Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
In recent months, cyber security researchers have observed a significant increase in phishing attacks leveraging a toolkit called Tycoon 2FA. This phishing-as-a-service platform allows cybercriminals to effectively bypass multi-factor authentication (MFA) protections for Microsoft 365 and Gmail accounts.
Tycoon 2FA first emerged in August 2023, advertised through private Telegram channels. It operates using an adversary-in-the-middle (AiTM) technique, where a reverse proxy server hosts the phishing page and relays the victim’s credentials and MFA inputs to the legitimate service. This allows the attacker to capture the session cookies, enabling them to bypass MFA and gain unauthorised access.
Tycoon 2FA phishing attacks typically begin with emails containing malicious links or QR codes that direct victims to a phishing page. This page employs a Cloudflare Turnstile challenge to filter out bots and only allow human interactions. If the victim passes this challenge, they are presented with a fake Microsoft login page that harvests their credentials.
Crucially, the phishing kit can then mimic various 2FA prompts, such as Microsoft Authenticator push notifications, one-time passwords via SMS or app, or phone call verifications. By relaying the 2FA inputs, the attacker obtains valid session cookies, effectively bypassing MFA protections.
After a successful authentication, victims may be redirected to a legitimate-looking error page, obscuring the phishing attack’s success.
The Tycoon 2FA toolkit has undergone continuous development, with a new version released in February 2024 that enhances obfuscation and anti-detection capabilities. These changes include alterations to JavaScript and HTML code, modified resource retrieval order, and improved filtering to block traffic from bots and analysis tools.
Tycoon 2FA has gained significant traction among cybercriminals due to its effectiveness and relative affordability. Researchers have identified over 1,200 domains associated with the toolkit since August 2023, indicating widespread adoption.
Furthermore, analysis of a Bitcoin wallet allegedly linked to the Tycoon 2FA operators suggests that the service has generated substantial revenue, with over $394,000 worth of cryptocurrency received as of mid-March 2024.
To protect against Tycoon 2FA and similar phishing threats, individuals and organisations should:
As the Tycoon 2FA toolkit continues to evolve, maintaining vigilance and implementing multi-layered security measures are crucial to mitigating the risks associated with this prevalent phishing-as-a-service threat.
In depth analysis of the threat can be found at:
Additional information at: