Original Article Text

Click to Toggle View

New MFA-bypassing phishing kit targets Microsoft 365, Gmail accounts. Cybercriminals have been increasingly using a new phishing-as-a-service (PhaaS) platform named 'Tycoon 2FA' to target Microsoft 365 and Gmail accounts and bypass two-factor authentication (2FA) protection. Tycoon 2FA was discovered by Sekoia analysts in October 2023 during routine threat hunting, but it has been active since at least August 2023, when the Saad Tycoon group offered it through private Telegram channels. The PhaaS kit shares similarities with other adversary-in-the-middle (AitM) platforms, such as Dadsec OTT, suggesting possible code reuse or a collaboration between developers. In 2024, Tycoon 2FA released a new version that is stealthier, indicating a continuous effort to improve the kit. Currently, the service leverages 1,100 domains and has been observed in thousands of phishing attacks. Tycoon 2FA attacks Tycoon 2FA attacks involve a multi-step process where the threat actor steals session cookies by using a reverse proxy server hosting the phishing web page, which intercepts the victim's input and relays them to the legitimate service. "Once the user completes the MFA challenge, and the authentication is successful, the server in the middle captures session cookies," Skoia explains. This way, the attacker can replay a user's session and bypass multi-factor authentication (MFA) mechanisms. Sekoia's report describes the attacks in seven distinct stages as described below: An overview of the attack is described with the diagram below, which includes all the steps of the process. Evolution and scale Sekoia reports that the latest version of the Tycoon 2FA phishing kit, released this year, has introduced significant modifications that improve the phishing and evasion capabilities. Key changes include updates to the JavaScript and HTML code, alterations in the order of resource retrieval, and more extensive filtering to block traffic from bots and analytical tools. For example, the kit now delays loading malicious resources until after the Cloudflare Turnstile challenge is resolved, using pseudorandom names for URLs to obscure its activities. Also, Tor network traffic or IP addresses linked to data centers are now better identified, while traffic is rejected based on specific user-agent strings. Regarding the scale of operations, Sekoia reports that it's substantial, as there's evidence of a broad user base of cybercriminals currently utilizing Tycoon 2FA for phishing operations. The Bitcoin wallet linked to the operators has recorded over 1,800 transactions since October 2019, with a notable increment starting August 2023, when the kit was launched. Over 530 transactions were over $120, which is the entry price for a 10-day phishing link. By mid-March 2024, the threat actors' wallet had received a total of $394,015 worth of cryptocurrency. Tycoon 2FA is just a recent addition to a PhaaS space that already offers cybercriminals plenty of options. Other notable platforms that can bypass 2FA protections include LabHost, Greatness, and Robin Banks. For a list of the indicators of compromise (IoCs) linked to the Tycoon 2FA operation, Sekoia makes available a repository with over 50 entries.

Daily Brief Summary

CYBERCRIME // Sophisticated 'Tycoon 2FA' Phishing Kit Targets Major Email Providers

A new phishing-as-a-service platform, 'Tycoon 2FA', is actively targeting Microsoft 365 and Gmail accounts to circumvent two-factor authentication (2FA).

Discovered by Sekoia analysts in October 2023, Tycoon 2FA has been operational since at least August of that year and is distributed through private Telegram channels.

Similarities with other phishing platforms suggest potential collaboration between cybercriminals or code reuse, with ongoing development making it more stealthy.

The phishing kit operates by using a reverse proxy server to steal session cookies through an adversary-in-the-middle (AitM) attack, enabling hackers to access authenticated user sessions.

Significant updates made to Tycoon 2FA in 2024 enhance evasion and phishing capabilities, including better blocking of traffic from bots and analytical tools.

Sekoia's report indicates a broad cybercriminal user base for Tycoon 2FA, with over 1,800 Bitcoin transactions linked to its operators, reflecting the large scale of the phishing campaign.

Security professionals have access to a repository of indicators of compromise (IoCs) connected to Tycoon 2FA to aid in detection and prevention efforts.