Events2Join

An In|Depth Look at Chinese APT ToddyCat


APT_CyberCriminal_Campagin_...

APT & CyberCriminal Campaign Collection. Contribute to CyberMonitor/APT_CyberCriminal_Campagin_Collections development by creating an account on GitHub.

China-linked spies target Asian Telcos since at least 2021

A China-linked cyber espionage group has compromised telecom operators in an Asian country since at least 2021.

ToddyCat - Threat Group Cards: A Threat Actor Encyclopedia

First seen, 2020 ; Description, (Kaspersky) ToddyCat is a relatively new APT actor that we have not been able to relate to other known actors, responsible for ...

Elusive group ToddyCat refines techniques for large-scale data theft

ToddyCat, an advanced persistent threat (APT) group that targets the government and defense sectors, has been observed hoovering up stolen data “on an ...

CTI Roundup: ToddyCat APT, GuptiMiner Malware, APT28 Exploits ...

ToddyCat deploys advanced tools for industrial scale data theft, hackers use eScan updates to spread GuptiMiner malware, and Russia's APT28 exploits a Windows ...

How APT groups operate in Southeast Asia - Positive Technologies

Southeast Asia is unique in its rapid economic growth and the widespread introduction of information technologies in the region.

Kaspersky reveals evolving tactics of ToddyCat APT group in ...

Researchers at Kaspersky have uncovered significant developments in the activities of the ToddyCat Advanced Persistent Threat (APT) group.

Microsoft Exchange servers hacked by new ToddyCat APT gang

An advanced persistent threat (APT) group dubbed ToddyCat has been targeting Microsoft Exchange servers throughout Asia and Europe for more than a year.

Stayin' Alive campaign targets high-profile Asian government and ...

A cyberespionage campaign, tracked as Stayin Alive, targeted high-profile government and telecom entities in Asia.

Chinese APT Abuses VSCode to Target Government in Asia - Unit 42

Unit 42 researchers recently found that Stately Taurus abused the popular Visual Studio Code software in espionage operations targeting government entities in ...

APT actor ToddyCat hits government and military targets in Europe ...

The previously undocumented APT group has been targeting high-profile organizations in Asia and Europe for over a year.

ToddyCat: Keep calm and check logs - Securelist

In this article, we'll describe ToddyCat new toolset, the malware used to steal and exfiltrate data, and the techniques used by this group ...

Anthony Esposito posted on the topic - ToddyCat - LinkedIn

A recent report sheds light on ToddyCat, a Chinese APT group that has been targeting government and military entities in Asia and Europe for ...

APT27 (Threat Actor) - Malpedia

A China-based actor that targets foreign embassies to collect data on government, defence, and technology sectors.

People's Republic of China (PRC) Ministry of State Security APT40 ...

This advisory, authored by the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC), the United States ...

ToddyCat, Group G1022 - MITRE ATT&CK®

ToddyCat is a sophisticated threat group that has been active since at least 2020 using custom loaders and malware in multi-stage infection chains.

Microsoft Exchange Servers Attacked by ToddyCat APT Group to ...

Over a year ago, ToddyCat, an APT group targeting Microsoft Exchange servers, launched an attack on Microsoft Exchange servers across Asia ...

China APT's, Volt Typhoon, and what to do! - Cisco

The SURGe team focuses on in-depth analysis of the latest cybersecurity news and finding answers to security problems. All of this is delivered to you in ...

ToddyCat APT Is Stealing Data on 'Industrial Scale' - NCSA Webboard

An advanced persistent threat (APT) group known as ToddyCat is actively targeting government and defense entities in the Asia-Pacific region ...

China Chopper, Software S0020 - MITRE ATT&CK®

China Chopper is a Web Shell hosted on Web servers to provide access back into an enterprise network that does not rely on an infected system.