Tuesday, April 8, 2025
HomeCyber Security NewsTycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

Published on

SIEM as a Service

Follow Us on Google News

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers to launch increasingly sophisticated phishing campaigns.

One such advanced PhaaS platform, Tycoon, has seen widespread use since its emergence in August 2023.

In November 2024, it debuted its latest iteration, Tycoon 2FA, which bypasses multifactor authentication (2FA) using Microsoft 365 session cookies.

- Advertisement - Google News

30% of credential attacks in 2024 leveraged PhaaS platforms like Tycoon, a figure projected to rise to 50% by 2025.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Advanced Evasion Tactics in the Latest Tycoon 2FA

The new Tycoon 2FA campaigns exhibit a significant shift in tactics.

Attackers now exploit compromised but legitimate email accounts to send phishing emails, which leads unsuspecting users to fake Microsoft login pages designed to steal credentials.

The actual phishing page these emails lead to is usually a fake Microsoft login page.
The actual phishing page these emails lead to is usually a fake Microsoft login page.

This tactic significantly improves evasion, as emails from verified accounts are less likely to trigger suspicion or be flagged by automated systems.

Major updates to Tycoon 2FA’s phishing pages include changes to the source code that hinder traditional web page analysis.

Unlike earlier versions that called external JavaScript resources and stylesheets, the latest version employs embedded, obstructive scripts to complicate manual inspection.

Additionally, Tycoon 2FA incorporates mechanisms to detect and block automated security scripts and tools, such as the popular Burp Suite.

If such tools are identified, the platform redirects users to a blank page, effectively preventing further analysis.

Another advanced feature in Tycoon 2FA is its ability to monitor keyboard inputs for common shortcuts used by security professionals to inspect web pages.

Key combinations like “Ctrl+Shift+I” or F12 are blocked, rendering developer tools inaccessible.

According to Barracuda threat analysts, in some variants, shortcuts are replaced with their ASCII decimal values for enhanced obfuscation.

If developer tools are detected, the software delays page loading, and if the delay exceeds predefined thresholds, the page redirects to a legitimate site, such as OneDrive, further obfuscating malicious intent.

Disruption Techniques and Obfuscation Strategies

Tycoon 2FA’s latest version disables key web functionalities, such as the right-click context menu, to prevent users from inspecting or saving page elements.

It also employs code obfuscation, making the underlying phishing scripts more difficult to interpret.

Additionally, the platform blocks users from copying meaningful text by overwriting clipboard contents with pre-specified strings, hindering offline analysis and data extraction.

These measures demonstrate the proactive lengths phishing kit developers go to to derail security investigations.

As PhaaS platforms like Tycoon become more sophisticated, they expand the capabilities of even less-skilled attackers, making phishing a more pervasive and complex threat.

The ability of Tycoon 2FA to bypass 2FA protections and implement advanced detection evasion techniques underscores the need for robust security measures across organizations.

Barracuda and other cybersecurity firms continue to monitor and analyze these platforms to uncover their evolving tactics and develop countermeasures that can mitigate their impact.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft April 2025 Patch Tuesday: Fixing 121 Vulnerabilities, Including a Critical Zero-Day

Microsoft has rolled out its April 2025 Patch Tuesday update, addressing 121 security vulnerabilities...

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit...

Shopware Security Plugin Vulnerability Enables SQL Injection Attacks

A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has...

Attackers Exploit SourceForge Platform to Distribute Malware

A recent malware distribution scheme has been uncovered on SourceForge, the popular software hosting...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft April 2025 Patch Tuesday: Fixing 121 Vulnerabilities, Including a Critical Zero-Day

Microsoft has rolled out its April 2025 Patch Tuesday update, addressing 121 security vulnerabilities...

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit...

Shopware Security Plugin Vulnerability Enables SQL Injection Attacks

A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has...