{"id":6228,"date":"2025-11-25T13:11:28","date_gmt":"2025-11-25T13:11:28","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/11\/25\/toddycats-new-hacking-tools-steal-outlook-emails-and-microsoft-365-access-tokens\/"},"modified":"2025-11-25T13:11:28","modified_gmt":"2025-11-25T13:11:28","slug":"toddycats-new-hacking-tools-steal-outlook-emails-and-microsoft-365-access-tokens","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/11\/25\/toddycats-new-hacking-tools-steal-outlook-emails-and-microsoft-365-access-tokens\/","title":{"rendered":"ToddyCat\u2019s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens"},"content":{"rendered":"<p>\u200bThe threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy.<br \/>\n&#8220;This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user&#8217;s browser, which can be used outside the perimeter of the compromised infrastructure to access\u00a0The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy.<br \/>\n&#8220;This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user&#8217;s browser, which can be used outside the perimeter of the compromised infrastructure to access\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. &#8220;This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user&#8217;s browser, which can be used outside the perimeter of&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/11\/25\/toddycats-new-hacking-tools-steal-outlook-emails-and-microsoft-365-access-tokens\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">ToddyCat\u2019s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6229,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6228"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6228"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6228\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6229"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}