Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Dmytro Kuleba to Address the New Cyber Frontline at Infose Europe

March 24, 2026

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage

March 24, 2026

Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals

March 24, 2026
Facebook X (Twitter) Instagram
Tuesday, March 24
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Tycoon2FA Phishing Service Resumes Activity Post-Takedown
News

Tycoon2FA Phishing Service Resumes Activity Post-Takedown

Team-CWDBy Team-CWDMarch 23, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Despite a major law enforcement operation earlier this month, Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform, has continued to compromise email accounts and bypass multifactor authentication (MFA).

The platform, which intercepts live authentication sessions using adversary-in-the-middle (AITM) techniques, has reportedly resumed activity.

Tycoon2FA, launched in 2023, was responsible for a significant share of phishing activity. By mid-2025, it accounted for 62% of phishing attempts blocked by Microsoft and reportedly generated more than 30 million malicious emails in a single month.

Short-Term Disruption, Rapid Recovery

Following takedown coordinated by Europol, authorities from six countries as well as industry partners seized 330 domains linked to the Tycoon2FA platform. Initial results showed a sharp decrease in Tycoon2FA activity, with daily campaigns dropping to 25% of pre-disruption levels.

Read more on PhaaS threats: Morphing Meerkat PhaaS Platform Spoofs 100+ Brands

However, activity quickly returned to early 2026 levels. In an advisory published last week, CrowdStrike said it observed at least 30 suspected Tycoon2FA-enabled phishing incidents between March 4 and March 6, involving decoy and credential-capture pages.

Operators continue to use compromised domains and legitimate cloud services for redirection, while IPv6 addresses associated with automated cloud logins remain active. AI-generated decoy pages and malicious URLs continue to be deployed, showing no change in tactics.

Outlook For Cyber Defenders

The takedown involved Europol’s European Cybercrime Centre (EC3) and authorities from Latvia, Lithuania, Portugal, Poland, Spain and the UK.

Despite that, Tycoon2FA’s rapid recovery highlights the adaptive nature of modern cyber threats, CrowdStrike warned. Continuous detection, real-time signal correlation, and layered defense strategies remain critical to counter adversaries who evolve rapidly.

“When cross-domain disruption avenues are unavailable to law enforcement bodies, infrastructure disruption, even if only temporary, can serve to frustrate, slow down, and confuse adversaries,” the company added.

“As recovery from such disruptions occurs, CrowdStrike and other industry partners must stand ready to orient themselves to the evolving nature of these threats.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Next Article OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
Team-CWD
  • Website

Related Posts

News

Dmytro Kuleba to Address the New Cyber Frontline at Infose Europe

March 24, 2026
News

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage

March 24, 2026
News

Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals

March 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.