Tuesday, April 15, 2025
HomeCyber Security NewsResearchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

Published on

SIEM as a Service

Follow Us on Google News

The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor authentication (2FA). 

It provides a service that simplifies the process for attackers. and offers an intuitive interface, allowing for the creation of customized phishing templates that mimic legitimate 2FA requests. 

Tycoon 2FA also integrates automated features, streamlining the delivery and management of phishing campaigns, which significantly lowers the barrier to entry for launching large-scale and effective 2FA phishing attacks that pose a serious threat to organizations and individuals.

- Advertisement - Google News
HTML file sent to the victim.
HTML file sent to the victim.

Dynamic analysis reveals that the HTML lure displays a fake voicemail page before redirecting the victim to an Outlook phishing site, while static analysis shows the HTML file contains a variable to store the victim’s email and a base64-encoded blob. 

Decoding the blob reveals two parts: a base64-encoded HTML code for the fake voicemail page and JavaScript code, which is fetched from a remote server (disruptgive[.]com/res444.php) after a four-second delay, likely to execute malicious actions on the victim’s system.

Dynamic analysis of the HTML lure sent via email to the victim.
Dynamic analysis of the HTML lure sent via email to the victim.

An obfuscated JavaScript that contains a Base64-encoded string is returned by the PHP endpoint, which contains the values that are used for AES decryption, which are the key (B + D) and IV (C). 

The Python script decrypts the JavaScript, revealing its purpose. The decrypted script checks for the presence of the character ‘#’ in the string “VBsazFxAoBQotTgF.” 

Failing to find it, the script constructs a link to [https://mvz.nvkhytoypg](https://mvz.nvkhytoypg)[.]ru/9SIt8c/ concatenated with “VBsazFxAoBQotTgF,” and then replaces the page’s body with this link and simulates a click, effectively redirecting the user to the generated URL.

Decrypted JavaScript returned by the PHP URL.
Decrypted JavaScript returned by the PHP URL.

This phishing campaign leverages a multi-stage attack flow, where the initial stage involves enticing victims to click on malicious links, which redirect them to phishing pages designed to steal credentials that are hosted on various domains. 

Through the process of analyzing the attack flow, security researchers were able to determine that the malicious scripts were delivered by the attackers through the use of a PHP file with the name “res444.php.”

Parameters given to the second stage phishing URL
Parameters given to the second stage phishing URL

Validin investigation revealed that this PHP file is used across multiple domains, indicating a shared infrastructure, and the attackers also employed a generic template for the phishing pages, providing another valuable clue for identifying related domains. 

By combining these findings and searching for specific parameters within the PHP file, security researchers can effectively hunt for and disrupt the broader Tycoon 2FA infrastructure.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hertz Data Breach Exposes Customer Personal Information to Hackers

The Hertz Corporation has confirmed that sensitive personal information belonging to customers of its...

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their...

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers

A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage...

Over 100,000 WordPress Plugin Vulnerability Exploited Just 4 Hours After Disclosure

Over 100,000 WordPress websites have been exposed to a critical security vulnerability, following the...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hertz Data Breach Exposes Customer Personal Information to Hackers

The Hertz Corporation has confirmed that sensitive personal information belonging to customers of its...

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their...

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers

A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage...