Malware

ToddyCat’s new tricks: email hacking evolves with the cloud

dark6 24 November 2025
Read Time:2 Minute, 51 Second

The age-old adage “if it ain’t broke, don’t fix it” doesn’t always hold true in cybersecurity. As attackers are increasingly leveraging cloud services to protect sensitive data, their methods are evolving too – and with them, the level of sophistication and audacity of attacks rises considerably.

One such group that has been pushing boundaries is the ToddyCat APT (Advanced Persistent Threat) – a name whispered in hushed tones among those in the know about cybersecurity threats. This group has proven that even within the supposedly secure environment of cloud-based email platforms, they are finding new and innovative ways to infiltrate corporate networks.

The story goes like this: traditional methods, while effective before, have become increasingly predictable for security teams and intelligence agencies alike. So, ToddyCat shifted its focus – a strategic move that has led to the development of sophisticated techniques targeting user data in email communication even as cloud service providers offer heightened protection.

How ToddyCat is Bypassing Security Measures:

The group has developed new methods to steal sensitive information from corporate networks, particularly during the second half of 2024 and early 2025, using tactics that exploit user behavior. These techniques involve stealing authentication tokens via a browser-based attack. This seemingly innocuous method leverages the OAuth 2.0 system, which is often used for secure access to various services – from social media platforms to business applications.

What makes these tactics particularly dangerous is their ability to remain undetected in a network. The stolen credentials allow ToddyCat to access internal emails without raising alarms or triggering security alerts.

Inside the Attack: A Detailed Look at ToddyCat’s Tools and Techniques:

  • TomBerBil – Power Up for Hacking: This is not your everyday hacker tool. ToddyCat has enhanced its TomBerBil PowerShell toolkit, giving it a new life with significant modifications that focus on stealing sensitive information while remaining undetected.
  • New Powershell version for Network Access: The updated tool runs on domain controllers with high-level access and uses the SMB protocol to access network shares within your organization. Essentially, this allows them to infiltrate your network using an “invisible hand”.
  • Browser Data Stealing – Chrome, Edge & Firefox: TomBerBil connects to various browsers (Chrome, Edge and Firefox) on your network, reading data directly from user files in folders like “Login Data”, “Local State”, “Cookies” and browser history.

The Challenge: How To Counter ToddyCat’s Methods:

This is a critical issue that security teams need to address head-on. Here are some steps to combat these attacks:

  • Strengthen Authentication Systems: Implementing multi-factor authentication (MFA) for email logins and network access adds another layer of protection, making it significantly more difficult for attackers to gain unauthorized access to sensitive data.
  • Proactive Threat Monitoring: Continuous security monitoring, threat analysis, and penetration testing are crucial for identifying potential intrusions before they cause damage.
  • Educate Employees: Training employees on phishing scams and other social engineering tactics can help minimize the risk of them falling prey to attacks, as attackers often exploit human error.

The Future: A World of Constant Evolution in Cyberattacks:

This is not a mere case study of new hacking techniques – this is a signal that cyber security must evolve and adapt to emerging threats. ToddyCat’s ingenuity shows the vulnerability that comes with relying solely on cloud-based services for business communications. It’s a reminder that cybersecurity needs constant evolution, and we must be prepared for attacks to become increasingly sophisticated.

Leave a Reply

💬 [[ unisciti alla discussione! ]]


Se vuoi commentare su ToddyCat’s new tricks: email hacking evolves with the cloud, utilizza la discussione sul Forum.
Condividi esempi, IOCs o tecniche di detection efficaci nel nostro 👉 forum community