Operators behind the Tycoon2FA phishing-as-a-service platform have resumed large-scale attacks targeting cloud accounts despite a recent law enforcement disruption. The resurgence highlights the resilience of subscription-based cybercrime ecosystems and the ongoing risk to enterprise cloud environments. 
A coordinated takedown led by Europol on March 4, 2026 seized hundreds of domains tied to the platform. However, attackers rebuilt infrastructure within hours and resumed phishing operations.
What is Tycoon2FA?
Tycoon2FA is a phishing-as-a-service toolkit designed to bypass multi-factor authentication using adversary-in-the-middle techniques.
The platform:
- Intercepts authentication sessions
- Captures credentials and MFA tokens
- Automatically logs into victim accounts
- Enables cloud account takeover
Since emerging in 2023, Tycoon2FA has become one of the most dominant phishing platforms.
Rapid Recovery After Law Enforcement Action
Authorities seized 330 domains forming Tycoon2FA infrastructure. The operation involved:
- Europol’s EC3
- Latvia
- Lithuania
- Portugal
- Poland
- Spain
- United Kingdom
Despite this, activity dropped briefly before rebounding within days.
Researchers from CrowdStrike observed phishing volumes returning to pre-takedown levels almost immediately.
Continued Targeting of Cloud Platforms
The platform continues to focus on enterprise cloud environments including:
- Microsoft 365
- Microsoft Entra ID
- Google cloud services
Attackers primarily aim to compromise corporate email accounts for business email compromise operations.
Post-Disruption Attack Chain
Recent campaigns follow a familiar multi-stage phishing flow:
- Phishing email sent to victim
- Link redirects to fake CAPTCHA page
- CAPTCHA validation triggers credential proxy
- Credentials and MFA tokens intercepted
- Automated login into cloud account
This adversary-in-the-middle method bypasses MFA protections entirely.
Infrastructure Rebuilt Quickly
Researchers identified newly deployed infrastructure including:
- Fresh IPv6 address ranges
- Newly registered domains
- Updated proxy servers
- Geofencing filters
Many logins originated from Romania-based hosting tied to M247 Europe.
Eight of the observed IPv6 addresses appeared only days after the takedown.
AI-Generated Decoy Pages
Attackers are now using generative AI to create convincing decoy sites.
These fake pages:
- Filter security researchers
- Mimic legitimate portals
- Improve phishing success rates
- Adapt dynamically
This adds another layer of sophistication to the campaign.
Additional Evasion Techniques
Post-disruption campaigns leveraged:
- URL shorteners
- Compromised SharePoint links
- Trusted presentation platforms
- Redirect chains
These tactics help bypass email security controls.
Why Infrastructure Takedowns Fail
Experts note that domain seizures alone rarely stop phishing services.
Without arrests:
- Operators retain skills
- Infrastructure is easily rebuilt
- Customers remain active
- Campaigns resume quickly
This explains Tycoon2FA’s rapid recovery.
Detection and Defense Recommendations
Organizations should:
- Monitor suspicious inbox rule creation
- Watch hidden folder activity
- Audit authentication logs
- Flag unusual IPv6 logins
- Enforce conditional access policies
Employee Awareness Guidance
Users should be trained to:
- Verify CAPTCHA pages
- Avoid shortened URLs
- Check unexpected login prompts
- Report suspicious cloud login pages
Human awareness remains critical.
Key Takeaways
- Tycoon2FA resumed attacks after takedown
- MFA bypass phishing continues
- Infrastructure rebuilt within hours
- Cloud accounts remain primary target
- Organizations must strengthen monitoring
Conclusion
The rapid resurgence of Tycoon2FA demonstrates that infrastructure seizures alone cannot dismantle modern phishing-as-a-service operations. As attackers continue to bypass MFA and target cloud identities, organizations must enhance monitoring, strengthen conditional access controls, and train users to recognize evolving phishing techniques.