Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale

0
Medium
Published: Wed Mar 04 2026 (03/04/2026, 19:42:43 UTC)
Source: AlienVault OTX General

Description

Tycoon2FA is a sophisticated phishing-as-a-service platform that emerged in August 2023, enabling large-scale adversary-in-the-middle (AiTM) attacks targeting over 500,000 organizations monthly. Developed by the threat actor Storm-1747, it bypasses multifactor authentication by intercepting session cookies and credentials through phishing pages mimicking trusted brands like Microsoft 365 and Gmail. The kit employs advanced evasion techniques such as anti-bot screening, browser fingerprinting, and custom CAPTCHAs to avoid detection. Its infrastructure uses diverse, short-lived domains and complex redirect chains to maintain operational resilience. Tycoon2FA's ability to closely replicate legitimate authentication flows makes it highly effective at stealing credentials and session tokens without alerting users. This threat poses a significant risk to organizations relying on MFA for security, as it undermines this critical defense layer. Defenders should focus on user education, monitoring for suspicious domain activity, and deploying AiTM-specific detection tools. Countries with high adoption of Microsoft 365 and Gmail services, and those frequently targeted by phishing campaigns, are at elevated risk. Given its impact on confidentiality and integrity, ease of exploitation, and broad scope, the threat severity is assessed as high.

AI-Powered Analysis

AILast updated: 03/05/2026, 09:53:08 UTC

Technical Analysis

Tycoon2FA is a phishing-as-a-service (PhaaS) platform that surfaced in August 2023, developed by the adversary group Storm-1747. It specializes in adversary-in-the-middle (AiTM) attacks designed to bypass multifactor authentication (MFA) protections by intercepting session cookies and credentials during the authentication process. The platform targets widely used services such as Microsoft 365 and Gmail by creating phishing pages that closely mimic legitimate login portals, thereby deceiving users into submitting their credentials and MFA tokens. Tycoon2FA incorporates sophisticated evasion techniques including anti-bot screening to prevent automated detection, browser fingerprinting to tailor attacks to specific victims, and custom CAPTCHAs to block security crawlers. Its infrastructure is dynamic, employing a large number of short-lived domains and complex redirect chains to avoid blacklisting and takedown efforts. The platform supports large-scale campaigns, reportedly targeting over 500,000 organizations monthly, demonstrating its operational scale and automation. By capturing session tokens and credentials, attackers can hijack active sessions, effectively bypassing MFA and gaining unauthorized access to sensitive systems. Indicators of compromise include multiple suspicious domains and URLs associated with the kit's infrastructure. Although no CVE or known exploits in the wild are reported, the threat represents a significant evolution in phishing tactics, undermining traditional MFA defenses and increasing the risk of credential theft and account compromise.

Potential Impact

The Tycoon2FA phishing kit significantly impacts organizations by enabling attackers to bypass multifactor authentication, a critical security control designed to prevent unauthorized access. By intercepting session tokens and credentials, attackers can gain persistent access to corporate email, cloud services, and other critical resources, leading to data breaches, intellectual property theft, financial fraud, and disruption of business operations. The scale of the campaigns, targeting over half a million organizations monthly, increases the likelihood of widespread compromise. The use of sophisticated evasion techniques reduces the effectiveness of traditional security controls such as anti-phishing filters and automated detection systems. Organizations relying heavily on Microsoft 365 and Gmail are particularly vulnerable, as these platforms are primary targets. The compromise of session tokens also enables attackers to maintain access without triggering additional authentication challenges, complicating incident detection and response. Overall, Tycoon2FA elevates the risk profile for organizations worldwide, especially those with large user bases and remote workforces, potentially leading to significant financial and reputational damage.

Mitigation Recommendations

To mitigate the threat posed by Tycoon2FA, organizations should implement a multi-layered defense strategy beyond standard MFA deployment. First, deploy AiTM-specific detection tools that analyze login flows for anomalies indicative of session token interception or redirection through suspicious domains. Enhance email security by configuring advanced anti-phishing solutions that leverage machine learning to detect and block phishing URLs, especially those using short-lived or newly registered domains. Implement domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to reduce email spoofing risks. Conduct targeted user awareness training focused on recognizing sophisticated phishing attempts, including AiTM attacks that mimic legitimate MFA prompts. Monitor network traffic and DNS logs for connections to known malicious domains associated with Tycoon2FA and block them at the perimeter. Employ conditional access policies that restrict access based on device compliance, geolocation, and risk scores to limit exposure. Consider adopting passwordless authentication methods or hardware security keys that are less susceptible to interception. Regularly review and revoke active sessions and tokens, especially after suspicious login activity. Finally, maintain up-to-date threat intelligence feeds to stay informed about emerging phishing infrastructure and tactics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.microsoft.com/en-us/security/blog/2026/03/04/inside-tycoon2fa-how-a-leading-aitm-phishing-kit-operated-at-scale/"]
Adversary
Storm-1747
Pulse Id
69a88b33567744351e1bf5d3
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://immutable.nathacha.digital/T@uWhi6jqZQH7/#?EMAIL_ADDRESS
urlhttps://astro.thorousha.ru/vojd4e50fw4o!g/$ENCODED
urlhttps://backend.vmfuiojitnlb.es/CGyP9!CbhSU22YT2/
urlhttps://kzagniw.es/LI6vGlx7@1wPztdy
urlhttps://mock.zuyistoo.today/pry1r75TisN5S@8yDDQI/$EMAIL_ADDRESS
urlhttps://mysql.vecedoo.online/JB5ow79@fKst02/#EMAIL_ADDRESS
urlhttps://piwf.ariitdc.es/kv2gVMHLZ@dNeXt/$EMAIL_ADDRESS
urlhttps://q9y3.efwzxgd.es/MEaap8nZG5A@c8T/*EMAIL_ADDRESS
urlhttps://qonnfp.wnrathttb.ru/Fe2yiyoKvg3YTfV!/$EMAIL_ADDRESS

Domain

ValueDescriptionCopy
domainkzagniw.es
domainastro.thorousha.ru
domainbackend.vmfuiojitnlb.es
domainimmutable.nathacha.digital
domainmock.zuyistoo.today
domainmysql.vecedoo.online
domainpiwf.ariitdc.es
domainq9y3.efwzxgd.es
domainqonnfp.wnrathttb.ru

Threat ID: 69a94eed0e5bba37ca88cea3

Added to database: 3/5/2026, 9:37:49 AM

Last enriched: 3/5/2026, 9:53:08 AM

Last updated: 3/5/2026, 11:54:23 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses