The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy.
"This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access corporate mail," Kaspersky said in a technical breakdown.
ToddyCat, assessed to be active since 2020, has a track record of targeting various organizations in Europe and Asia with various tools, Samurai and TomBerBil to retain access and steal cookies and credentials from web browsers like Google Chrome and Microsoft Edge.
Earlier this April, the hacking group was attributed to the exploitation o

The Hacker News

ESPN Cricket Headlines
Women's Wear Daily Lifestyle
AlterNet
Los Angeles Times Opinion
The Federick News-Post
IMDb TV
CBS News
5 On Your Side Sports
New York Post