Skip to content
  Tuesday 20 January 2026
Trending
March 16, 2023Rockwell Automation Modbus TCP AOI Server November 26, 2024As the sun sets on the horizon, casting a warm glow over the landscape, a sense of peace settles over the bustling city. The busy streets slowly empty as people head home after a long day of work. The vibrant energy of the day gives way to a more tranquil atmosphere, creating a moment of stillness in the midst of the urban chaos.<br /> <br /> As the city lights begin to flicker on, the skyline transforms into a glittering spectacle that is both awe-inspiring and calming. The twinkling lights create a sense of magic in the air, as if the city itself is coming alive in the darkness. The hum of traffic and the distant sound of music blend together to form a symphony of urban life, a soundtrack to the night.<br /> <br /> In the midst of this bustling city, there are pockets of quietude where one can escape the noise and chaos. Parks and gardens offer a respite from the concrete jungle, allowing people to reconnect with nature and find a moment of serenity in the heart of the city. The rustling of leaves, the chirping of birds, and the gentle sway of flowers in the breeze create a soothing ambiance that is a stark contrast to the urban landscape.<br /> <br /> As the night deepens, the city takes on a different persona, with a sense of mystery and intrigue that is both alluring and unsettling. Shadows dance across the streets, creating an air of suspense that is both thrilling and unnerving. The city becomes a labyrinth of alleys and hidden corners, where secrets are whispered and stories unfold in the darkness.<br /> <br /> But as the night wears on, the city begins to quiet down, its energy ebbing as people retreat to their homes and the streets grow empty. The city settles into a peaceful slumber, its heartbeat slowing to a gentle rhythm as it prepares for the new day ahead. And as dawn breaks, the city awakens once more, ready to embrace the chaos and beauty of urban life all over again. November 6, 2025Lead Cybersecurity Engineer – Vulnerability May 5, 2025<h3>Why Open-Source Platforms Outshine Proprietary Ones in Security</h3> October 26, 2023Sielco Radio Link and Analog FM Transmitters January 12, 2026CISA Adds One Known Exploited Vulnerability to Catalog November 1, 2024<h3>Kaseya Boosts MSP Efficiency with SaaS Alerts Integration</h3> February 6, 2025CISA Adds Five Known Exploited Vulnerabilities to Catalog March 5, 2024Santesoft Sante FFT Imaging | CISA March 9, 2023Cisco Releases Security Advisory for IOS XR Software
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  ToddyCat Introduces Cutting-edge Tools for Data Exfiltration: A Breakthrough by Researchers
Industry News

ToddyCat Introduces Cutting-edge Tools for Data Exfiltration: A Breakthrough by Researchers

SecuredyouadmSecuredyouadm—October 13, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Windows Users Targeted by New DEEP#GOSU Malware Campaign Using Sophisticated Tactics

March 18, 2024

The Advancement of Home Lifts and Smart Home Technology for Seniors

October 23, 2023

Crack the Code: A Hacker’s Guide to Password Cracking

November 7, 2024

Revealing the Flaws of Zoom ZTP & AudioCodes Phones, Posing Eavesdropping Risks to Users

August 15, 2023



The advanced persistent threat (APT) group ToddyCat has been linked to a new set of malicious tools designed for data exfiltration. Kaspersky, the cybersecurity firm, first identified ToddyCat last year and connected it to attacks against high-profile entities in Europe and Asia. The group’s arsenal includes the Ninja Trojan and a backdoor called Samurai, but further investigation uncovered additional malicious software developed and maintained by ToddyCat. These tools allow the group to achieve persistence, conduct file operations, and load additional payloads. ToddyCat has also been observed using custom scripts, Cobalt Strike, and compromised domain admin credentials for its espionage activities.

Kaspersky found that ToddyCat uses a collection of loaders that launch the Ninja Trojan as a second stage. They also use a tool called LoFiSe to find and collect files, a DropBox uploader to save stolen data, and Pcexter to exfiltrate archive files to Microsoft OneDrive. The group also makes use of custom scripts for data collection, a passive backdoor that receives commands with UDP packets, and compromised domain admin credentials to move laterally within a network.

Check Point recently revealed that government and telecom entities in Asia have been targeted in an ongoing campaign since 2021. This campaign uses various disposable malware to evade detection and deliver next-stage malware. The infrastructure used in this campaign overlaps with that used by ToddyCat.

Overall, ToddyCat is a persistent threat actor that has been active for nearly three years, targeting high-profile entities in Europe and Asia. They have an extensive arsenal of malicious tools and use various techniques for data exfiltration and lateral movement within compromised networks.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Platinion Senior Consultant, Cybersecurity
Pricing, Security, and Pros & Cons: An Overview
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures