Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Tycoon2FA Resumes Cloud Phishing Attacks on Accounts
Threats

Tycoon2FA Resumes Cloud Phishing Attacks on Accounts

Cybercriminals operating Tycoon2FA, a sophisticated phishing-as-a-service (PhaaS) platform, have reactivated their operations and are once again targeting cloud accounts with near-full force. This...

Jennifer sherman
Jennifer sherman
March 24, 2026 3 Min Read
0 0

Cybercriminals operating Tycoon2FA, a sophisticated phishing-as-a-service (PhaaS) platform, have reactivated their operations and are once again targeting cloud accounts with near-full force. This resurgence comes despite a coordinated law enforcement takedown that disrupted their infrastructure on March 4, 2026, as detailed in a new report.

Europol, working alongside authorities from six countries, seized 330 domains that formed the backbone of the platform’s infrastructure in what became one of the more visible efforts to disrupt a subscription-based crimeware service.

Yet, within the same day of that announcement, operators had already begun rebuilding their operations, revealing just how resilient this threat has become.

Tycoon2FA first appeared in 2023 as a subscription-based toolkit designed to help cybercriminals bypass multifactor authentication (MFA) protections.

The platform works by using adversary-in-the-middle (AITM) techniques — sitting between a victim and a legitimate login page to intercept live authentication sessions in real time.

By mid-2025, the platform had grown into a dominant force in the phishing landscape, accounting for 62% of all phishing attempts blocked by Microsoft and reportedly sending more than 30 million malicious emails in a single month.

CrowdStrike analysts identified a brief but sharp drop in Tycoon2FA campaign activity immediately following the March 4 takedown, with daily volumes falling to just 25% of pre-disruption levels on March 4 and March 5, 2026.

That temporary decline, however, did not hold. Within days, activity returned to the same levels seen in early 2026, and cloud account compromises resumed at full pace.

Critically, the platform’s tactics, techniques, and procedures (TTPs) showed no meaningful changes after the disruption, suggesting the core service was never fully taken offline.

The March 4 operation was led by Europol’s European Cybercrime Centre (EC3) alongside law enforcement from Latvia, Lithuania, Portugal, Poland, Spain, and the United Kingdom.

The action came several months after law enforcement’s September 2025 targeting of RaccoonO365, which had served as Tycoon2FA’s primary competitor.

No arrests or physical asset seizures connected to Tycoon2FA have been reported as of this writing, a gap that analysts believe has significantly limited the long-term impact of the disruption.

The speed of Tycoon2FA’s recovery points to a broader problem with infrastructure-only takedowns.

When no arrests follow a domain seizure, operators can quickly rebuild using new hosting, fresh domains, and updated IP infrastructure — all without missing much business.

For organizations using Microsoft 365 or Google cloud services, this means the threat has not meaningfully decreased.

Post-Disruption Phishing Tactics

Between March 4 and March 6, 2026, CrowdStrike’s Falcon Complete team responded to at least 30 suspected Tycoon2FA-enabled phishing incidents involving at least 12 decoy and credential-capture pages.

The attack chain followed its established pattern: phishing emails directed victims to fake CAPTCHA pages, session cookies were stolen upon CAPTCHA validation, and an obfuscated JavaScript file was used to proxy the victim’s credentials to a legitimate Microsoft 365 login.

Once credentials and MFA tokens were captured, the Tycoon2FA platform automatically logged into the victim’s Microsoft EntraID account. These automated logins typically used IPv6 addresses linked to Romania-based internet provider M247 Europe SRL.

AI-generated Tycoon2FA decoy pages returned after failing geocheck (Source - Crowdstrike)
AI-generated Tycoon2FA decoy pages returned after failing geocheck (Source – Crowdstrike)

Operators used generative AI to produce convincing fake websites served to users who fail the platform’s geofencing checks, a step designed to filter out security researchers.

Post-disruption campaigns also used URL shortener services, links inside legitimate presentation platforms, and compromised SharePoint environments from trusted contacts to redirect targets toward Tycoon2FA infrastructure.

Eight of the 11 IPv6 addresses observed during March 2026 were first seen on or after March 1, indicating that threat actors quickly acquired new infrastructure following the takedown.

Organizations should not treat MFA as the final line of defense. Security teams should actively monitor for suspicious inbox rule creation and hidden folder activity in Microsoft Exchange, which are common early signs of business email compromise (BEC) staging.

Employees need consistent training to spot phishing emails routed through trusted platforms or URL shorteners. Enterprises should enforce conditional access policies that flag logins from unusual IPv6 ranges or unexpected geographic locations.

Ongoing monitoring of DNS resolution activity and cloud authentication logs remains critical for early detection of Tycoon2FA-related intrusions.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackphishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Threat Actors Continuously Attacking MS-SQL Servers to Deploy ICE

Next Post

TeamPCP Deploys Destructive CanisterWorm Gets Iran-Focused

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us