Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
Tycoon2FA emerged as a prominent phishing-as-a-service platform in August 2023, enabling large-scale campaigns targeting over 500,000 organizations monthly. Developed by Storm-1747, it provided adversary-in-the-middle capabilities to bypass multifactor authentication. The kit allowed impersonation of trusted brands like Microsoft 365 and Gmail, intercepting session cookies and credentials. It employed sophisticated evasion techniques including anti-bot screening, browser fingerprinting, and custom CAPTCHAs. Tycoon2FA's infrastructure evolved to use diverse, short-lived domains and complex redirect chains. Its success stemmed from closely mimicking legitimate authentication processes while covertly intercepting user credentials and session tokens.
AI Analysis
Technical Summary
Tycoon2FA is a phishing-as-a-service (PhaaS) platform that surfaced in August 2023, developed by the adversary group Storm-1747. It specializes in adversary-in-the-middle (AiTM) attacks designed to bypass multifactor authentication (MFA) protections by intercepting session cookies and credentials during the authentication process. The platform targets widely used services such as Microsoft 365 and Gmail by creating phishing pages that closely mimic legitimate login portals, thereby deceiving users into submitting their credentials and MFA tokens. Tycoon2FA incorporates sophisticated evasion techniques including anti-bot screening to prevent automated detection, browser fingerprinting to tailor attacks to specific victims, and custom CAPTCHAs to block security crawlers. Its infrastructure is dynamic, employing a large number of short-lived domains and complex redirect chains to avoid blacklisting and takedown efforts. The platform supports large-scale campaigns, reportedly targeting over 500,000 organizations monthly, demonstrating its operational scale and automation. By capturing session tokens and credentials, attackers can hijack active sessions, effectively bypassing MFA and gaining unauthorized access to sensitive systems. Indicators of compromise include multiple suspicious domains and URLs associated with the kit's infrastructure. Although no CVE or known exploits in the wild are reported, the threat represents a significant evolution in phishing tactics, undermining traditional MFA defenses and increasing the risk of credential theft and account compromise.
Potential Impact
The Tycoon2FA phishing kit significantly impacts organizations by enabling attackers to bypass multifactor authentication, a critical security control designed to prevent unauthorized access. By intercepting session tokens and credentials, attackers can gain persistent access to corporate email, cloud services, and other critical resources, leading to data breaches, intellectual property theft, financial fraud, and disruption of business operations. The scale of the campaigns, targeting over half a million organizations monthly, increases the likelihood of widespread compromise. The use of sophisticated evasion techniques reduces the effectiveness of traditional security controls such as anti-phishing filters and automated detection systems. Organizations relying heavily on Microsoft 365 and Gmail are particularly vulnerable, as these platforms are primary targets. The compromise of session tokens also enables attackers to maintain access without triggering additional authentication challenges, complicating incident detection and response. Overall, Tycoon2FA elevates the risk profile for organizations worldwide, especially those with large user bases and remote workforces, potentially leading to significant financial and reputational damage.
Mitigation Recommendations
To mitigate the threat posed by Tycoon2FA, organizations should implement a multi-layered defense strategy beyond standard MFA deployment. First, deploy AiTM-specific detection tools that analyze login flows for anomalies indicative of session token interception or redirection through suspicious domains. Enhance email security by configuring advanced anti-phishing solutions that leverage machine learning to detect and block phishing URLs, especially those using short-lived or newly registered domains. Implement domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to reduce email spoofing risks. Conduct targeted user awareness training focused on recognizing sophisticated phishing attempts, including AiTM attacks that mimic legitimate MFA prompts. Monitor network traffic and DNS logs for connections to known malicious domains associated with Tycoon2FA and block them at the perimeter. Employ conditional access policies that restrict access based on device compliance, geolocation, and risk scores to limit exposure. Consider adopting passwordless authentication methods or hardware security keys that are less susceptible to interception. Regularly review and revoke active sessions and tokens, especially after suspicious login activity. Finally, maintain up-to-date threat intelligence feeds to stay informed about emerging phishing infrastructure and tactics.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Japan, South Korea, Brazil, Netherlands, Italy, Spain
Indicators of Compromise
- url: https://immutable.nathacha.digital/T@uWhi6jqZQH7/#?EMAIL_ADDRESS
- url: https://astro.thorousha.ru/vojd4e50fw4o!g/$ENCODED
- url: https://backend.vmfuiojitnlb.es/CGyP9!CbhSU22YT2/
- url: https://kzagniw.es/LI6vGlx7@1wPztdy
- url: https://mock.zuyistoo.today/pry1r75TisN5S@8yDDQI/$EMAIL_ADDRESS
- url: https://mysql.vecedoo.online/JB5ow79@fKst02/#EMAIL_ADDRESS
- url: https://piwf.ariitdc.es/kv2gVMHLZ@dNeXt/$EMAIL_ADDRESS
- url: https://q9y3.efwzxgd.es/MEaap8nZG5A@c8T/*EMAIL_ADDRESS
- url: https://qonnfp.wnrathttb.ru/Fe2yiyoKvg3YTfV!/$EMAIL_ADDRESS
- domain: kzagniw.es
- domain: astro.thorousha.ru
- domain: backend.vmfuiojitnlb.es
- domain: immutable.nathacha.digital
- domain: mock.zuyistoo.today
- domain: mysql.vecedoo.online
- domain: piwf.ariitdc.es
- domain: q9y3.efwzxgd.es
- domain: qonnfp.wnrathttb.ru
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
Description
Tycoon2FA emerged as a prominent phishing-as-a-service platform in August 2023, enabling large-scale campaigns targeting over 500,000 organizations monthly. Developed by Storm-1747, it provided adversary-in-the-middle capabilities to bypass multifactor authentication. The kit allowed impersonation of trusted brands like Microsoft 365 and Gmail, intercepting session cookies and credentials. It employed sophisticated evasion techniques including anti-bot screening, browser fingerprinting, and custom CAPTCHAs. Tycoon2FA's infrastructure evolved to use diverse, short-lived domains and complex redirect chains. Its success stemmed from closely mimicking legitimate authentication processes while covertly intercepting user credentials and session tokens.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Tycoon2FA is a phishing-as-a-service (PhaaS) platform that surfaced in August 2023, developed by the adversary group Storm-1747. It specializes in adversary-in-the-middle (AiTM) attacks designed to bypass multifactor authentication (MFA) protections by intercepting session cookies and credentials during the authentication process. The platform targets widely used services such as Microsoft 365 and Gmail by creating phishing pages that closely mimic legitimate login portals, thereby deceiving users into submitting their credentials and MFA tokens. Tycoon2FA incorporates sophisticated evasion techniques including anti-bot screening to prevent automated detection, browser fingerprinting to tailor attacks to specific victims, and custom CAPTCHAs to block security crawlers. Its infrastructure is dynamic, employing a large number of short-lived domains and complex redirect chains to avoid blacklisting and takedown efforts. The platform supports large-scale campaigns, reportedly targeting over 500,000 organizations monthly, demonstrating its operational scale and automation. By capturing session tokens and credentials, attackers can hijack active sessions, effectively bypassing MFA and gaining unauthorized access to sensitive systems. Indicators of compromise include multiple suspicious domains and URLs associated with the kit's infrastructure. Although no CVE or known exploits in the wild are reported, the threat represents a significant evolution in phishing tactics, undermining traditional MFA defenses and increasing the risk of credential theft and account compromise.
Potential Impact
The Tycoon2FA phishing kit significantly impacts organizations by enabling attackers to bypass multifactor authentication, a critical security control designed to prevent unauthorized access. By intercepting session tokens and credentials, attackers can gain persistent access to corporate email, cloud services, and other critical resources, leading to data breaches, intellectual property theft, financial fraud, and disruption of business operations. The scale of the campaigns, targeting over half a million organizations monthly, increases the likelihood of widespread compromise. The use of sophisticated evasion techniques reduces the effectiveness of traditional security controls such as anti-phishing filters and automated detection systems. Organizations relying heavily on Microsoft 365 and Gmail are particularly vulnerable, as these platforms are primary targets. The compromise of session tokens also enables attackers to maintain access without triggering additional authentication challenges, complicating incident detection and response. Overall, Tycoon2FA elevates the risk profile for organizations worldwide, especially those with large user bases and remote workforces, potentially leading to significant financial and reputational damage.
Mitigation Recommendations
To mitigate the threat posed by Tycoon2FA, organizations should implement a multi-layered defense strategy beyond standard MFA deployment. First, deploy AiTM-specific detection tools that analyze login flows for anomalies indicative of session token interception or redirection through suspicious domains. Enhance email security by configuring advanced anti-phishing solutions that leverage machine learning to detect and block phishing URLs, especially those using short-lived or newly registered domains. Implement domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to reduce email spoofing risks. Conduct targeted user awareness training focused on recognizing sophisticated phishing attempts, including AiTM attacks that mimic legitimate MFA prompts. Monitor network traffic and DNS logs for connections to known malicious domains associated with Tycoon2FA and block them at the perimeter. Employ conditional access policies that restrict access based on device compliance, geolocation, and risk scores to limit exposure. Consider adopting passwordless authentication methods or hardware security keys that are less susceptible to interception. Regularly review and revoke active sessions and tokens, especially after suspicious login activity. Finally, maintain up-to-date threat intelligence feeds to stay informed about emerging phishing infrastructure and tactics.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.microsoft.com/en-us/security/blog/2026/03/04/inside-tycoon2fa-how-a-leading-aitm-phishing-kit-operated-at-scale/"]
- Adversary
- Storm-1747
- Pulse Id
- 69a88b33567744351e1bf5d3
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://immutable.nathacha.digital/T@uWhi6jqZQH7/#?EMAIL_ADDRESS | — | |
urlhttps://astro.thorousha.ru/vojd4e50fw4o!g/$ENCODED | — | |
urlhttps://backend.vmfuiojitnlb.es/CGyP9!CbhSU22YT2/ | — | |
urlhttps://kzagniw.es/LI6vGlx7@1wPztdy | — | |
urlhttps://mock.zuyistoo.today/pry1r75TisN5S@8yDDQI/$EMAIL_ADDRESS | — | |
urlhttps://mysql.vecedoo.online/JB5ow79@fKst02/#EMAIL_ADDRESS | — | |
urlhttps://piwf.ariitdc.es/kv2gVMHLZ@dNeXt/$EMAIL_ADDRESS | — | |
urlhttps://q9y3.efwzxgd.es/MEaap8nZG5A@c8T/*EMAIL_ADDRESS | — | |
urlhttps://qonnfp.wnrathttb.ru/Fe2yiyoKvg3YTfV!/$EMAIL_ADDRESS | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainkzagniw.es | — | |
domainastro.thorousha.ru | — | |
domainbackend.vmfuiojitnlb.es | — | |
domainimmutable.nathacha.digital | — | |
domainmock.zuyistoo.today | — | |
domainmysql.vecedoo.online | — | |
domainpiwf.ariitdc.es | — | |
domainq9y3.efwzxgd.es | — | |
domainqonnfp.wnrathttb.ru | — |
Threat ID: 69a94eed0e5bba37ca88cea3
Added to database: 3/5/2026, 9:37:49 AM
Last enriched: 3/5/2026, 9:53:08 AM
Last updated: 4/19/2026, 10:39:30 AM
Views: 224
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.