5 min read

Getting deep with Tycoon 2FA

Getting deep with Tycoon 2FA

Tycoon 2FA is a phishing-as-a-service platform designed to bypass two-factor authentication and facilitate account takeovers. First observed in 2023, the toolkit enables attackers to run large-scale phishing campaigns that capture login credentials and authentication tokens in real time, thereby granting access to accounts even when MFA is enabled. Security researchers say Tycoon 2FA operates as an adversary in the middle phishing framework, meaning it secretly sits between victims and legitimate login services such as Microsoft 365 or Gmail and captures credentials and session cookies as users try to sign in, according to Cybereason. Unlike traditional phishing, which typically collects only usernames and passwords, Tycoon 2FA is designed specifically to bypass MFA. Microsoft says it includes ready-made phishing infrastructure, templates, and management dashboards that enable even less-experienced attackers to launch credential-theft campaigns at scale.

 

Understanding the Tycoon 2FA ecosystem

Tycoon 2FA demonstrates how phishing has shifted toward a service-based cybercrime model, in which attackers can subscribe to ready-made tools rather than building their own infrastructure. Researchers report that the platform operates as a turnkey phishing service that provides hosting, realistic login-page templates, and campaign-management tools, enabling attackers to launch credential-theft campaigns with minimal technical knowledge. According to Microsoft, the phishing kit has been promoted on underground Telegram channels since at least 2023, with access reportedly costing approximately $120 for a 10-day subscription. Security researchers report that the platform manages much of the attack process, including phishing pages, credential harvesting, and real-time interception of authentication tokens, showing a broader trend in which cybercrime tools such as phishing kits and ransomware are sold as subscription services.

Learn more: Phishing kits fuel service-based cybercriminals

 

How Tycoon 2FA bypasses MFA

The most dangerous feature of Tycoon 2FA is its use of adversary-in-the-middle phishing, a technique in which the attacker secretly sits between the victim and the legitimate login service. Rather than merely stealing passwords, the phishing site functions as a live proxy. When a victim clicks a phishing link, they are redirected to a fraudulent login page that closely mimics the legitimate one. The phishing server then communicates with the legitimate service in the background. When the victim enters their username, password, and multi-factor authentication code, the phishing infrastructure forwards the information to the real service. It captures the authentication session token returned by the server. Research by Microsoft indicates that attackers can use this session cookie to access the account without reentering the MFA code, because the service treats the hijacked session as already authenticated.

 

Scale of Tycoon 2FA attacks

Threat intelligence data shows how large the Tycoon 2FA ecosystem had become before its disruption. Investigators say the platform was responsible for sending tens of millions of phishing emails each month and helped attackers compromise accounts across nearly 100,000 organizations worldwide. Its infrastructure relied on hundreds of domains used to host phishing pages and attacker control panels. A coordinated law enforcement operation involving Europol and several cybersecurity companies resulted in the seizure of about 330 domains that formed the core of the platform’s infrastructure. Security researchers also estimated that Tycoon 2FA accounted for approximately 62 percent of phishing attempts blocked by Microsoft by mid-2025.

 

Real-world campaigns and targets

Campaigns involving Tycoon 2FA have targeted organizations across multiple industries, focusing on compromising cloud identity platforms, such as Microsoft 365 and Google Workspace, which are often linked to corporate email and authentication systems. Security researchers say that many attacks begin with phishing emails disguised as internal communications, HR notices, password reset alerts, or document-sharing messages that direct victims to fraudulent login pages that mimic legitimate portals. Reporting from The Hacker News notes that some campaigns also use PDF files, PowerPoint documents, or image files containing embedded phishing links that redirect victims to Tycoon-generated login pages. Other attacks involve spoofed internal emails that appear to come from within the victim organization, often exploiting weak email authentication controls. Once attackers capture credentials and session tokens, they can carry out follow-on attacks such as business email compromise, financial fraud, or deeper network intrusion.

Read also: What are Business Email Compromise attacks?

 

What happens after accounts are compromised

Account compromise is rarely the final goal. Once attackers gain access to a cloud identity account, they often use it to move into additional services connected to that account. Researchers report that attacks using Tycoon 2FA frequently result in business email compromise schemes, unauthorized access to corporate cloud storage, and theft of sensitive documents. Stolen accounts may also be sold to other cybercriminal groups or used to deploy additional malware or ransomware. Because cloud identity accounts are linked to many services, a single compromised login can give attackers access to email conversations, shared files, authentication tokens, and password reset functions across the organization.

 

Why Tycoon 2FA became so successful

Several factors have contributed to Tycoon 2FA becoming one of the most widely used phishing-as-a-service platforms. First, the service lowered the technical barrier for launching advanced phishing campaigns. Attackers did not need to write code or build their own infrastructure. They could subscribe to the platform and launch phishing campaigns using built-in templates and tools. Research found that this model enabled less experienced cybercriminals to conduct sophisticated attacks. Second, the platform changed to avoid security detection. Analysts observed updates designed to bypass automated security analysis, avoid fingerprinting tools, and detect browser automation often used by security researchers. TechRadar reported that these changes helped the phishing kit remain effective against common detection methods. Finally, the attacks targeted identity systems rather than software vulnerabilities. Many modern cloud services rely heavily on login credentials and session tokens, which makes identity authentication systems an attractive target for attackers.

 

The global disruption effort

In early 2026, law enforcement agencies and cybersecurity companies conducted a coordinated operation to disrupt the infrastructure supporting Tycoon 2FA. The effort involved cooperation between Microsoft, Europol, and multiple security organizations. Investigators tracked the platform’s infrastructure, seized domains, and disrupted the phishing network used by attackers. Reporting from IT Pro states that Microsoft investigators infiltrated the service by posing as customers, which allowed them to analyze the infrastructure, trace payments, and identify operators. The investigation led to court-ordered domain seizures that disabled a large portion of the phishing platform, although experts warn that similar phishing services could quickly appear to replace it.

 

The bigger picture

Tycoon 2FA shows how phishing has grown from small scams into a more organized cybercrime infrastructure. Hoala Greevy, chief executive of Paubox, describes the trend as “deception at scale,” where modern phishing campaigns operate more like structured services than isolated hacker activity. More than 70 percent of healthcare data breaches now begin with phishing, and attackers mostly use automation and cloud infrastructure to run campaigns efficiently while avoiding many built-in security tools. Instead of a single attacker, the ecosystem can include developers who build phishing tools, infrastructure providers who host them, and customers who purchase access to launch attacks. Platforms like Tycoon 2FA represent the increase of phishing as a service, where ready-made phishing kits can be deployed quickly and at scale, allowing sophisticated attacks to spread across industries that rely mainly on cloud accounts and email communication.

 

FAQs

What is Tycoon 2FA?

Tycoon 2FA is a phishing-as-a-service platform that bypasses multi-factor authentication by intercepting login credentials and session cookies in real time.

 

How does Tycoon 2FA bypass MFA?

The platform employs adversary-in-the-middle phishing, acting as a proxy between the victim and the legitimate login service, thereby capturing authentication tokens after MFA verification.

 

What services are most commonly targeted?

Researchers report that Tycoon 2FA campaigns commonly target Microsoft 365 and Gmail accounts used by organizations.

 

How large were Tycoon 2FA attacks?

Before the disruption, the platform generated tens of millions of phishing emails each month and contributed to a large share of phishing activity observed by Microsoft security systems.

 

Has Tycoon 2FA been stopped?

Law enforcement and security companies disrupted major parts of the infrastructure in 2026, however experts warn that similar phishing-as-a-service platforms may continue to appear.

Subscribe to Paubox Weekly

Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.