An international coalition of law enforcement and private sector partners has dismantled Tycoon 2FA, a prolific Phishing-as-a-Service (PhaaS) platform. The operation, led by Microsoft and Europol with support from partners like Cloudflare, culminated in the seizure of over 330 domains, crippling the infrastructure of a service that democratized sophisticated phishing attacks. Tycoon 2FA specialized in bypassing multi-factor authentication (MFA) by using adversary-in-the-middle (AitM) techniques to hijack authenticated user sessions. Since its emergence in August 2023, the platform enabled thousands of cybercriminals to target nearly 100,000 organizations worldwide, highlighting the growing threat of identity-focused attacks and the industrialization of cybercrime tooling. This disruption marks a significant victory in the fight against the infrastructure that powers modern phishing campaigns.
Tycoon 2FA was not a traditional threat actor but a criminal enterprise that sold attack capabilities as a service. It lowered the barrier to entry for cybercrime, allowing subscribers with minimal technical skill to launch effective phishing campaigns capable of defeating many forms of MFA. The platform's core offering was an AitM toolkit that worked as follows:
This technique is effective against SMS, email, and TOTP-based MFA, but is generally defeated by phishing-resistant methods like FIDO2 security keys.
Tycoon 2FA's infrastructure was cleverly designed for resilience and evasion.
T1566.002 - Spearphishing Link campaigns.T1078 - Valid Accounts) and session tokens.T1539 - Steal Web Session Cookie. By capturing the session cookie, the attacker could bypass MFA entirely and take over an active, authenticated session.T1114 - Email Collection), or deploy ransomware.The impact of Tycoon 2FA was massive. By mid-2025, it was responsible for an estimated 62% of all phishing attempts blocked by Microsoft, demonstrating its market dominance. It facilitated unauthorized access to nearly 100,000 organizations, including critical sectors like healthcare (hospitals) and education (schools). The financial losses from resulting fraud, data breaches, and BEC attacks are estimated to be in the tens of millions of dollars. The success of this platform underscores a critical shift in the threat landscape: identity is the new perimeter, and attackers are systematically targeting authentication mechanisms rather than just networks.
Over 330 domains associated with the service were seized. A full list may be released by law enforcement. No specific domains were listed in the source articles.
Detecting AitM phishing requires looking beyond the initial email.
D3-UGLPA - User Geolocation Logon Pattern Analysis.D3-WSAA - Web Session Activity Analysis.M1032 - Multi-factor Authentication.M1017 - User Training) to be skeptical of unsolicited links and to verify domain names before entering credentials, even if the page looks legitimate.M1021 - Restrict Web-Based Content) to block access to known phishing domains and newly registered domains that are often used in these campaigns.Google Chrome rolls out Device Bound Session Credentials (DBSC) to combat session cookie theft and MFA bypass, making stolen cookies useless.
Implement phishing-resistant MFA such as FIDO2/WebAuthn to defeat adversary-in-the-middle attacks.
Mapped D3FEND Techniques:
Train users to identify phishing links and to always verify the domain name in the browser's address bar before entering credentials.
Use web filters to block access to known phishing sites and newly registered domains, which are commonly used in these campaigns.
Monitor for anomalous session activity, such as impossible travel or unusual user agent strings, which can indicate a hijacked session.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats