Industrial espionage via Outlook and Microsoft 365: How the APT "ToddyCat" specifically targets your trade secrets

Cyberattacks take many forms. But when an Advanced Persistent Threat (APT) like "ToddyCat" specifically targets business-critical email communication, we leave the realm of technical security issues and enter the territory of clear economic espionage. Organizations today face the reality that their email traffic is not just a means of communication, but a valuable data space—and a highly attractive target for attackers.

Cybersecurity analysts at the IT security company Kaspersky have detailed how ToddyCat gains access to Outlook mailboxes and Microsoft 365 login credentials. The attackers combine tried-and-tested methods with new, sophisticated tools to systematically extract sensitive corporate data. For business leaders, this means more than just an IT crisis is at stake. It threatens the protection of trade secrets, customer loyalty, the value of intellectual property, and, not least, regulatory risks.

This article analyzes ToddyCat's attack strategy, strategically assesses the threat landscape, and demonstrates how companies can—and should—respond effectively. Furthermore, we explain how ProSec, as a specialized cyber defense partner, provides structured support to identify attack surfaces early and systematically protect critical business areas.

Table of Contents

The ToddyCat case: Industrial espionage in a digital guise

ToddyCat has been active in Europe and Asia since at least 2020, with a clear focus on government agencies, technology companies, and organizations that handle sensitive data. Recent analyses show that the attacker is specifically targeting Microsoft Outlook files and stored access tokens for Microsoft 365. The attacker's tools—such as "TCSectorCopy," "TomBerBil," and "SharpTokenFinder"—are not a random mix of code, but precisely programmed tools designed to systematically access digital correspondence, login credentials, and browser sessions.

This is not a general wave of attacks, not mass phishing, but a targeted operation with clearly defined objectives and a high degree of impact. This places the threat in the context of industrial espionage, because systems are not destroyed—but rather observed, copied, and infiltrated. A silent, yet extremely effective method of economic manipulation.

Corporate communications becomes a weak point

Outlook files (so-called OST files), stored locally on company computers, contain complete email archives including attachments, calendar entries, meeting notes, and sometimes even access data in the form of forwards or password resets. Anyone who can read these files not only has an overview of the content of projects, customer communications, or supplier relationships, but also understands internal decision-making processes.

ToddyCat uses "TCSectorCopy," a tool that copies Outlook files at the sector level—even while the application is running. This method bypasses traditional file and access restrictions and runs in the background, virtually invisible to many standard endpoint security solutions.

In combination with "XstReader"—an open-source tool for analyzing Outlook files—attackers can systematically evaluate confidential emails within hours. This particularly affects executive mailboxes and thus often also data from M&A transactions, legal disputes, or tender strategies.

The side issue becomes the main risk: browser data and OAuth tokens.

Web browsers are also targets: A special PowerShell Trojan called "TomBerBil" can read cookies, passwords, and browsing history—even across the network via SMB shares. At the same time, ToddyCat's tools access so-called OAuth access tokens. These are used, among other things, to authenticate Microsoft 365 and other API-based applications.

These tokens are extracted from running sessions (e.g., Outlook.exe) or from RAM – even when traditional authentication methods like two-factor authentication (2FA) are in use. Tools like "SharpTokenFinder" or, in emergencies, "ProcDump" are used to extract valid tokens from RAM and misuse them in a different geographic area. The affected person is automatically unaware of this.

This poses a risk for companies that extends far beyond technical spheres: data can be exfiltrated, analyzed and passed on in real time – possibly even to your competitors.

When attackers gain access to domain controllers

What's particularly alarming is that ToddyCat isn't limited to individual workstations. The malware sometimes runs on domain controllers – the central instances of corporate networks responsible for authentication, group policies, and user management. This means the attackers operate at the highest privilege level of an IT infrastructure – with maximum access and minimal risk of detection.

The goal is clearly not sabotage, but extraction: data acquisition, insight into communications, access control. This is precisely how modern digital industrial espionage works. And that is precisely why this is not an IT problem, but a strategic risk at the board level.

Strategic implications: A real business impact for CIOs and CISOs

From the perspective of company management – ​​whether CEO, CIO, CISO or CSO – several dimensions of action emerge:

  1. Damage to trust among customers and partners
    The leakage of sensitive emails can expose trade secrets – or simply result in reputational damage, for example if access is made public.
  2. Regulatory risk
    Violations of data protection regulations — such as GDPR or industry-specific compliance requirements — can result in fines and penalties, especially when personal data is involved.
  3. Weakening of negotiating and innovation powerM&A processes, tender strategies, or product development plans discussed via email are now subject to an increased risk of disclosure.
  4. Loss of digital sovereignty
    If attackers permanently secure administrative rights on domain controllers, you need not only technological correction, but also a strategic review of your digital resilience.

What is needed now: From reactive protection to strategic defense

Most security measures in enterprise environments rely on classic security concepts: firewalls, endpoint protection, and regular updates. However, ToddyCat's approach demonstrates that these defense mechanisms are either too superficial or react too late.

Therefore, companies need a security strategy that goes much deeper:

  • Transparency regarding actual running processes on domain controllers and workplace-related software
  • Detection of atypical file accesses through sector-based reading
  • Protection of OAuth tokens and app-bound credentials
  • Isolation of particularly sensitive user mailboxes and their file storage
  • Introduction of secure logging and memory monitoring systems for reactive forensics

How ProSec supports you

ProSec specializes in the identification, analysis, and sustainable mitigation of highly specialized attack vectors like those of ToddyCat. Our expertise in red teaming, threat hunting, penetration testing, and incident-based hardening enables us to uncover complex attack vectors before they cause damage.

Specific support from ProSec:

  • Conducting realistically simulated attack scenarios to test your email and OAuth infrastructure
  • Technical analysis of your Microsoft 365 implementation for underlying permission errors
  • Assessment of the exposure of your domain controllers to lateral access
  • Forensic investigation in cases of suspected Outlook data loss or token compromise
  • Implementation of tailored detection and response mechanisms – agentless, if possible.


Benefit from a collaborative partnership with your IT and security team on equal footing. Together, we strengthen not only your defenses but also your company-wide digital resilience.

How do I reliably protect my company from hackers?
With the support of good hackers!
Contact us now

Do you have any questions or additions? bring it on!
Write a comment and we will reply as soon as possible!

Your email address will not be published. Required fields are marked with *.

Newsletter Form

Cybersecurity insider access with exclusive content and early access to security-relevant information

Become a Cyber ​​Security Insider

Get early access and exclusive content!


OTHER CONTRIBUTIONS

Table of Contents

Share your feedback and help us improve our services!

Share your feedback and help us improve our services!

Take 1 minute to give us some feedback. This way we can ensure that our IT security solutions meet your exact needs.