By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
Computing

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

News Room
Last updated: 2025/11/25 at 8:13 AM
News Room Published 25 November 2025
Share
ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
SHARE

Nov 25, 2025Ravie LakshmananMalware / Vulnerability

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy.

“This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user’s browser, which can be used outside the perimeter of the compromised infrastructure to access corporate mail,” Kaspersky said in a technical breakdown.

ToddyCat, assessed to be active since 2020, has a track record of targeting various organizations in Europe and Asia with various tools, Samurai and TomBerBil to retain access and steal cookies and credentials from web browsers like Google Chrome and Microsoft Edge.

DFIR Retainer Services

Earlier this April, the hacking group was attributed to the exploitation of a security flaw in ESET Command Line Scanner (CVE-2024-11859, CVSS score: 6.8) to deliver a previously undocumented malware codenamed TCESB.

Kaspersky said it detected a PowerShell variant of TomBerBil (as opposed to C++ and C# versions flagged before) in attacks that took place between May and June 2024, which comes with capabilities to extract data from Mozilla Firefox. A notable feature of this version is that it runs on domain controllers from a privileged user and can access browser files via shared network resources using the SMB protocol.

The malware, the company added, was launched by means of a scheduled task that executed a PowerShell command. Specifically, it searches for browser history, cookies, and saved credentials in the remote host over SMB. While the copied files containing the information are encrypted using the Windows Data Protection API (DPAPI), TomBerBil is equipped to capture the encryption key necessary to decrypt the data.

“The previous version of TomBerBil ran on the host and copied the user token. As a result, DPAPI was used to decrypt the master key in the user’s current session, and subsequently the files themselves,” researchers said. “In the newer server version, TomBerBil copies files containing user encryption keys that are used by DPAPI. Using these keys, as well as the user’s SID and password, attackers can decrypt all copied files locally.”

The threat actors have also been found to access corporate emails stored in local Microsoft Outlook storage in the form of OST (short for Offline Storage Table) files using TCSectorCopy (“xCopy.exe”), bypassing restrictions that limit access to such files when the application is running.

Written in C++, TCSectorCopy accepts as input a file to be copied (in this case, OST files) and then proceeds to open the disk as a read-only device and sequentially copy the file contents sector by sector. Once the OST files are written to a path of the attacker’s choosing, the contents of the electronic correspondence are extracted using XstReader, an open-source viewer for Outlook OST and PST files.

CIS Build Kits

Another tactic adopted by ToddyCat involves efforts to obtain access tokens directly from memory in cases where victim organizations used the Microsoft 365 cloud service. The JSON web tokens (JWTs) are obtained through an open-source C# tool named SharpTokenFinder, which enumerates Microsoft 365 applications for plain text authentication tokens.

But the threat actor is said to have faced a setback in at least one investigated incident after security software installed on the system blocked SharpTokenFinder’s attempt to dump the Outlook.exe process. To get around this restriction, the operator used the ProcDump tool from the Sysinternals package with specific arguments to take a memory dump of the Outlook process.

“The ToddyCat APT group is constantly developing its techniques and looking for those that would hide activity to gain access to corporate correspondence within the compromised infrastructure,” Kaspersky said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 'Wake Up Dead Man: A Knives Out Mystery' Is Irresistibly Smart and Cheeky 'Wake Up Dead Man: A Knives Out Mystery' Is Irresistibly Smart and Cheeky
Next Article Sauce Labs Launches AI Tool for Faster Test Analysis Sauce Labs Launches AI Tool for Faster Test Analysis
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Car influencers love Chinese EVs — and China loves them back
Car influencers love Chinese EVs — and China loves them back
News
The Complete List of Facebook Ad Types (with Examples!) | WordStream
The Complete List of Facebook Ad Types (with Examples!) | WordStream
Computing
Two years later, Google Photos may finally gain this cool iOS photo trick (Update: In testing)
Two years later, Google Photos may finally gain this cool iOS photo trick (Update: In testing)
News
Einstein is the biggest rock star of the 20th century
Einstein is the biggest rock star of the 20th century
Mobile

You Might also Like

The Complete List of Facebook Ad Types (with Examples!) | WordStream
Computing

The Complete List of Facebook Ad Types (with Examples!) | WordStream

14 Min Read
I Was Sick of the Crypto Off-Ramp Pain. So I Built My Own Crypto Card | HackerNoon
Computing

I Was Sick of the Crypto Off-Ramp Pain. So I Built My Own Crypto Card | HackerNoon

6 Min Read
Improved Upstream Kernel Support For TUXEDO Laptops Being Worked On
Computing

Improved Upstream Kernel Support For TUXEDO Laptops Being Worked On

3 Min Read
Zipline secures 0m to scale AI drone delivery across Africa
Computing

Zipline secures $150m to scale AI drone delivery across Africa

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?