Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
Tycoon2FA is a sophisticated phishing-as-a-service platform that emerged in August 2023, enabling large-scale adversary-in-the-middle (AiTM) attacks targeting over 500,000 organizations monthly. Developed by the threat actor Storm-1747, it bypasses multifactor authentication by intercepting session cookies and credentials through phishing pages mimicking trusted brands like Microsoft 365 and Gmail. The kit employs advanced evasion techniques such as anti-bot screening, browser fingerprinting, and custom CAPTCHAs to avoid detection. Its infrastructure uses diverse, short-lived domains and complex redirect chains to maintain operational resilience. Tycoon2FA's ability to closely replicate legitimate authentication flows makes it highly effective at stealing credentials and session tokens without alerting users. This threat poses a significant risk to organizations relying on MFA for security, as it undermines this critical defense layer. Defenders should focus on user education, monitoring for suspicious domain activity, and deploying AiTM-specific detection tools. Countries with high adoption of Microsoft 365 and Gmail services, and those frequently targeted by phishing campaigns, are at elevated risk. Given its impact on confidentiality and integrity, ease of exploitation, and broad scope, the threat severity is assessed as high.
AI Analysis
Technical Summary
Tycoon2FA is a phishing-as-a-service (PhaaS) platform that surfaced in August 2023, developed by the adversary group Storm-1747. It specializes in adversary-in-the-middle (AiTM) attacks designed to bypass multifactor authentication (MFA) protections by intercepting session cookies and credentials during the authentication process. The platform targets widely used services such as Microsoft 365 and Gmail by creating phishing pages that closely mimic legitimate login portals, thereby deceiving users into submitting their credentials and MFA tokens. Tycoon2FA incorporates sophisticated evasion techniques including anti-bot screening to prevent automated detection, browser fingerprinting to tailor attacks to specific victims, and custom CAPTCHAs to block security crawlers. Its infrastructure is dynamic, employing a large number of short-lived domains and complex redirect chains to avoid blacklisting and takedown efforts. The platform supports large-scale campaigns, reportedly targeting over 500,000 organizations monthly, demonstrating its operational scale and automation. By capturing session tokens and credentials, attackers can hijack active sessions, effectively bypassing MFA and gaining unauthorized access to sensitive systems. Indicators of compromise include multiple suspicious domains and URLs associated with the kit's infrastructure. Although no CVE or known exploits in the wild are reported, the threat represents a significant evolution in phishing tactics, undermining traditional MFA defenses and increasing the risk of credential theft and account compromise.
Potential Impact
The Tycoon2FA phishing kit significantly impacts organizations by enabling attackers to bypass multifactor authentication, a critical security control designed to prevent unauthorized access. By intercepting session tokens and credentials, attackers can gain persistent access to corporate email, cloud services, and other critical resources, leading to data breaches, intellectual property theft, financial fraud, and disruption of business operations. The scale of the campaigns, targeting over half a million organizations monthly, increases the likelihood of widespread compromise. The use of sophisticated evasion techniques reduces the effectiveness of traditional security controls such as anti-phishing filters and automated detection systems. Organizations relying heavily on Microsoft 365 and Gmail are particularly vulnerable, as these platforms are primary targets. The compromise of session tokens also enables attackers to maintain access without triggering additional authentication challenges, complicating incident detection and response. Overall, Tycoon2FA elevates the risk profile for organizations worldwide, especially those with large user bases and remote workforces, potentially leading to significant financial and reputational damage.
Mitigation Recommendations
To mitigate the threat posed by Tycoon2FA, organizations should implement a multi-layered defense strategy beyond standard MFA deployment. First, deploy AiTM-specific detection tools that analyze login flows for anomalies indicative of session token interception or redirection through suspicious domains. Enhance email security by configuring advanced anti-phishing solutions that leverage machine learning to detect and block phishing URLs, especially those using short-lived or newly registered domains. Implement domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to reduce email spoofing risks. Conduct targeted user awareness training focused on recognizing sophisticated phishing attempts, including AiTM attacks that mimic legitimate MFA prompts. Monitor network traffic and DNS logs for connections to known malicious domains associated with Tycoon2FA and block them at the perimeter. Employ conditional access policies that restrict access based on device compliance, geolocation, and risk scores to limit exposure. Consider adopting passwordless authentication methods or hardware security keys that are less susceptible to interception. Regularly review and revoke active sessions and tokens, especially after suspicious login activity. Finally, maintain up-to-date threat intelligence feeds to stay informed about emerging phishing infrastructure and tactics.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Japan, South Korea, Brazil, Netherlands, Italy, Spain
Indicators of Compromise
- url: https://immutable.nathacha.digital/T@uWhi6jqZQH7/#?EMAIL_ADDRESS
- url: https://astro.thorousha.ru/vojd4e50fw4o!g/$ENCODED
- url: https://backend.vmfuiojitnlb.es/CGyP9!CbhSU22YT2/
- url: https://kzagniw.es/LI6vGlx7@1wPztdy
- url: https://mock.zuyistoo.today/pry1r75TisN5S@8yDDQI/$EMAIL_ADDRESS
- url: https://mysql.vecedoo.online/JB5ow79@fKst02/#EMAIL_ADDRESS
- url: https://piwf.ariitdc.es/kv2gVMHLZ@dNeXt/$EMAIL_ADDRESS
- url: https://q9y3.efwzxgd.es/MEaap8nZG5A@c8T/*EMAIL_ADDRESS
- url: https://qonnfp.wnrathttb.ru/Fe2yiyoKvg3YTfV!/$EMAIL_ADDRESS
- domain: kzagniw.es
- domain: astro.thorousha.ru
- domain: backend.vmfuiojitnlb.es
- domain: immutable.nathacha.digital
- domain: mock.zuyistoo.today
- domain: mysql.vecedoo.online
- domain: piwf.ariitdc.es
- domain: q9y3.efwzxgd.es
- domain: qonnfp.wnrathttb.ru
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
Description
Tycoon2FA is a sophisticated phishing-as-a-service platform that emerged in August 2023, enabling large-scale adversary-in-the-middle (AiTM) attacks targeting over 500,000 organizations monthly. Developed by the threat actor Storm-1747, it bypasses multifactor authentication by intercepting session cookies and credentials through phishing pages mimicking trusted brands like Microsoft 365 and Gmail. The kit employs advanced evasion techniques such as anti-bot screening, browser fingerprinting, and custom CAPTCHAs to avoid detection. Its infrastructure uses diverse, short-lived domains and complex redirect chains to maintain operational resilience. Tycoon2FA's ability to closely replicate legitimate authentication flows makes it highly effective at stealing credentials and session tokens without alerting users. This threat poses a significant risk to organizations relying on MFA for security, as it undermines this critical defense layer. Defenders should focus on user education, monitoring for suspicious domain activity, and deploying AiTM-specific detection tools. Countries with high adoption of Microsoft 365 and Gmail services, and those frequently targeted by phishing campaigns, are at elevated risk. Given its impact on confidentiality and integrity, ease of exploitation, and broad scope, the threat severity is assessed as high.
AI-Powered Analysis
Technical Analysis
Tycoon2FA is a phishing-as-a-service (PhaaS) platform that surfaced in August 2023, developed by the adversary group Storm-1747. It specializes in adversary-in-the-middle (AiTM) attacks designed to bypass multifactor authentication (MFA) protections by intercepting session cookies and credentials during the authentication process. The platform targets widely used services such as Microsoft 365 and Gmail by creating phishing pages that closely mimic legitimate login portals, thereby deceiving users into submitting their credentials and MFA tokens. Tycoon2FA incorporates sophisticated evasion techniques including anti-bot screening to prevent automated detection, browser fingerprinting to tailor attacks to specific victims, and custom CAPTCHAs to block security crawlers. Its infrastructure is dynamic, employing a large number of short-lived domains and complex redirect chains to avoid blacklisting and takedown efforts. The platform supports large-scale campaigns, reportedly targeting over 500,000 organizations monthly, demonstrating its operational scale and automation. By capturing session tokens and credentials, attackers can hijack active sessions, effectively bypassing MFA and gaining unauthorized access to sensitive systems. Indicators of compromise include multiple suspicious domains and URLs associated with the kit's infrastructure. Although no CVE or known exploits in the wild are reported, the threat represents a significant evolution in phishing tactics, undermining traditional MFA defenses and increasing the risk of credential theft and account compromise.
Potential Impact
The Tycoon2FA phishing kit significantly impacts organizations by enabling attackers to bypass multifactor authentication, a critical security control designed to prevent unauthorized access. By intercepting session tokens and credentials, attackers can gain persistent access to corporate email, cloud services, and other critical resources, leading to data breaches, intellectual property theft, financial fraud, and disruption of business operations. The scale of the campaigns, targeting over half a million organizations monthly, increases the likelihood of widespread compromise. The use of sophisticated evasion techniques reduces the effectiveness of traditional security controls such as anti-phishing filters and automated detection systems. Organizations relying heavily on Microsoft 365 and Gmail are particularly vulnerable, as these platforms are primary targets. The compromise of session tokens also enables attackers to maintain access without triggering additional authentication challenges, complicating incident detection and response. Overall, Tycoon2FA elevates the risk profile for organizations worldwide, especially those with large user bases and remote workforces, potentially leading to significant financial and reputational damage.
Mitigation Recommendations
To mitigate the threat posed by Tycoon2FA, organizations should implement a multi-layered defense strategy beyond standard MFA deployment. First, deploy AiTM-specific detection tools that analyze login flows for anomalies indicative of session token interception or redirection through suspicious domains. Enhance email security by configuring advanced anti-phishing solutions that leverage machine learning to detect and block phishing URLs, especially those using short-lived or newly registered domains. Implement domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to reduce email spoofing risks. Conduct targeted user awareness training focused on recognizing sophisticated phishing attempts, including AiTM attacks that mimic legitimate MFA prompts. Monitor network traffic and DNS logs for connections to known malicious domains associated with Tycoon2FA and block them at the perimeter. Employ conditional access policies that restrict access based on device compliance, geolocation, and risk scores to limit exposure. Consider adopting passwordless authentication methods or hardware security keys that are less susceptible to interception. Regularly review and revoke active sessions and tokens, especially after suspicious login activity. Finally, maintain up-to-date threat intelligence feeds to stay informed about emerging phishing infrastructure and tactics.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.microsoft.com/en-us/security/blog/2026/03/04/inside-tycoon2fa-how-a-leading-aitm-phishing-kit-operated-at-scale/"]
- Adversary
- Storm-1747
- Pulse Id
- 69a88b33567744351e1bf5d3
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://immutable.nathacha.digital/T@uWhi6jqZQH7/#?EMAIL_ADDRESS | — | |
urlhttps://astro.thorousha.ru/vojd4e50fw4o!g/$ENCODED | — | |
urlhttps://backend.vmfuiojitnlb.es/CGyP9!CbhSU22YT2/ | — | |
urlhttps://kzagniw.es/LI6vGlx7@1wPztdy | — | |
urlhttps://mock.zuyistoo.today/pry1r75TisN5S@8yDDQI/$EMAIL_ADDRESS | — | |
urlhttps://mysql.vecedoo.online/JB5ow79@fKst02/#EMAIL_ADDRESS | — | |
urlhttps://piwf.ariitdc.es/kv2gVMHLZ@dNeXt/$EMAIL_ADDRESS | — | |
urlhttps://q9y3.efwzxgd.es/MEaap8nZG5A@c8T/*EMAIL_ADDRESS | — | |
urlhttps://qonnfp.wnrathttb.ru/Fe2yiyoKvg3YTfV!/$EMAIL_ADDRESS | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainkzagniw.es | — | |
domainastro.thorousha.ru | — | |
domainbackend.vmfuiojitnlb.es | — | |
domainimmutable.nathacha.digital | — | |
domainmock.zuyistoo.today | — | |
domainmysql.vecedoo.online | — | |
domainpiwf.ariitdc.es | — | |
domainq9y3.efwzxgd.es | — | |
domainqonnfp.wnrathttb.ru | — |
Threat ID: 69a94eed0e5bba37ca88cea3
Added to database: 3/5/2026, 9:37:49 AM
Last enriched: 3/5/2026, 9:53:08 AM
Last updated: 3/5/2026, 11:54:23 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Iranian APT Infrastructure in Focus: Mapping State-Aligned Clusters During Geopolitical Escalation
MediumThreatFox IOCs for 2026-03-04
MediumMaltrail IOC for 2026-03-04
MediumHow Pirated Software Turns Helpful Employees Into Malware Delivery Agents
MediumSigned malware impersonating workplace apps deploys RMM backdoors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.