disk as a read-only device, and copies the contents of the file sequentially, sector by sector. Once the OST file is written to a path chosen by the attacker, the contents of the electronic communication are extracted using XstReader, an open source viewer for Outlook OST and PST files.

CIS build kit

Another tactic employed by ToddyCat involves efforts to retrieve access tokens directly from memory if the victim organization was using Microsoft 365 cloud services. JSON web tokens (JWTs) are obtained through an open source C# tool called SharpTokenFinder. This tool enumerates Microsoft 365 applications for plain text authentication tokens.

However, the attacker allegedly faced a setback in at least one incident under investigation after security software installed on the system blocked SharpTokenFinder’s attempt to dump the Outlook.exe process. To work around this limitation, operators used the ProcDump tool from the Sysinternals package with specific arguments to obtain a memory dump of the Outlook process.

“The ToddyCat APT group is constantly developing technology and is looking for techniques to hide activities that access corporate communications within compromised infrastructure,” Kaspersky said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThree SOC challenges you need to solve by 2026
Next Article Sistema Ox Bel Ha: A vast hidden system that is the world’s longest underwater cave
user
  • Website

Related Posts

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

November 25, 2025

Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys

November 25, 2025

JackFix uses fake Windows Update pop-ups on adult sites to distribute multiple thieves

November 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why “hold forever” investors catch venture capital “zombies”

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

OpenAI and Perplexity are launching AI shopping assistants, but competing startups aren’t keen on it

Find Your Grind raises $5 million to grow platform that lets students explore unique career paths

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.