Tycoon 2FA Phishing-As-A-Service Shut Down

International police dismantle Tycoon 2FA, a massive phishing service that bypassed MFA globally.

  • Law enforcement dismantled Tycoon 2FA, a major Phishing-as-a-Service platform used in tens of thousands of credential theft attacks.
  • The kit enabled threat actors to steal passwords, bypass multi-factor authentication (MFA), and hijack active sessions from over 500,000 organizations globally.
  • Coordinated action by Europol and private partners seized 330 domains central to the service’s infrastructure.
  • The platform was subscription-based, generating millions of malicious emails monthly and facilitating unauthorized access to nearly 100,000 organizations.

A major criminal phishing service responsible for widespread cyberattacks against schools, hospitals, and governments has been dismantled in a landmark international operation. Tycoon 2FA, a prolific Phishing-as-a-Service (PhaaS) toolkit, was taken down by a coalition of law enforcement agencies and security companies, according to Europol.

- Advertisement -

The subscription-based platform, which first emerged in August 2023, allowed cybercriminals to stage sophisticated adversary-in-the-middle (AiTM) attacks. Consequently, it became the most prolific platform observed by Microsoft in 2025, which blocked over 13 million malicious emails linked to the service.

Tycoon 2FA’s administrators offered the kit for a starting price of $120 for 10 days, providing a web-based panel to manage campaigns. Data shows the service had approximately 2,000 users who targeted nearly 100,000 organizations globally. The platform generated tens of millions of phishing emails each month, indiscriminately targeting the education, healthcare, and finance sectors.

The kit was particularly dangerous because it specialized in bypassing multi-factor authentication (MFA) by intercepting session cookies and one-time codes. Microsoft said it allowed threat actors to “establish persistence and to access sensitive information even after passwords are reset.” Proofpoint data indicates the kit accounted for the highest volume of AiTM phishing threats, with over three million associated messages observed in February 2026 alone.

As part of the coordinated takedown, authorities seized 330 domains that formed the backbone of the criminal service. Intel 471 noted the kit was linked to over 64,000 phishing incidents. The operation disrupts a key tool that enabled thousands of criminals to covertly access email and cloud service accounts at an industrial scale.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Trade Desk Surges on CEO Share Buy, OpenAI Deal Buzz

The Trade Desk CEO Jeffrey Terry Green purchased approximately 6 million shares worth about...

Bitcoin ETF Inflows Hit $462M as BTC Tops $73K

U.S. spot Bitcoin ETFs saw a surge of $462 million in net inflows, marking...

$1B Inflows Fuel Crypto Rebound As Bitcoin Surges Past $70K

Crypto funds saw $1 billion in weekly inflows, the largest since January, breaking a...

Senator: White House Staff May Have Profited Off Iran Strikes

Senator Chris Murphy alleges individuals with White House access placed six-figure bets on a...

Arthur Hayes Warns Bitcoin Rally Could Be a ‘Dead Cat Bounce’

Arthur Hayes of Maelstrom warned that Bitcoin’s rally might be a ‘dead cat bounce’...

Must Read

7 Best NFT Marketplaces for Every Need

Open Sea | Pianity | Foundation | Magic Eden | SuperRare | Rarible | Theta Drop | Other Platforms | About NFTs | FAQ...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!