Tycoon2FA PhaaS Platform Resurgence After Takedown
The Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.
Tycoon2FA is a subscription-based PhaaS platform that enables cybercriminals to bypass multifactor authentication (MFA) and compromise email accounts using adversary-in-the-middle (AITM) techniques. The platform gained prominence in 2025, reportedly generating over 30 million malicious emails in a single month and accounting for 62% of all phishing attempts blocked by Microsoft at one point. On March 4, 2026, Europol announced a technical disruption of Tycoon2FA, seizing 330 domains forming the platform’s core infrastructure. Despite this takedown, CrowdStrike Falcon Complete observed a short-term decrease in Tycoon2FA activity followed by a return to pre-disruption levels. The persistence of the platform’s original tactics, techniques, and procedures (TTPs) suggests that the actors behind Tycoon2FA remain active and pose a continued threat. Defenders should maintain vigilance.
Attack Chain
- Victims receive phishing emails designed to appear legitimate.
- These emails direct victims to Tycoon2FA CAPTCHA pages hosted on attacker-controlled domains.
- Upon CAPTCHA validation, a JavaScript (JS) file extracts the victim’s email address.
- The victim is then redirected to a fake Microsoft 365 or Google login page hosted on a Tycoon2FA domain.
- Victims enter their credentials, which are proxied to a legitimate Microsoft 365 cloud account via an obfuscated JS file.
- The attacker steals the victim’s session cookies and credentials.
- The attacker authenticates to the victim’s cloud environment using the stolen cookies and credentials.
- The attacker gains access to the victim’s email and other cloud-based resources, potentially leading to data exfiltration or further malicious activity.
Impact
Tycoon2FA’s operations began in 2023, and by mid-2025, it was responsible for 62% of all phishing attempts blocked by Microsoft, generating over 30 million malicious emails in a single month. A successful attack can lead to unauthorized access to sensitive data, business email compromise, financial loss, and reputational damage. The resurgence of Tycoon2FA following the takedown indicates the platform remains a significant threat, highlighting the need for robust defenses against phishing and credential theft.
Recommendation
- Monitor email traffic for unusual patterns and sender addresses to detect phishing attempts associated with Tycoon2FA (IOC: phishing emails).
- Implement and tune web filtering rules to block access to known Tycoon2FA domains and newly registered domains that may be used for phishing campaigns (IOC: Tycoon2FA domain).
- Deploy the Sigma rule to detect JavaScript files that attempt to extract email addresses from web pages, a technique used by Tycoon2FA to target victims.
- Review and reinforce MFA policies and educate users about the risks of phishing and credential theft.
Detection coverage 2
Detect Email Address Extraction via JavaScript
mediumDetects JavaScript code attempting to extract email addresses from web pages, a technique used by Tycoon2FA.
Detect Access to Fake Microsoft 365 Login Page
highDetects access to fake Microsoft 365 login pages hosted on suspicious domains.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
| Type | Value |
|---|---|
| phishing emails |