Tycoon2FA Phishing-as-a-Service Takedown
Summary
Hide ▲
Show ▼
A global operation led by Microsoft and Europol, supported by multiple industry partners, seized infrastructure linked to the Tycoon2FA phishing-as-a-service (PhaaS) operation. Tycoon2FA offered subscription-based services that intercepted live authentication sessions, bypassing multi-factor authentication (MFA) and enabling large-scale attacks on corporate inboxes. The operation resulted in the seizure of over 300 domains associated with Tycoon2FA, which had around 2000 users and used more than 24,000 domains since its launch in August 2023. The primary operator, identified as using the online identities 'SaaadFridi' and 'Mr_Xaad,' remains at large. Tycoon2FA was generating tens of millions of phishing emails each month by mid-2025, reaching more than 60% of all blocked phishing attempts. The platform was sold through Telegram for $120 for 10 days of access, lowering the barrier for low-skilled criminals to launch sophisticated, MFA-bypassing attacks at scale.
Timeline
-
04.03.2026 18:00 2 articles · 2h ago
Global Takedown of Tycoon2FA Phishing-as-a-Service
A global operation led by Microsoft and Europol, supported by multiple industry partners, seized infrastructure linked to the Tycoon2FA phishing-as-a-service (PhaaS) operation. Over 330 domains were seized, and the primary operator, identified as using the online identities 'SaaadFridi' and 'Mr_Xaad,' remains at large. The operation was coordinated by Europol and involved law enforcement in Latvia, Lithuania, Portugal, Poland, Spain, and the United Kingdom. The investigation began after intelligence was shared by Trend Micro.
Show sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
Information Snippets
-
Tycoon2FA used adversary-in-the-middle techniques to intercept live authentication sessions, capturing credentials, one-time passcodes, and active session cookies in real time.
First reported: 04.03.2026 18:002 sources, 2 articlesShow sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
The operation seized over 300 domains linked to Tycoon2FA.
First reported: 04.03.2026 18:002 sources, 2 articlesShow sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
Tycoon2FA had around 2000 users and used more than 24,000 domains since its launch in August 2023.
First reported: 04.03.2026 18:002 sources, 2 articlesShow sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
The primary operator of Tycoon2FA is identified as using the online identities 'SaaadFridi' and 'Mr_Xaad.'
First reported: 04.03.2026 18:002 sources, 2 articlesShow sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
Tycoon2FA was generating tens of millions of phishing emails each month by mid-2025, reaching more than 60% of all blocked phishing attempts.
First reported: 04.03.2026 19:011 source, 1 articleShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
Tycoon2FA was sold through Telegram for $120 for 10 days of access.
First reported: 04.03.2026 19:011 source, 1 articleShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
Tycoon2FA targeted Microsoft and Google customers using a reverse proxy server to intercept login credentials and session cookies in real time.
First reported: 04.03.2026 19:011 source, 1 articleShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
Tycoon2FA allowed attackers to hijack authenticated sessions and circumvent MFA protections, even after the login process appeared to succeed normally from the victims' perspective.
First reported: 04.03.2026 19:011 source, 1 articleShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
Tycoon2FA impersonated trusted brands by mimicking sign-in pages for services like Microsoft 365, OneDrive, Outlook, SharePoint, and Gmail.
First reported: 04.03.2026 19:011 source, 1 articleShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
-
Tycoon2FA enabled threat actors to establish persistence and access sensitive information even after passwords were reset, unless active sessions and tokens were explicitly revoked.
First reported: 04.03.2026 19:011 source, 1 articleShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
Similar Happenings
JokerOTP MFA phishing-as-a-service dismantled, third suspect arrested
The Netherlands Police arrested a 21-year-old man from Dordrecht for selling access to the JokerOTP phishing automation tool, which intercepts one-time passwords (OTPs) to hijack accounts. The arrest is part of a three-year investigation that led to dismantling the JokerOTP phishing-as-a-service (PhaaS) operation in April 2025. The service caused at least $10 million in financial losses across 28,000 attacks in 13 countries. The seller advertised access via Telegram, allowing cybercriminals to automate calls to victims and capture sensitive data. The tool targeted users of PayPal, Venmo, Coinbase, Amazon, and Apple. The investigation is ongoing, with dozens of buyers identified for prosecution.
International Law Enforcement Disrupts Rhadamanthys, VenomRAT, and Elysium Malware Operations
Law enforcement agencies from 11 countries, coordinated by Europol and Eurojust, disrupted operations of Rhadamanthys infostealer, VenomRAT, and Elysium botnet malware as part of Operation Endgame 3.0. The action, which occurred between November 10 and 13, 2025, involved seizing over 1,000 servers and 20 domains, arresting a key suspect in Greece, and uncovering millions of stolen credentials. The operation also involved multiple private cybersecurity partners. The dismantled infrastructure included hundreds of thousands of infected computers, with the main suspect behind Rhadamanthys having access to over 100,000 crypto wallets worth millions of euros. Victims were often unaware of their systems' infections. The latest version of Rhadamanthys added support for collecting device and web browser fingerprints, along with incorporating several mechanisms to fly under the radar. Additionally, the Dutch police seized around 250 physical servers and thousands of virtual servers used by a bulletproof hosting service, which has been involved in over 80 cybercrime investigations since 2022. The seized servers were located in data centers in The Hague and Zoetermeer.
RaccoonO365 Phishing Network Disrupted by Microsoft and Cloudflare
The RaccoonO365 phishing network, a financially motivated threat group, was disrupted by Microsoft's Digital Crimes Unit (DCU) and Cloudflare. The operation, executed through a court order in the Southern District of New York, seized 338 domains used by the group since July 2024. The network targeted over 2,300 organizations in 94 countries, including at least 20 U.S. healthcare entities, and stole over 5,000 Microsoft 365 credentials. Authorities in Nigeria have arrested three individuals linked to the RaccoonO365 phishing-as-a-service (PhaaS) scheme, including Okitipi Samuel, also known as Moses Felix, identified as the principal suspect and developer of the phishing infrastructure. The Nigeria Police Force National Cybercrime Centre (NPF–NCCC) collaborated with Microsoft and the FBI in the investigation, seizing laptops, mobile devices, and other digital equipment linked to the operation. The stolen data was used to fuel more cybercrimes, including business email compromise, financial fraud, and ransomware attacks. The Nigerian police arrested three individuals linked to targeted Microsoft 365 cyberattacks via Raccoon0365 phishing platform. The attacks led to business email compromise, data breaches, and financial losses affecting organizations worldwide. The law enforcement operation was possible thanks to intelligence from Microsoft, shared with the Nigeria Police Force National Cybercrime Centre (NPF–NCCC) via the FBI. The authorities identified individuals who administered the phishing toolkit 'Raccoon0365,' which automated the creation of fake Microsoft login pages for credential theft. The service, which was responsible for at least 5,000 Microsoft 365 account compromises across 94 countries, was disrupted by Microsoft and Cloudflare last September. It is unclear if the disruption operation helped identify those behind Raccoon0365 in Nigeria. One of the arrested suspects is an individual named Okitipi Samuel, also known online as 'RaccoonO365' and 'Moses Felix,' whom the police believe is the developer of the phishing platform. Samuel operated a Telegram channel where he sold phishing kits to other cybercriminals in exchange for cryptocurrency, while he also hosted the phishing pages on Cloudflare using accounts registered with compromised credentials. The Telegram channel counted over 800 members around the time of the disruption, and the reported access fees ranged from $355/month to $999/3 months. Cloudflare estimates that the service is used primarily by Russia-based cybercriminals. Regarding the other two arrested individuals, the police stated they have no evidence linking them to the Raccoon0365 operation or creation. The person that Microsoft previously identified as the leader of the phishing service, Joshua Ogundipe, is not mentioned in the police’s announcement.
VoidProxy phishing service targets Microsoft 365, Google accounts
A new phishing-as-a-service (PhaaS) platform, VoidProxy, targets Microsoft 365 and Google accounts, including those protected by third-party single sign-on (SSO) providers like Okta. The platform uses adversary-in-the-middle (AitM) tactics to steal credentials, multi-factor authentication (MFA) codes, and session cookies in real time. The attack begins with emails from compromised accounts at email service providers, which include shortened links redirecting recipients to phishing sites. The phishing sites are hosted on disposable low-cost domains and protected by Cloudflare to hide their real IPs. Additionally, a new phishing automation platform named Quantum Route Redirect (QRR) is targeting Microsoft 365 users worldwide. QRR uses around 1,000 domains hosted on parked or compromised domains to steal credentials. The attacks start with malicious emails impersonating various services, redirecting users to credential harvesting pages. QRR employs a built-in filtering mechanism to distinguish between bots and human visitors, redirecting humans to phishing pages while sending bots to benign sites. QRR has been observed targeting Microsoft 365 accounts across 90 countries, with 76% of attacks directed at U.S. users. The platform offers advanced features such as a configuration panel, monitoring dashboards, intelligent traffic routing, and an analytics dashboard, making it easier for less technically minded cybercriminals to launch sophisticated phishing campaigns. QRR has been observed in the wild since August 2025 and uses a URL pattern of "/([\w\d-]+\.){2}[\w]{,3}\/quantum.php/" for its phishing campaigns. QRR can bypass Microsoft 365 email protections, including Microsoft Exchange Online Protection (EOP), secure email gateways (SEG), and integrated cloud email security (ICES) products. QRR's intelligent redirect system can differentiate between security tools and human visitors, redirecting security tools to legitimate websites and human visitors to phishing pages. QRR has been observed deceiving web application firewall products, enabling attacks to bypass multiple layers of security.