Microsoft, Europol, Trend Micro, and a global coalition just disrupted Tycoon 2FA — one of the most prolific phishing-as-a-service platforms ever documented. That is a meaningful outcome. It is not safety.
Tycoon 2FA is offline. The attack model that made it successful is not.
The scale of what was disrupted matters. Tycoon 2FA was not a niche tool. It was an industrialized adversary-in-the-middle platform, sold through criminal channels at roughly $120 for ten days of access or $350 for a month. At disruption, it had approximately 2,000 active users. It was responsible for an estimated 62 percent of all phishing emails Microsoft blocked by mid-2025 — more than 30 million in a single month. Since August 2023, it has been linked to roughly 96,000 phishing victims worldwide, including more than 55,000 Microsoft customers.
This was credential theft at subscription scale. Low-skill operators. Enterprise-grade results.
Tycoon 2FA specialized in adversary-in-the-middle phishing. It sat between the victim and the real login service — Microsoft 365, Outlook, Gmail — proxying the session in real time. The victim authenticated. Tycoon captured the username, password, MFA code, and session cookie. The attacker logged in. Even a password reset afterward left attackers inside active sessions unless tokens were explicitly revoked.
The platform continued to evolve. Anti-bot screening, browser fingerprinting, code obfuscation, self-hosted CAPTCHAs, and dynamic decoy pages made detection harder. Victims were lured through phishing emails carrying SVG, PDF, HTML, or DOCX attachments — sometimes using QR codes or JavaScript to pull them into the live proxied session.
The authentication layer did exactly what it was designed to do. The user approved the request. The attacker got access. That is the architecture of phishable authentication. It is not a Tycoon 2FA problem. It is a category problem.
The coalition seized more than 330 active domains tied to Tycoon 2FA infrastructure. That raises attacker cost. It forces rebuild. It matters.
It does not eliminate the risk. Tycoon 2FA first appeared in August 2023. It operated for nearly two and a half years before disruption. Stolen credentials and session cookies from that window remain in circulation. Operators adapt and rebuild on new infrastructure. Tycoon rose in part as earlier services — Caffeine, RaccoonO365 — were taken down. When one platform goes offline, attackers move to the next.
Takedowns are pressure. They are not prevention.
If your workforce still authenticates through SMS codes, TOTP apps, push approvals, or any flow that can be intercepted and relayed in real time, yesterday’s disruption changed nothing about your exposure. Tycoon 2FA proved the model at scale. It was not the only service running it. New kits are already operating, being modified, or being sold in parallel.
The lesson from Tycoon 2FA is not that law enforcement prevailed — though it did, and that matters. The lesson is that the market for phishable authentication bypass was enormous precisely because phishable authentication still works. Credential-based access, no matter how many factors are layered on top of it, can be relayed. It can be stolen. It can be sold on a monthly subscription.
Until identity is cryptographically bound to the real domain, the real device, and the verified physical presence of the real user, attackers will keep logging in through the front door.
Tycoon 2FA is down.
The attack class it ran at scale is not. It will not be — until identity is handled at the layer where it actually breaks.
Token handles it there.