Monday, April 28, 2025
HomeCyber Security NewsResearchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

Published on

SIEM as a Service

Follow Us on Google News

The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor authentication (2FA). 

It provides a service that simplifies the process for attackers. and offers an intuitive interface, allowing for the creation of customized phishing templates that mimic legitimate 2FA requests. 

Tycoon 2FA also integrates automated features, streamlining the delivery and management of phishing campaigns, which significantly lowers the barrier to entry for launching large-scale and effective 2FA phishing attacks that pose a serious threat to organizations and individuals.

- Advertisement - Google News
HTML file sent to the victim.
HTML file sent to the victim.

Dynamic analysis reveals that the HTML lure displays a fake voicemail page before redirecting the victim to an Outlook phishing site, while static analysis shows the HTML file contains a variable to store the victim’s email and a base64-encoded blob. 

Decoding the blob reveals two parts: a base64-encoded HTML code for the fake voicemail page and JavaScript code, which is fetched from a remote server (disruptgive[.]com/res444.php) after a four-second delay, likely to execute malicious actions on the victim’s system.

Dynamic analysis of the HTML lure sent via email to the victim.
Dynamic analysis of the HTML lure sent via email to the victim.

An obfuscated JavaScript that contains a Base64-encoded string is returned by the PHP endpoint, which contains the values that are used for AES decryption, which are the key (B + D) and IV (C). 

The Python script decrypts the JavaScript, revealing its purpose. The decrypted script checks for the presence of the character ‘#’ in the string “VBsazFxAoBQotTgF.” 

Failing to find it, the script constructs a link to [https://mvz.nvkhytoypg](https://mvz.nvkhytoypg)[.]ru/9SIt8c/ concatenated with “VBsazFxAoBQotTgF,” and then replaces the page’s body with this link and simulates a click, effectively redirecting the user to the generated URL.

Decrypted JavaScript returned by the PHP URL.
Decrypted JavaScript returned by the PHP URL.

This phishing campaign leverages a multi-stage attack flow, where the initial stage involves enticing victims to click on malicious links, which redirect them to phishing pages designed to steal credentials that are hosted on various domains. 

Through the process of analyzing the attack flow, security researchers were able to determine that the malicious scripts were delivered by the attackers through the use of a PHP file with the name “res444.php.”

Parameters given to the second stage phishing URL
Parameters given to the second stage phishing URL

Validin investigation revealed that this PHP file is used across multiple domains, indicating a shared infrastructure, and the attackers also employed a generic template for the phishing pages, providing another valuable clue for identifying related domains. 

By combining these findings and searching for specific parameters within the PHP file, security researchers can effectively hunt for and disrupt the broader Tycoon 2FA infrastructure.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...