Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Strobes Security Welcomes Ed Adams as Strategic Advisor

March 18, 2026

Your Browser Turns Against You: The Rise of AI-Driven Attacks

March 18, 2026

Enhancing AI Systems: Unlocking Visibility for Proactive Risk Detection

March 18, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » ToddyCat’s Latest Hacking Tools Target Outlook and Microsoft 365 Access
Cybercrime and Ransomware

ToddyCat’s Latest Hacking Tools Target Outlook and Microsoft 365 Access

Staff WriterBy Staff WriterNovember 25, 2025No Comments4 Mins Read2 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. The APT group ToddyCat has adapted sophisticated techniques, including using the custom tool TCSectorCopy, to access and exfiltrate corporate email data and tokens via OAuth 2.0, bypassing perimeter security.
  2. They exploit vulnerabilities like CVE-2024-11859, deploying malware such as the PowerShell-based TomBerBil, which extracts browser credentials, cookies, and history from browsers like Chrome, Edge, and Firefox.
  3. ToddyCat can access Outlook OST files directly from local storage, copying and decrypting email contents and credentials through advanced methods including shared network access and the use of encryption keys.
  4. The group actively develops methods to obtain access tokens from memory, employing tools like SharpTokenFinder and ProcDump, to evade detection and maintain persistent access to targeted corporate environments.

The Issue

The group known as ToddyCat has been increasingly clever in their efforts to access corporate email data. Using a custom tool called TCSectorCopy, they exploit OAuth 2.0 tokens by leveraging a user’s browser, which enables them to bypass network boundaries and access company mail remotely. This attack technique makes it harder for organizations to detect, as it exploits legitimate authorization protocols. ToddyCat, active since 2020, has previously targeted organizations across Europe and Asia using malware like TomBerBil and Samurai, stealing credentials and cookies from browsers such as Chrome and Edge. Recently, they exploited a security flaw in ESET’s Command Line Scanner to deliver a new malware variant, which can extract data from Mozilla Firefox and access encrypted files by stealing decryption keys from domain controllers. They also employ tools like xCopy.exe and XstReader to directly copy and examine OST files—a format used by Outlook for offline storage—baving limited security restrictions. Additionally, they try to retrieve access tokens from memory using tools like SharpTokenFinder and ProcDump, although some security measures have temporarily thwarted these efforts. Overall, these developments reveal ToddyCat’s evolving tactics, highlighting their relentless pursuit to breach corporate defenses and steal sensitive communications.

What’s at Stake?

The issue titled “ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens” highlights a serious threat that can directly impact any business. When hackers exploit such tools, they can steal sensitive Outlook emails and access tokens, gaining unauthorized entry into corporate accounts. This breach can lead to data theft, financial loss, and a damaged reputation. Moreover, attackers may misuse stolen information to launch further attacks or compromise customer data. Consequently, businesses face operational disruptions, legal liabilities, and diminished trust from clients and partners. Therefore, understanding this risk is crucial, as any organization—regardless of size—can fall victim and suffer tangible harm without proper security measures in place.

Possible Action Plan

When a threat like ToddyCat’s new hacking tools successfully breaches systems, swift remediation is crucial to prevent data loss, mitigate further exploitation, and restore security integrity. Prompt action limits damage and reduces long-term vulnerabilities.

Containment Measures
Implement immediate isolation of affected systems to prevent the spread of malicious activity.

Vulnerability Assessment
Conduct a thorough scan to identify exploited vulnerabilities or entry points used by the threat actor.

Credential Rotation
Reset compromised Outlook email and Microsoft 365 access tokens and change associated passwords to eliminate account access for malicious actors.

Enhanced Monitoring
Increase logging and real-time monitoring of email traffic and user activity to detect or prevent unauthorized access.

Security Patching
Apply all relevant updates and patches to Outlook, Microsoft 365, and related infrastructure to close known security gaps.

User Awareness
Notify users of potential phishing attempts or suspicious activity and advise on best practices to avoid further compromise.

Incident Analysis
Perform forensic analysis to understand attack vectors, scope, and affected assets for tailored remediation planning.

Policy Update
Review and reinforce security policies related to access management and incident response procedures.

Long-term Strategies
Implement multi-factor authentication (MFA) and zero-trust principles to enhance defense against future attacks and prevent similar breaches from recurring.

Stay Ahead in Cybersecurity

Explore career growth and education via Careers & Learning, or dive into Compliance essentials.

Understand foundational security frameworks via NIST CSF on Wikipedia.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

CISO Update computer security cyber attacks cyber news cyber risk cyber security news cyber security news today cyber security updates cyber updates cybercrime Cybersecurity data breach hacker news hacking news how to hack information security MX1 network security ransomware malware risk management software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCyber Breaches Unveiled: The Trojan, the Donor Hack, and Deadly Malware Threats
Next Article Unlock the Secrets to Amplify Your Cyber Budget
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Your Browser Turns Against You: The Rise of AI-Driven Attacks

March 18, 2026

Enhancing AI Systems: Unlocking Visibility for Proactive Risk Detection

March 18, 2026

Uncovering the Hidden Pattern Behind Cisco’s Rising Vulnerabilities

March 18, 2026

Comments are closed.

Latest Posts

Uncovering the Hidden Pattern Behind Cisco’s Rising Vulnerabilities

March 18, 2026

Critical Firewall Zero-Day Breach Sparks Interlock Ransomware Attacks

March 18, 2026

New iOS Exploit: Advanced Tools Targeting iPhone Users to Steal Personal Data

March 18, 2026

FancyBear Server Leak Exposes Credentials, 2FA Secrets, and NATO-Linked Targets

March 18, 2026
Don't Miss

Your Browser Turns Against You: The Rise of AI-Driven Attacks

By Staff WriterMarch 18, 2026

Summary Points AI-powered browsers like Perplexity’s Comet can be hijacked through hidden prompt injections, leading…

Enhancing AI Systems: Unlocking Visibility for Proactive Risk Detection

March 18, 2026

Uncovering the Hidden Pattern Behind Cisco’s Rising Vulnerabilities

March 18, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Strobes Security Welcomes Ed Adams as Strategic Advisor
  • Your Browser Turns Against You: The Rise of AI-Driven Attacks
  • Enhancing AI Systems: Unlocking Visibility for Proactive Risk Detection
  • C2 Implant ‘SnappyClient’ Turns Its Focus to Crypto Wallets
  • Uncovering the Hidden Pattern Behind Cisco’s Rising Vulnerabilities
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Strobes Security Welcomes Ed Adams as Strategic Advisor

March 18, 2026

Your Browser Turns Against You: The Rise of AI-Driven Attacks

March 18, 2026

Enhancing AI Systems: Unlocking Visibility for Proactive Risk Detection

March 18, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202624 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.