Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Livermore Computing: Accelerating excellence in HPC

Strategies for next-gen medical technologies

Europol-led operation destroys Tycoon 2FA Phishing-as-a-Service, linked to 64,000 attacks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Europol-led operation destroys Tycoon 2FA Phishing-as-a-Service, linked to 64,000 attacks
Identity

Europol-led operation destroys Tycoon 2FA Phishing-as-a-Service, linked to 64,000 attacks

userBy userMarch 5, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that enabled cybercriminals to conduct large-scale man-in-the-middle (AitM) credential harvesting attacks, was dismantled by a coalition of law enforcement agencies and security companies.

First launched in August 2023, this subscription-based phishing kit was described by Europol as one of the world’s largest phishing operations. The kit was available for a starting price of $120 for 10 days or $350 for one month of access to the web-based admin panel.

This panel acts as your hub for configuring, tracking, and adjusting your campaigns. It includes pre-built templates, common lure-style attachments, domain and hosting configuration, redirect logic, and victim tracking. Operators can also configure how malicious content is delivered via attachments and monitor valid and invalid sign-in attempts.

The captured information, such as credentials, multi-factor authentication (MFA) codes, and session cookies, can be downloaded directly within the panel or transferred to Telegram for near real-time monitoring.

“This gave thousands of cybercriminals clandestine access to email and cloud-based service accounts,” Europol said. “At scale, the platform generated tens of millions of phishing emails each month and facilitated unauthorized access to approximately 100,000 organizations worldwide, including schools, hospitals, and public institutions.”

As part of the coordinated effort, 330 domains that formed the backbone of criminal services, including phishing pages and control panels, were removed.

Intel 471 characterized Tycoon 2FA as “dangerous” and said the kit has been linked to more than 64,000 phishing incidents and tens of thousands of domains, and generates tens of millions of phishing emails each month. According to Microsoft, which tracks the operator of the service under the name Storm-1747, Tycoon 2FA became the most prolific platform it observed in 2025, blocking more than 13 million malicious emails linked to crimeware services.

Tycoon 2FA Evolution Timeline (Source: Point Wild)

Proofpoint data shows that Tycoon 2FA accounted for the highest volume of AiTM phishing threats. The email security company announced that it observed more than 3 million messages related to phishing kits in February 2026 alone. Trend Micro, one of the private sector partners in the operation, said the PhaaS platform has about 2,000 users.

Campaigns powered by Tycoon 2FA indiscriminately target nearly every sector, including education, healthcare, finance, nonprofits, and government. Phishing emails sent from this kit reached over 500,000 organizations worldwide each month.

“Tycoon 2FA’s platform enabled attackers to impersonate trusted brands by mimicking sign-in pages for services such as Microsoft 365, OneDrive, Outlook, SharePoint, and Gmail,” Microsoft said.

“It also allowed attackers to use that service to establish persistence and access sensitive information even after passwords were reset, unless active sessions and tokens were explicitly revoked. It worked by intercepting session cookies generated during the authentication process and simultaneously capturing the user’s credentials. The MFA code was then relayed to the authentication service through Tycoon 2FA’s proxy server.”

The kit also utilized techniques such as keystroke monitoring, anti-bot screening, browser fingerprinting, heavy code obfuscation, self-hosted CAPTCHAs, custom JavaScript, and dynamic decoy pages to evade detection efforts. Another important aspect is the use of a wide mix of top-level domains (TLDs) and short-term fully qualified domain names (FQDNs) to host our phishing infrastructure on Cloudflare.

FQDNs often last only 24 to 72 hours. Rapid turnover is a deliberate effort to complicate detection and prevent reliable blocklist construction. Microsoft also attributes Tycoon 2FA’s success to closely mimicking the legitimate authentication process to covertly intercept user credentials and session tokens.

To make matters worse, Tycoon 2FA customers utilized a technique known as ATO Jumping, using compromised email accounts to distribute Tycoon 2FA URLs and attempt further account takeover activities. “This technique can be used to make the email appear to come from a trusted contact of the victim, increasing the likelihood of a successful breach,” Proofpoint noted.

Phishing kits like Tycoon are designed to be flexible enough to be accessible to non-technical attackers, while still offering advanced features to experienced operators.

“In 2025, 99% of organizations will experience an account takeover attempt and 67% will experience a successful account takeover,” Serena Larson, staff threat researcher at Proofpoint, said in a statement shared with Hacker News. “Of these, 59% of compromised accounts had MFA enabled. While not all of these attacks are related to Tycoon MFA, this illustrates the impact of AiTM phishing on enterprises.”

“These cyberattacks, which allow complete takeover of accounts, can cause disastrous effects such as ransomware and loss of sensitive data. Gaining access to corporate email accounts is often the first step in attack chains that can have devastating consequences, as threat actors continue to prioritize identity.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFBI and Europol seize LeakBase forum used to trade stolen credentials
Next Article Strategies for next-gen medical technologies
user
  • Website

Related Posts

FBI and Europol seize LeakBase forum used to trade stolen credentials

March 5, 2026

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

March 4, 2026

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Livermore Computing: Accelerating excellence in HPC

Strategies for next-gen medical technologies

Europol-led operation destroys Tycoon 2FA Phishing-as-a-Service, linked to 64,000 attacks

FBI and Europol seize LeakBase forum used to trade stolen credentials

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.