PhaaS the Secrets: The Hidden Ties Between Tycoon2FA and Dadsec's Operations
This analysis explores the connections between two Phishing-as-a-Service (PhaaS) platforms: Tycoon2FA and Dadsec. The investigation reveals shared infrastructure and operational similarities, suggesting a common origin or adaptation. The report details the evolving tactics of Tycoon2FA, including its use of Cloudflare Turnstile, anti-analysis techniques, and sophisticated phishing pages. Key findings include the rapid expansion of Tycoon2FA's infrastructure, with thousands of new phishing pages detected since July 2024. The analysis also uncovers the platform's advanced features, such as MFA bypass capabilities and real-time credential interception. The report emphasizes the growing threat posed by PhaaS platforms and the need for continued vigilance and adaptation in cybersecurity defenses.
AI Analysis
Technical Summary
This threat analysis focuses on two interconnected Phishing-as-a-Service (PhaaS) platforms, Tycoon2FA and Dadsec, which provide cybercriminals with turnkey phishing infrastructure to conduct sophisticated credential theft campaigns. These platforms share infrastructure and operational tactics, indicating a common origin or adaptation. Tycoon2FA has evolved significantly, integrating Cloudflare Turnstile, an anti-bot and anti-abuse mechanism, to evade automated detection and analysis tools. It also employs advanced anti-analysis techniques to hinder forensic investigations and automated defenses. Since July 2024, Tycoon2FA’s infrastructure has rapidly expanded, hosting thousands of phishing pages designed to mimic legitimate login portals with high fidelity. Notably, these platforms target multi-factor authentication (MFA) mechanisms with bypass capabilities and real-time credential interception, enabling attackers to capture user credentials, session tokens, and MFA codes. This adversary-in-the-middle (AITM) tactic allows attackers to bypass one of the most trusted security controls, facilitating account takeover and unauthorized access. The threat actor group behind these platforms is identified as Storm-1575, known for targeting financial and enterprise credentials. Indicators of compromise include domains such as 704movers.com, americanwealthllc.com, and a Russian domain srciek0t8a31dz4.o4dnumvbqy.ru, which serve as phishing infrastructure. The attack techniques leverage multiple MITRE ATT&CK tactics, including credential dumping, scripting, obfuscation, command and control via web protocols, and social engineering, highlighting a complex and adaptive attack methodology. Overall, this PhaaS ecosystem represents a significant escalation in phishing sophistication, lowering the barrier for threat actors to launch effective campaigns and emphasizing the need for dynamic, layered cybersecurity defenses.
Potential Impact
European organizations face considerable risks from this threat, especially those in sectors heavily reliant on MFA for securing sensitive accounts, such as financial services, government agencies, and critical infrastructure. The ability of Tycoon2FA to bypass MFA and intercept credentials in real-time undermines a key security control, increasing the risk of unauthorized access, data breaches, and financial fraud. The rapid proliferation of phishing pages raises the likelihood of successful attacks, potentially leading to widespread credential compromise. Organizations may experience operational disruptions, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The use of Cloudflare Turnstile and anti-analysis techniques complicates detection and response efforts, necessitating enhanced monitoring and integration of threat intelligence. The presence of phishing infrastructure with European-facing branding or targeting European users indicates a direct threat vector. The increased sophistication and scale of these PhaaS platforms lower the technical barrier for attackers, potentially increasing the volume and diversity of phishing attacks against European targets, thereby elevating the overall threat landscape.
Mitigation Recommendations
1. Deploy advanced phishing detection solutions that incorporate behavioral analytics and real-time threat intelligence to identify and block phishing pages using Cloudflare Turnstile and similar anti-bot services. 2. Implement adaptive MFA solutions employing risk-based authentication and out-of-band verification methods less susceptible to interception by adversary-in-the-middle attacks. 3. Conduct continuous, targeted user training focused on recognizing sophisticated phishing tactics, including those mimicking MFA prompts and leveraging social engineering to bypass user skepticism. 4. Integrate domain monitoring and threat intelligence feeds to detect and block access to known malicious domains such as 704movers.com, americanwealthllc.com, and srciek0t8a31dz4.o4dnumvbqy.ru, enabling rapid response to emerging phishing infrastructure. 5. Utilize endpoint detection and response (EDR) tools capable of identifying obfuscation, scripting, and other techniques associated with these platforms. 6. Enforce strict email filtering policies with sandboxing and URL rewriting to prevent phishing emails from reaching end users. 7. Collaborate proactively with ISPs and domain registrars to expedite takedown of phishing domains and infrastructure. 8. Regularly update incident response plans to include scenarios involving MFA bypass and real-time credential interception, ensuring readiness for such advanced phishing attacks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: 704movers.com
- domain: americanwealthllc.com
- domain: srciek0t8a31dz4.o4dnumvbqy.ru
PhaaS the Secrets: The Hidden Ties Between Tycoon2FA and Dadsec's Operations
Description
This analysis explores the connections between two Phishing-as-a-Service (PhaaS) platforms: Tycoon2FA and Dadsec. The investigation reveals shared infrastructure and operational similarities, suggesting a common origin or adaptation. The report details the evolving tactics of Tycoon2FA, including its use of Cloudflare Turnstile, anti-analysis techniques, and sophisticated phishing pages. Key findings include the rapid expansion of Tycoon2FA's infrastructure, with thousands of new phishing pages detected since July 2024. The analysis also uncovers the platform's advanced features, such as MFA bypass capabilities and real-time credential interception. The report emphasizes the growing threat posed by PhaaS platforms and the need for continued vigilance and adaptation in cybersecurity defenses.
AI-Powered Analysis
Technical Analysis
This threat analysis focuses on two interconnected Phishing-as-a-Service (PhaaS) platforms, Tycoon2FA and Dadsec, which provide cybercriminals with turnkey phishing infrastructure to conduct sophisticated credential theft campaigns. These platforms share infrastructure and operational tactics, indicating a common origin or adaptation. Tycoon2FA has evolved significantly, integrating Cloudflare Turnstile, an anti-bot and anti-abuse mechanism, to evade automated detection and analysis tools. It also employs advanced anti-analysis techniques to hinder forensic investigations and automated defenses. Since July 2024, Tycoon2FA’s infrastructure has rapidly expanded, hosting thousands of phishing pages designed to mimic legitimate login portals with high fidelity. Notably, these platforms target multi-factor authentication (MFA) mechanisms with bypass capabilities and real-time credential interception, enabling attackers to capture user credentials, session tokens, and MFA codes. This adversary-in-the-middle (AITM) tactic allows attackers to bypass one of the most trusted security controls, facilitating account takeover and unauthorized access. The threat actor group behind these platforms is identified as Storm-1575, known for targeting financial and enterprise credentials. Indicators of compromise include domains such as 704movers.com, americanwealthllc.com, and a Russian domain srciek0t8a31dz4.o4dnumvbqy.ru, which serve as phishing infrastructure. The attack techniques leverage multiple MITRE ATT&CK tactics, including credential dumping, scripting, obfuscation, command and control via web protocols, and social engineering, highlighting a complex and adaptive attack methodology. Overall, this PhaaS ecosystem represents a significant escalation in phishing sophistication, lowering the barrier for threat actors to launch effective campaigns and emphasizing the need for dynamic, layered cybersecurity defenses.
Potential Impact
European organizations face considerable risks from this threat, especially those in sectors heavily reliant on MFA for securing sensitive accounts, such as financial services, government agencies, and critical infrastructure. The ability of Tycoon2FA to bypass MFA and intercept credentials in real-time undermines a key security control, increasing the risk of unauthorized access, data breaches, and financial fraud. The rapid proliferation of phishing pages raises the likelihood of successful attacks, potentially leading to widespread credential compromise. Organizations may experience operational disruptions, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The use of Cloudflare Turnstile and anti-analysis techniques complicates detection and response efforts, necessitating enhanced monitoring and integration of threat intelligence. The presence of phishing infrastructure with European-facing branding or targeting European users indicates a direct threat vector. The increased sophistication and scale of these PhaaS platforms lower the technical barrier for attackers, potentially increasing the volume and diversity of phishing attacks against European targets, thereby elevating the overall threat landscape.
Mitigation Recommendations
1. Deploy advanced phishing detection solutions that incorporate behavioral analytics and real-time threat intelligence to identify and block phishing pages using Cloudflare Turnstile and similar anti-bot services. 2. Implement adaptive MFA solutions employing risk-based authentication and out-of-band verification methods less susceptible to interception by adversary-in-the-middle attacks. 3. Conduct continuous, targeted user training focused on recognizing sophisticated phishing tactics, including those mimicking MFA prompts and leveraging social engineering to bypass user skepticism. 4. Integrate domain monitoring and threat intelligence feeds to detect and block access to known malicious domains such as 704movers.com, americanwealthllc.com, and srciek0t8a31dz4.o4dnumvbqy.ru, enabling rapid response to emerging phishing infrastructure. 5. Utilize endpoint detection and response (EDR) tools capable of identifying obfuscation, scripting, and other techniques associated with these platforms. 6. Enforce strict email filtering policies with sandboxing and URL rewriting to prevent phishing emails from reaching end users. 7. Collaborate proactively with ISPs and domain registrars to expedite takedown of phishing domains and infrastructure. 8. Regularly update incident response plans to include scenarios involving MFA bypass and real-time credential interception, ensuring readiness for such advanced phishing attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/phaas-the-secrets-the-hidden-ties-between-tycoon2fa-and-dadsecs-operations"]
- Adversary
- Storm-1575
- Pulse Id
- 683886fdb693eb0b6c273f1e
- Threat Score
- null
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domain704movers.com | — | |
domainamericanwealthllc.com | — | |
domainsrciek0t8a31dz4.o4dnumvbqy.ru | — |
Threat ID: 6838b591182aa0cae28b0cdb
Added to database: 5/29/2025, 7:29:21 PM
Last enriched: 6/30/2025, 10:11:07 PM
Last updated: 8/2/2025, 4:48:35 PM
Views: 19
Related Threats
Phishing Scam with Fake Copyright Notices Drops New Noodlophile Stealer Variant
MediumMicrosoft 365 Direct Send Abuse: Phishing Risks & Security Recommendations
MediumThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.