Global Coalition Dismantles Tycoon 2FA Phishing Platform: 87 Million Emails, 330 Domains Seized

Microsoft, Europol, and a coalition of cybersecurity partners have dismantled Tycoon 2FA, one of the most prolific phishing-as-a-service (PhaaS) platforms ever documented, seizing 330 domains used for credential theft and multi-factor authentication bypass. The coordinated takedown marks the first cross-border public-private action of its kind under a U.S. court order and Europol’s Cyber Intelligence Extension Programme (CIEP).

Source: Cybersecurity News

The Scale of the Threat

Active since 2023, Tycoon 2FA accounted for an staggering 62% of all phishing attempts that Microsoft blocked by mid-2025. The platform’s reach was massive:

  • 87.5 million phishing emails sent between October 2025 and January 2026
  • 500,000+ organizations targeted globally
  • 96,000 confirmed victims, including 55,000 Microsoft customers
  • 33 million messages sent in November 2025 alone—the most prolific month ever tracked

The healthcare and education sectors bore the brunt of attacks. Over 100 Health-ISAC member organizations were successfully phished, causing operational disruptions including delayed patient care in New York hospitals and schools.

How Tycoon 2FA Bypassed MFA

Unlike traditional phishing that simply harvests credentials, Tycoon 2FA employed adversary-in-the-middle (AitM) techniques to defeat multi-factor authentication in real-time. The platform:

  • Used reverse proxies to relay victim inputs directly to legitimate services like Microsoft 365 and Gmail
  • Captured session tokens and authentication codes as they were entered
  • Hijacked authenticated sessions without triggering security alerts

Evasion techniques included CAPTCHA challenges, bot filtering, browser fingerprinting, Base64/LZ compression, DOM vanishing, and multi-domain redundancy for data exfiltration.

The Takedown Operation

The coordinated action brought together an unprecedented coalition of industry and law enforcement partners:

  • Microsoft led the seizure of control panels and fake login infrastructure
  • Europol coordinated cross-border operations
  • Partners: Proofpoint, Intel 471, eSentire, Cloudflare, SpyCloud, Resecurity, Coinbase, and Shadowserver
  • Infrastructure takedowns executed across jurisdictions including Latvia and the UK

The platform was reportedly operated by Saad Fridi (Pakistan-based) with marketing and support partners, integrating with services like RedVDS for hosting and email distribution.

The Impersonation Economy

Tycoon 2FA’s takedown reflects the cascading effects in the underground cybercrime economy. Previous disruptions of Lumma Stealer, RaccoonO365, and Fake ONNX forced cybercriminals to shift to Tycoon as an alternative, concentrating traffic on the platform before its eventual demise.

Between November 2025 and January 2026, phishing message volume dropped by approximately 57.6% from its peak, demonstrating the impact of sustained infrastructure seizures.

Defensive Recommendations

Organizations should implement phishing-resistant authentication:

  • Deploy passkeys or FIDO2 hardware keys instead of SMS/TOTP
  • Enforce device trust and session controls
  • Monitor for proxy anomalies and unusual login patterns
  • Enable AI-driven email filtering
  • Join sector ISACs for shared threat intelligence

The takedown sends a clear message: sustained disruptions raise costs for PhaaS operators, forcing tighter access controls and eventual shutdowns that reshape the cybercrime market.

One thought on “Global Coalition Dismantles Tycoon 2FA Phishing Platform: 87 Million Emails, 330 Domains Seized

Comments are closed.