Tycoon 2FA Disruption Drives Surge in Device Code Phishing and Redistribution of PhaaS Tooling
Summary
Hide ▲
Show ▼
Following a coordinated law enforcement takedown targeting the Tycoon 2FA phishing-as-a-service (PhaaS) operation, threat actors have rapidly redistributed tools, code, and techniques to competing PhaaS platforms including Mamba 2FA, EvilProxy, and Sneaky 2FA. This shift has coincided with a significant increase in device code phishing campaigns, which bypass traditional MFA by exploiting legitimate OAuth 2.0 and device authorization flows. Attackers are repurposing Tycoon 2FA’s artifacts and code—including unique obfuscation methods such as motivational-style comments in source code—to launch new campaigns that trick users into granting persistent account access via device approval prompts. Tycoon 2FA’s operational capacity dropped from over 9 million attacks per month to approximately 2 million following the takedown, but overall phishing activity has not declined proportionally. Instead, the ecosystem has fragmented, with Mamba 2FA nearly doubling its output to over 15 million attacks per month and EvilProxy rising from ~3 million to ~4 million monthly attacks.
Timeline
-
17.04.2026 22:05 1 articles · 3h ago
Tycoon 2FA Disruption Accelerates Rise of Device Code Phishing and PhaaS Redistribution
Following a coordinated law enforcement takedown of Tycoon 2FA’s infrastructure in early 2026, threat actors rapidly migrated to alternative PhaaS platforms including Mamba 2FA, EvilProxy, and Sneaky 2FA. This migration coincided with a significant surge in device code phishing campaigns, which leverage legitimate OAuth 2.0 device authorization flows to bypass MFA and achieve persistent account takeover. Attackers are repurposing Tycoon 2FA’s code and artifacts—including motivational-style comments used for obfuscation—to seed new campaigns. As a result, Mamba 2FA’s attack volume nearly doubled to over 15 million per month, while EvilProxy increased from ~3 million to ~4 million monthly attacks. Device code phishing, previously uncommon, has become a dominant technique in the threat landscape over the last 3–4 weeks.
Show sources
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing — www.darkreading.com — 17.04.2026 22:05
Information Snippets
-
Tycoon 2FA, previously responsible for nearly 90% of global PhaaS activity a year ago, saw its market share decline to less than 50% before a coordinated law enforcement takedown disrupted 330 of its active domains in early 2026.
First reported: 17.04.2026 22:051 source, 1 articleShow sources
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing — www.darkreading.com — 17.04.2026 22:05
-
Post-takedown, Tycoon 2FA’s attack volume dropped from over 9 million to just over 2 million per month, but overall ecosystem activity remained high due to actor migration to other services.
First reported: 17.04.2026 22:051 source, 1 articleShow sources
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing — www.darkreading.com — 17.04.2026 22:05
-
Mamba 2FA, Tycoon 2FA’s largest competitor, increased its attack volume from ~8 million to over 15 million per month following the takedown—a near doubling of output.
First reported: 17.04.2026 22:051 source, 1 articleShow sources
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing — www.darkreading.com — 17.04.2026 22:05
-
EvilProxy’s monthly attack volume rose from just under 3 million to over 4 million around the same period, positioning it as a major beneficiary of the disruption.
First reported: 17.04.2026 22:051 source, 1 articleShow sources
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing — www.darkreading.com — 17.04.2026 22:05
-
Device code phishing—leveraging legitimate OAuth 2.0 device authorization flows to bypass MFA—has surged since November–December 2025, with a sharp increase observed over the last 3–4 weeks.
First reported: 17.04.2026 22:051 source, 1 articleShow sources
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing — www.darkreading.com — 17.04.2026 22:05
-
Threat actors are repurposing Tycoon 2FA’s code and artifacts, including motivational-style comments embedded in source code as obfuscation, to seed new device code phishing campaigns.
First reported: 17.04.2026 22:051 source, 1 articleShow sources
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing — www.darkreading.com — 17.04.2026 22:05
-
Attackers are integrating device code phishing kits into broader PhaaS packages, enabling credential theft and persistent account takeover without requiring user interaction beyond approving a device login prompt.
First reported: 17.04.2026 22:051 source, 1 articleShow sources
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing — www.darkreading.com — 17.04.2026 22:05