ToddyCat APT Group Upgrades Cyber-Espionage Toolkit

The ToddyCat APT group has enhanced its cyber-espionage toolkit to infiltrate corporate email systems by stealing browser data, Outlook mail archives, and OAuth 2.0 access tokens from Microsoft 365. The group has developed a new PowerShell-based variant of TomBerBil, which runs on domain controllers and harvests browser files via SMB. Additionally, they use TCSectorCopy to copy OST files and XstReader to extract email contents. The attackers also target OAuth 2.0 tokens stored in the memory of Office apps to access cloud email.

Latest mentioned: 11-25
Earliest mentioned: 11-22