Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Zero‑Day Attacks on Enterprise Software Reach Record High

March 6, 2026

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

March 6, 2026

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

March 6, 2026
Facebook X (Twitter) Instagram
Friday, March 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Global Takedown Neutralizes Tycoon2FA Phishing Service
News

Global Takedown Neutralizes Tycoon2FA Phishing Service

Team-CWDBy Team-CWDMarch 4, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Investigators claimed today to have taken out another key player in the global cybercrime supply chain after seizing infrastructure linked to phishing-as-a-service (PhaaS) operation Tycoon 2FA.

The effort was led by Microsoft and Europol and supported by a range of industry partners, including TrendAI, Cloudflare, Coinbase, Crowell, eSentire, Health-ISAC, Intel471, Proofpoint, Resecurity, The Shadowserver Foundation, and SpyCloud.

Over 300 domains linked to Tycoon2FA were seized in the operation, according to TrendAI.

Tycoon2FA offered subscription-based PhaaS that used adversary-in-the-middle techniques to intercept live authentication sessions, and capture credentials, one-time passcodes and active session cookies in real time.

This enabled threat actors using it to bypass multi-factor authentication (MFA) and access countless enterprise accounts in large-scale attacks on corporate inboxes.

Tycoon2FA had around 2000 users and used more than 24,000 domains since its launch in August 2023.

Read more on PhaaS takedowns: UK Police Lead Disruption of £1m Phishing-as-a-Service Site LabHost.

“This was not a single phishing campaign. It was an industrialized service built to make MFA bypass accessible to thousands of criminals,” said Robert McArdle, director for cybercrime research at TrendAI.

“Identity is now the primary attack surface. When session hijacking can be packaged and sold as a subscription, the risk shifts from isolated incidents to systemic exposure.”

More Work Still to Do

TrendAI and other industry partners passed on crucial threat intelligence to law enforcement regarding Tycoon2FA infrastructure and campaigns. They assessed the primary operator to be a threat actor using the online identities “SaaadFridi” and “Mr_Xaad.”

However, with the perpetrator and many more like him still at large, security experts urged network defenders to build resilience against PhaaS.

TrendAI recommended that organizations:

  • Adopt phishing-resistant authentication and enforce strict conditional access controls
  • Deploy advanced email and collaboration security that can detect lateral phishing and brand impersonation
  • Enable real-time URL inspection and web content analysis to identify fake login infrastructure
  • Monitor identity risk posture continuously and take action quickly when anomalous session behavior is detected
  • Conduct regular phishing simulations and security awareness training



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIdentity Prioritization isn’t a Backlog Problem
Next Article Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
Team-CWD
  • Website

Related Posts

News

Zero‑Day Attacks on Enterprise Software Reach Record High

March 6, 2026
News

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

March 6, 2026
News

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

How to tell if a voice call is AI or not

February 23, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.