Tycoon2FA Phishing-as-a-Service Takedown
Summary
Hide ▲
Show ▼
Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that bypassed MFA using adversary-in-the-middle techniques, resumed operations at pre-disruption levels within days of a March 4, 2026 global takedown, despite initial reductions in campaign volumes. The platform, active since August 2023, offered subscription-based access for bypassing multi-factor authentication, targeting major services like Microsoft 365 and Google. It was linked to over 64,000 phishing incidents and facilitated unauthorized access to nearly 100,000 organizations globally by mid-2025. The primary operator, identified as 'SaaadFridi' and 'Mr_Xaad,' remains at large. The platform’s infrastructure relied on adversary-in-the-middle techniques, AI-generated decoy pages, and short-lived domains to evade detection, while customers employed tactics like ATO Jumping to distribute phishing URLs. The takedown involved Europol’s EC3 and law enforcement from six European countries. Following the disruption, Tycoon2FA rapidly recovered to pre-disruption operational levels, with daily campaign volumes returning to early 2026 levels by March 6. Post-compromise activities included business email compromise (BEC), email thread hijacking, cloud account takeovers, and malicious SharePoint links. Old infrastructure remained active after the disruption, while new phishing domains and IP addresses were registered quickly. Operators continued using unchanged TTPs, including compromised domains, legitimate cloud services, and IPv6-based automated logins, underscoring the resilience of the PhaaS model without arrests or physical seizures.
Timeline
-
04.03.2026 18:00 5 articles · 20d ago
Global Takedown of Tycoon2FA Phishing-as-a-Service
A global operation led by Microsoft and Europol, supported by multiple industry partners, seized infrastructure linked to the Tycoon2FA phishing-as-a-service (PhaaS) operation. Over 330 domains were seized, and the primary operator, identified as using the online identities 'SaaadFridi' and 'Mr_Xaad,' remains at large. The operation was coordinated by Europol and involved law enforcement in Latvia, Lithuania, Portugal, Poland, Spain, and the United Kingdom. The investigation began after intelligence was shared by Trend Micro. Tycoon2FA was linked to over 64,000 phishing incidents and facilitated unauthorized access to nearly 100,000 organizations globally. Following the takedown, Tycoon2FA rapidly recovered to pre-disruption operational levels within days. Initial disruption reduced daily campaigns to 25% of pre-disruption levels, but operators quickly restored operations using compromised domains, legitimate cloud services, IPv6-based automated logins, and AI-generated decoy pages. CrowdStrike observed at least 30 suspected Tycoon2FA-enabled phishing incidents between March 4 and March 6. The platform resumed activity with largely unchanged tactics, techniques, and procedures (TTPs), supporting a diverse set of illegal activities, including business email compromise (BEC), email thread hijacking, cloud account takeovers, and malicious SharePoint links. Post-compromise activities observed include the creation of inbox rules, hidden folders for fraud emails, and preparation for BEC operations. Old infrastructure remained active after the disruption, while new phishing domains and IP addresses were registered quickly following the law enforcement operation.
Show sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA Phishing Service Resumes Activity Post-Takedown — www.infosecurity-magazine.com — 23.03.2026 18:05
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
Information Snippets
-
Tycoon2FA used adversary-in-the-middle techniques to intercept live authentication sessions, capturing credentials, one-time passcodes, and active session cookies in real time.
First reported: 04.03.2026 18:003 sources, 4 articlesShow sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
The operation seized over 300 domains linked to Tycoon2FA.
First reported: 04.03.2026 18:003 sources, 4 articlesShow sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA had around 2000 users and used more than 24,000 domains since its launch in August 2023.
First reported: 04.03.2026 18:003 sources, 4 articlesShow sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
The primary operator of Tycoon2FA is identified as using the online identities 'SaaadFridi' and 'Mr_Xaad.'
First reported: 04.03.2026 18:003 sources, 4 articlesShow sources
- Global Takedown Neutralizes Tycoon2FA Phishing Service — www.infosecurity-magazine.com — 04.03.2026 18:00
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA was generating tens of millions of phishing emails each month by mid-2025, reaching more than 60% of all blocked phishing attempts.
First reported: 04.03.2026 19:012 sources, 3 articlesShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA was sold through Telegram for $120 for 10 days of access.
First reported: 04.03.2026 19:012 sources, 3 articlesShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA targeted Microsoft and Google customers using a reverse proxy server to intercept login credentials and session cookies in real time.
First reported: 04.03.2026 19:012 sources, 3 articlesShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA allowed attackers to hijack authenticated sessions and circumvent MFA protections, even after the login process appeared to succeed normally from the victims' perspective.
First reported: 04.03.2026 19:012 sources, 3 articlesShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA impersonated trusted brands by mimicking sign-in pages for services like Microsoft 365, OneDrive, Outlook, SharePoint, and Gmail.
First reported: 04.03.2026 19:012 sources, 3 articlesShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA enabled threat actors to establish persistence and access sensitive information even after passwords were reset, unless active sessions and tokens were explicitly revoked.
First reported: 04.03.2026 19:012 sources, 3 articlesShow sources
- Europol-coordinated action disrupts Tycoon2FA phishing platform — www.bleepingcomputer.com — 04.03.2026 19:01
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA was available for a starting price of $350 for access to a web-based administration panel for a month.
First reported: 05.03.2026 08:512 sources, 2 articlesShow sources
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA was linked to over 64,000 phishing incidents.
First reported: 05.03.2026 08:512 sources, 2 articlesShow sources
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA generated tens of millions of phishing emails each month and facilitated unauthorized access to nearly 100,000 organizations globally.
First reported: 05.03.2026 08:512 sources, 2 articlesShow sources
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA used techniques like keystroke monitoring, anti-bot screening, browser fingerprinting, heavy code obfuscation, self-hosted CAPTCHAs, custom JavaScript, and dynamic decoy pages to sidestep detection efforts.
First reported: 05.03.2026 08:512 sources, 2 articlesShow sources
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA employed a broader mix of top-level domains (TLDs) and short-lived fully qualified domain names (FQDNs) to host the phishing infrastructure on Cloudflare.
First reported: 05.03.2026 08:512 sources, 2 articlesShow sources
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA customers leveraged a technique called ATO Jumping, using a compromised email account to distribute Tycoon 2FA URLs and attempt further account takeover activities.
First reported: 05.03.2026 08:512 sources, 2 articlesShow sources
- Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks — thehackernews.com — 05.03.2026 08:51
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA resumed activity after the global takedown operation despite initial disruption.
First reported: 23.03.2026 18:052 sources, 2 articlesShow sources
- Tycoon2FA Phishing Service Resumes Activity Post-Takedown — www.infosecurity-magazine.com — 23.03.2026 18:05
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Authorities seized 330 domains linked to Tycoon2FA in the takedown operation, reducing daily campaigns to 25% of pre-disruption levels.
First reported: 23.03.2026 18:052 sources, 2 articlesShow sources
- Tycoon2FA Phishing Service Resumes Activity Post-Takedown — www.infosecurity-magazine.com — 23.03.2026 18:05
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
CrowdStrike observed at least 30 suspected Tycoon2FA-enabled phishing incidents between March 4 and March 6, involving decoy and credential-capture pages.
First reported: 23.03.2026 18:052 sources, 2 articlesShow sources
- Tycoon2FA Phishing Service Resumes Activity Post-Takedown — www.infosecurity-magazine.com — 23.03.2026 18:05
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Operators continue to use compromised domains and legitimate cloud services for redirection, with IPv6 addresses tied to automated cloud logins remaining active.
First reported: 23.03.2026 18:052 sources, 2 articlesShow sources
- Tycoon2FA Phishing Service Resumes Activity Post-Takedown — www.infosecurity-magazine.com — 23.03.2026 18:05
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA employs AI-generated decoy pages and malicious URLs, showing no change in tactics post-takedown.
First reported: 23.03.2026 18:052 sources, 2 articlesShow sources
- Tycoon2FA Phishing Service Resumes Activity Post-Takedown — www.infosecurity-magazine.com — 23.03.2026 18:05
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
The takedown involved Europol's European Cybercrime Centre (EC3) and authorities from six countries: Latvia, Lithuania, Portugal, Poland, Spain, and the UK.
First reported: 23.03.2026 18:052 sources, 2 articlesShow sources
- Tycoon2FA Phishing Service Resumes Activity Post-Takedown — www.infosecurity-magazine.com — 23.03.2026 18:05
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Tycoon2FA resumed operations to previously observed activity levels within days of the March 4 takedown, despite initial disruption reducing daily campaigns to 25% of pre-disruption levels.
First reported: 23.03.2026 23:521 source, 1 articleShow sources
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Post-disruption activity included business email compromise (BEC), email thread hijacking, cloud account takeovers, and malicious SharePoint links.
First reported: 23.03.2026 23:521 source, 1 articleShow sources
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Post-compromise activities observed included creation of inbox rules, hidden folders for fraud emails, and preparation for BEC operations.
First reported: 23.03.2026 23:521 source, 1 articleShow sources
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
-
Old infrastructure remained active after the disruption, while new phishing domains and IP addresses were registered quickly following law enforcement action.
First reported: 23.03.2026 23:521 source, 1 articleShow sources
- Tycoon2FA phishing platform returns after recent police disruption — www.bleepingcomputer.com — 23.03.2026 23:52
Similar Happenings
Darktrace Detects 32 Million Phishing Emails in 2025 as Identity Attacks Surge
Darktrace detected over 32 million high-confidence phishing emails in 2025, indicating a significant rise in identity-driven cyber threats. The report highlights the increasing sophistication of phishing tactics, including the use of newly created domains, malicious QR codes, and novel social engineering techniques. Identity compromise has overtaken vulnerability exploitation as the primary entry vector, with attackers leveraging stolen credentials and hijacked tokens to gain access. The report also reveals regional and sector-specific trends, with the Americas accounting for 47% of global security events and manufacturing being a major target for ransomware.
Starkiller Phishing Kit Bypasses MFA via Proxy-Based Attacks
A new phishing kit called Starkiller has emerged, allowing attackers to bypass multi-factor authentication (MFA) by proxying legitimate login pages. The kit is distributed as a subscription-based service on the dark web, offering real-time session monitoring and keylogging capabilities. It mimics login pages of major services like Google, Microsoft, and banks, routing traffic through attacker-controlled infrastructure to steal credentials and authentication tokens. Starkiller uses Docker containers running headless Chrome instances to serve genuine page content, making it difficult for security vendors to detect or block. The toolkit is sold with updates and customer support, posing a significant escalation in phishing infrastructure. The service is part of a broader cybercrime offering by a threat group called Jinkusu, which provides additional features such as email harvesting and campaign analytics. Starkiller integrates URL shorteners such as TinyURL to obscure the destination URL. It uses a headless Chrome instance inside a Docker container to act as a reverse proxy between the target and the legitimate site. The platform centralizes infrastructure management, phishing page deployment, and session monitoring within a single control panel, combining URL masking, session hijacking, and MFA bypass to streamline phishing operations.
JokerOTP MFA phishing-as-a-service dismantled, third suspect arrested
The Netherlands Police arrested a 21-year-old man from Dordrecht for selling access to the JokerOTP phishing automation tool, which intercepts one-time passwords (OTPs) to hijack accounts. The arrest is part of a three-year investigation that led to dismantling the JokerOTP phishing-as-a-service (PhaaS) operation in April 2025. The service caused at least $10 million in financial losses across 28,000 attacks in 13 countries. The seller advertised access via Telegram, allowing cybercriminals to automate calls to victims and capture sensitive data. The tool targeted users of PayPal, Venmo, Coinbase, Amazon, and Apple. The investigation is ongoing, with dozens of buyers identified for prosecution.
AI-Driven Phishing Attacks Double in Volume Year-Over-Year
Phishing attacks detected in 2025 increased more than double compared to 2024, with one email caught every 19 seconds. AI technology is enabling threat actors to generate, test, and deploy phishing campaigns at scale, resulting in faster, more adaptive, and convincing attacks. The rise includes polymorphic, multi-channel campaigns that continuously change their appearance while maintaining malicious intent. AI is helping threat actors compose emails in near-flawless local languages, contributing to a 18% rise in conversational phishing emails. Other trends include highly personalized campaigns, polymorphism by default, and a surge in the use of remote access tools (RATs). The .es TLD saw a 19-fold increase in use for credential phishing, making it the third-most abused domain. The report also noted a 204% increase in phishing emails delivering malware in 2025 compared to 2024.
Credential Theft and Account Compromise Surge in 2025
In 2025, cyber threat actors significantly increased their focus on credential theft, leading to a 389% rise in account compromise incidents, which constituted 55% of all attacks observed by eSentire. Credential access represented 75% of malicious activity, with two-thirds aimed at account takeovers and the remaining third used for phishing campaigns. Microsoft 365 accounts were primary targets. The use of phishing-as-a-service (PhaaS) kits, such as Tycoon2FA, FlowerStorm, and EvilProxy, fueled business email compromise (BEC) attacks. These kits are sophisticated, continuously updated, and designed to bypass modern security controls like multifactor authentication (MFA). While BEC attacks declined to less than 10% of malicious activity, they remained a top threat for companies, particularly in real estate, finance, retail, and construction. The report also highlighted a 14-fold increase in security incidents involving email bombing and IT Help Desk impersonation, a 300% spike in the ClickFix lure, and varying trends in cyber incidents across different industries.