PROBABLYPWNED
AnnouncementsMarch 24, 20263 min read

Europol and Microsoft Dismantle Tycoon 2FA Phishing Empire

Global coalition seizes 330 domains powering Tycoon 2FA, a phishing-as-a-service platform that bypassed MFA to compromise 96,000 victims across 500,000 organizations.

ProbablyPwned Team

A coordinated international operation has dismantled Tycoon 2FA, one of the most prolific phishing-as-a-service platforms ever observed. Europol, Microsoft, and private sector partners including Cloudflare, Trend Micro, and Intel 471 seized 330 domains comprising the service's user control panels and fake login pages.

By mid-2025, Tycoon 2FA accounted for roughly 62 percent of all phishing attempts Microsoft blocked—more than 30 million malicious emails in a single month. The platform enabled approximately 2,000 cybercriminals to target over 500,000 organizations monthly.

Why Tycoon 2FA Worked

Unlike traditional phishing kits that capture passwords and fail at the MFA prompt, Tycoon 2FA functioned as an adversary-in-the-middle proxy. When victims entered credentials on a fake login page, the platform relayed them in real-time to the legitimate service, captured the MFA code, and intercepted the resulting session cookie.

The attacker ended up with a valid authenticated session. The victim got a genuine login experience. MFA provided no protection because the attack captured the session after authentication completed.

This technique has become the standard for sophisticated phishing operations. We've covered similar approaches in the Russian intelligence phishing campaigns targeting Signal and WhatsApp, where session hijacking bypassed security controls designed to prevent credential-only attacks.

The Victim Count

Tycoon 2FA connected to approximately 96,000 distinct phishing victims since launching in August 2023:

  • 179,264 victims in the United States (largest concentration)
  • 16,901 victims in the United Kingdom
  • 15,272 victims in Canada
  • 7,832 victims in India
  • 6,823 victims in France

Campaigns targeted almost every sector: education, healthcare, finance, non-profits, government. The platform's 55,000 compromised Microsoft customers likely represent corporate accounts with significant access to enterprise resources.

Technical Sophistication

Tycoon 2FA employed multiple anti-detection measures:

  • Keystroke monitoring to capture credentials in real-time
  • Anti-bot screening to filter security researchers and scanners
  • Browser fingerprinting to identify automated analysis
  • Heavy code obfuscation to frustrate reverse engineering
  • Custom CAPTCHAs to block automated detection tools
  • Dynamic decoy pages that served benign content to suspicious visitors
  • 24-72 hour domain rotation to stay ahead of blocklists

The infrastructure operated at scale. Phishing domains cycled constantly, replacement pages spun up as fast as defenders could take them down.

The Takedown Operation

Microsoft led the legal effort, obtaining court orders to seize the 330 domains forming the platform's backbone. Law enforcement agencies in Latvia, Lithuania, Portugal, Poland, Spain, and the United Kingdom conducted simultaneous operations against Tycoon 2FA infrastructure.

Cloudflare's Cloudforce One team participated in the technical disruption, providing intelligence on the platform's network architecture and assisting with coordinated takedown timing.

What Changes—and What Doesn't

Major platform takedowns disrupt operations but rarely end criminal ecosystems. The Tycoon 2FA affiliates still have their techniques, their target lists, and their operational experience. Replacement services will emerge. Some already exist.

Organizations should use this disruption window to strengthen defenses:

  1. Deploy phishing-resistant MFA (FIDO2 hardware keys, passkeys) that can't be proxied
  2. Implement conditional access policies that detect session anomalies
  3. Train users on adversary-in-the-middle attacks—traditional phishing awareness doesn't cover this
  4. Monitor for impossible travel and suspicious session behavior

The takedown removes a significant criminal resource. The underlying vulnerability—session tokens remaining valid after AitM capture—persists until organizations adopt authentication methods immune to interception.

For practical guidance on recognizing phishing attempts, see our phishing email examples guide. Understanding what these attacks look like remains essential even as the platforms behind them shift.

Related Articles