SYMBOLCOMMON_NAMEaka. SYNONYMS

ToddyCat  (Back to overview)

aka: Websiic

ToddyCat is responsible for multiple sets of attacks detected since December 2020 against high-profile entities in Europe and Asia. There is still little information about this actor, but its main distinctive signs are two formerly unknown tools that Kaspersky call ‘Samurai backdoor’ and ‘Ninja Trojan’.


Associated Families

There are currently no families associated with this actor.


References
2022-07-01RiskIQRiskIQ
ToddyCat: A Guided Journey through the Attacker's Infrastructure
ShadowPad ToddyCat
2022-06-21KasperskyGiampaolo Dedola
APT ToddyCat: Unveiling an unknown APT actor attacking high-profile entities in Europe and Asia
ToddyCat
2022-06-21BleepingComputerSergiu Gatlan
Microsoft Exchange servers hacked by new ToddyCat APT gang
ToddyCat
2021-10-22TEAMT5TeamT5
Assassinations of "MiniNinja" in Various APAC Countries
ToddyCat
2021-03-10ESET ResearchMathieu Tartare, Matthieu Faou, Thomas Dupuy
Exchange servers under siege from at least 10 APT groups
Microcin MimiKatz PlugX Winnti APT27 APT41 Calypso Tick ToddyCat Tonto Team Vicious Panda
2021-03-03GTSCGTSC
'Mild' update on Microsoft Exchange 0day security vulnerability being used to attack organizations in Vietnam
ToddyCat

Credits: MISP Project