Tycoon 2FA Strikes Back: Why a Global Takedown Only Lasted 2 Weeks banner image
Blog

Tycoon 2FA Strikes Back: Why a Global Takedown Only Lasted 2 Weeks

By Daniel Whitcombe 13 May 2026 8 min read
Just a few weeks ago, we published The Rise and Fall of Tycoon 2FA: Inside the MFA-Bypassing Phishing Empire. At the end of this blog we spoke about the recent takedown of Tycoon2FA infrastructure on March 4th 2026. This coordinated international law enforcement operation led by Europol and Microsoft, alongside heavy-hitting industry partners dismantled the core infrastructure of the Tycoon2FA platform. Authorities seized 330 domains belonging to an operation that was responsible for roughly 62% of all phishing attempts blocked by Microsoft.

    Tycoon2FA Infrastructure

    To recover from this recent takedown, the actors behind Tycoon2FA didn't waste any time worrying about their 330 seized domains. Instead, they quickly recovered from this and within a few weeks they were back hosting new domains.

    Recent analysis confirms that there was a dip in Tycoon2FA domains after the takedown but we can see that this didn't last for long and the numbers are already rising as shown in Figure 1.

    Number of Tycoon2FA Phishing Pages

    Figure 1 - Timeline showing identified Tycoon2FA infrastructure over time

    A review of the urls show that the threat actor has shifted their focus from the previously reported url patterns and appear to be using new methods.

    Massive Abuse of Legitimate Cloud Infrastructure

    ·        To bypass reputation-based email security gateways, the operators heavily abuse legitimate cloud hosting and Content Delivery Networks (CDNs) rather than solely relying on their own registered domains

    o   CloudFlare: he attackers extensively utilize Cloudflare Workers (*.workers.dev) and Cloudflare Pages (*.pages.dev) to host their dynamic phishing payloads and proxy relays

    ·        The URLs provide direct evidence of Tycoon 2FA's Adversary-in-the-Middle (AiTM) capabilities. Dozens of URLs contain long query strings resulting in the Microsoft error AADSTS50058

    o   This specific Microsoft Entra ID (Azure AD) error indicates that "A silent sign-in request was sent but no user is signed in"

    Subdomain Mimicry and Thematic Lures

    ·        Aligning with known Tycoon 2FA social engineering tactics, the attackers create highly specific subdomains that match the content of their phishing emails to lower victim suspicion

    o   Missed Voicemail / Audio Lures: A massive cluster of Cloudflare Workers is dedicated entirely to fake audio messages.

    o   Document and E-Signature Mimicry: The infrastructure heavily mimics secure file sharing and e-signature platforms to steal Microsoft 365 or Google Workspace credentials.

    Data Comparison

    If we compare this to the previous dataset we originally tracked before the takedown of their infrastructure, there is some overlaps in the new infrastrucutre.

    Subdomain Impersonation

    Analysis confirms the continued use of tech and document-themed subdomains, but shows a massive pivot toward abusing legitimate cloud hosting providers and a new thematic focus.

    ·        Instead of solely relying on registered domains, the attackers are now heavily abusing trusted SaaS platforms to host their payloads.

    Path and Suffix Structure

    The mechanics of how Tycoon2FA tracks victims and structures its URL paths remain incredibly consistent

    ·        The Alphanumeric Hash: The use of seemingly random hashes interspersed with ! and @ is perfectly preserved. The new dataset shows hundreds of examples utilizing this exact syntax, such as /POEt!v04XFJWYFVlPxkAQGyOs/, /54yO!4iBQ1LQPHUelGCjFOflR/, and /Je!28Kgv/.

    ·        Victim Identification Suffix (/$ and /*): This remains the primary method for tracking targets and pre-filling fake login pages. The dataset shows heavy use of the /$ prefix (e.g., /$jared@squaredeal.com, /$victorm@invercap.com.mx) and the /* prefix (e.g., /*no.thanks@associatedbank.com).

    ·        Encoded Emails: The use of Base64 encoded email addresses ending in = or == remains a staple evasion technique in the new data (e.g., /$bWljaGVsbGUuaXJvbnNAZ29ndWxmd2luZHMuY29t, /$YW5kcmVhLnB1bHZpcmVudGlAYWxpcmFoZWFsdGguY29t).

    Domain and TLD Trends

    The underlying strategy for procuring domain names remains unchanged, though some specific families have evolved.

    ·        Suspicious TLDs: The reliance on cheap, disposable TLDs is identical. The new dataset is dominated by .ru (e.g., crojuyai.ru, dashithoo.ru), alongside frequent use of .biz.id, .sa.com, .digital, .my.id, and .team.

    ·        Pseudo-Random Domain Names: The use of nonsensical, procedurally generated words remains the standard for their root domains

    Strategic Outlook

    The evolution in Tycoon 2FA's URL patterns highlights a fundamental shift in the defensive landscape. When attackers can seamlessly blend their credential-harvesting mechanisms and thematic lures (like missed voicemails) into the exact same SaaS platforms and CDNs that legitimate enterprises rely on, reactive domain blocklisting becomes entirely obsolete. You cannot blindly block *.workers.dev or Azure subdomains without actively breaking your own business operations.

    Furthermore, the persistent footprint of Adversary-in-the-Middle (AiTM) tactics—evidenced by the continuous generation of AADSTS50058 Microsoft authentication errors in their proxy URLs—proves that their core objective remains unchanged. Despite the infrastructure rotation, their underlying mechanics for tracking victims and bypassing standard Multi-Factor Authentication (MFA) are still fully operational.

    Defenders must accept that the PhaaS ecosystem is highly resilient; if a core network is seized, operators will procedurally generate new burner domains on cheap TLDs like .ru or .biz.id within days. To survive this post-takedown landscape, security teams must shift their focus from the perimeter to the identity layer.

    Defeating the zombie infrastructure of Tycoon 2FA requires rendering their AiTM attacks useless. This demands a complete transition to phishing-resistant authentication (such as FIDO2 security keys or passkeys) and continuous Identity Security Posture Management (ISPM) that monitors for anomalous session token behavior, rather than just relying on legacy login checks.

    CTI Analyst

    Daniel Whitcombe

    CTI Analyst

    Daniel Whitcombe is a Threat Intelligence Analyst working within CTI at Bridewell and has prev... Daniel Whitcombe is a Threat Intelligence Analyst working within CTI at Bridewell and has previous experience within the Financial Sector.
    Read