Tycoon 2FA Is Down. The Attack Model Is Not
Microsoft, Europol, Trend Micro, and a global coalition just disrupted Tycoon 2FA — one of the most prolific phishing-as-a-service platforms ever documented. That is a meaningful outcome. It is not safety.
Tycoon 2FA is offline. The attack model that made it successful is not.
The scale of what was disrupted matters. Tycoon 2FA was not a niche tool. It was an industrialized adversary-in-the-middle platform, sold through criminal channels at roughly $120 for ten days of access or $350 for a month. At disruption, it had approximately 2,000 active users. It was responsible for an estimated 62 percent of all phishing emails Microsoft blocked by mid-2025 — more than 30 million in a single month. Since August 2023, it has been linked to roughly 96,000 phishing victims worldwide, including more than 55,000 Microsoft customers.
This was credential theft at subscription scale. Low-skill operators. Enterprise-grade results.
Tycoon 2FA specialized in adversary-in-the-middle phishing. It sat between the victim and the real login service — Microsoft 365, Outlook, Gmail — proxying the session in real time. The victim authenticated. Tycoon captured the username, password, MFA code, and session cookie. The attacker logged in. Even a password reset afterward left attackers inside active sessions unless tokens were explicitly revoked.
The platform continued to evolve. Anti-bot screening, browser fingerprinting, code obfuscation, self-hosted CAPTCHAs, and dynamic decoy pages made detection harder. Victims were lured through phishing emails carrying SVG, PDF, HTML, or DOCX attachments — sometimes using QR codes or JavaScript to pull them into the live proxied session.
The authentication layer did exactly what it was designed to do. The user approved the request. The attacker got access. That is the architecture of phishable authentication. It is not a Tycoon 2FA problem. It is a category problem.
The coalition seized more than 330 active domains tied to Tycoon 2FA infrastructure. That raises attacker cost. It forces rebuild. It matters.
It does not eliminate the risk. Tycoon 2FA first appeared in August 2023. It operated for nearly two and a half years before disruption. Stolen credentials and session cookies from that window remain in circulation. Operators adapt and rebuild on new infrastructure. Tycoon rose in part as earlier services — Caffeine, RaccoonO365 — were taken down. When one platform goes offline, attackers move to the next.
Takedowns are pressure. They are not prevention.
If your workforce still authenticates through SMS codes, TOTP apps, push approvals, or any flow that can be intercepted and relayed in real time, yesterday’s disruption changed nothing about your exposure. Tycoon 2FA proved the model at scale. It was not the only service running it. New kits are already operating, being modified, or being sold in parallel.
The lesson from Tycoon 2FA is not that law enforcement prevailed — though it did, and that matters. The lesson is that the market for phishable authentication bypass was enormous precisely because phishable authentication still works. Credential-based access, no matter how many factors are layered on top of it, can be relayed. It can be stolen. It can be sold on a monthly subscription.
Until identity is cryptographically bound to the real domain, the real device, and the verified physical presence of the real user, attackers will keep logging in through the front door.
Tycoon 2FA is down.
The attack class it ran at scale is not. It will not be — until identity is handled at the layer where it actually breaks.
Token handles it there.
A newly published academic paper introduces a new hacker tool called PixSnapping (download PDF), an advanced attack that can steal screen pixels from Android devices and reconstruct sensitive data like 2FA codes in real time. The research demonstrates that an attacker-controlled app can capture or infer the digits displayed by authenticator apps such as Google Authenticator in under thirty seconds.
As seen in Bleeping Computer The Tycoon 2FA phishing kit signals a turning point in the battle against account takeover. This is not a tool built for elite attackers. It is a plug-and-play phishing kit that anyone can deploy, with zero coding skill required. Tycoon automates everything: setup, fake login pages, reverse proxy servers, real-time credential capture, and full MFA relay.
The Betterment breach should not have surprised anyone paying attention, and it certainly should have ended the long-running argument about whether modern MFA is sufficient against today’s attacks. Instead, it became just another entry in a growing list of incidents that organizations explain away as bad luck, poor training, or unfortunate human error.
Subscribe to The Assured Identity Brief for sharp insights on identity security, authentication, and the threats security leaders must stay ahead of.