Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks
Tycoon 2FA phishing platform loses market dominance after law enforcement disruption as threat actors migrate to
Summary
Following the seizure of 330 Tycoon 2FA domains in early March, threat actors have migrated to competing phishing-as-a-service (PhaaS) platforms including Mamba 2FA, EvilProxy, and Sneaky 2FA. Despite the disruption, overall phishing attacks increased from 20 million to over 23 million, with Tycoon 2FA's tools and code being reused and redistributed across the underground ecosystem. The incident demonstrates the resilience of the PhaaS ecosystem, where mature platforms now incorporate Tycoon's attack capabilities and redundant infrastructure.
Full text
Threat actors have migrated to other phishing-as-a-service (PhaaS) platforms after Tycoon 2FA’s disruption and are reusing its tools, cybersecurity firm Barracuda Networks says. Active since at least 2023, Tycoon 2FA allows threat actors to launch phishing attacks, bypass two-factor authentication, and compromise user accounts. It has been used in attacks against half a million organizations. Last year, Tycoon 2FA accounted for 62% of the phishing attempts seen by Microsoft, and was the most used PhaaS platform, with 89% market share, Barracuda says. In early March, a coordinated effort resulted in the seizure of 330 active Tycoon 2FA domains, but the platform’s operations continued seemingly unaffected. According to the fresh Barracuda report, despite the rebound, Tycoon 2FA lost the PhaaS crown, as threat actors have migrated to other platforms, such as Mamba 2FA, EvilProxy, and Sneaky 2FA. The overall number of attacks leveraging these four phishing kits has increased following the disruption, from roughly 20 million to over 23 million, but Tycoon is no longer the leader as it was prior to the law enforcement operation. It’s now well behind Mamba and EvilProxy based on Barracuda detections. Tycoon 2FA, Barracuda says, absorbed the hit, the underlying ecosystem lived on, and other phishing kits have matured their infrastructure and expanded their offerings with tools previously used by the disrupted service.Advertisement. Scroll to continue reading. “Tycoon 2FA was widely used by independent affiliates. This means that variants of Tycoon 2FA’s attack code that have been cloned or modified by individual adversaries continue circulating. It also means that independently hosted deployments remain active and that fragmented, low-volume campaigns persist,” Barracuda notes. According to the cybersecurity firm, PhaaS toolsets are increasingly similar to open source software, where threat actors reuse, modify, and redeploy the code. Combined with residual infrastructure, built-in redundancy to survive disruptions, and persistent access to compromised environments, this makes phishing kits sturdier and more difficult to detect and tackle. According to Barracuda, these artifacts reflect an ecosystem diversification, where Tycoon 2FA is redistributed across more platforms rather than restored. “This does not mean the takedown operation failed. Rather, it shows what happens when disruption hits a maturing underground economy, and why security defenses need to look more broadly than individual players,” Barracuda notes. Related: 53 DDoS Domains Taken Down by Law Enforcement Related: US Confirms Handala Link to Iran Government Amid Takedown of Hackers’ Sites Related: SystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown Related: 1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Cursor AI Vulnerability Exposed Developer Devices53 DDoS Domains Taken Down by Law EnforcementArtemis Emerges From Stealth With $70 Million in FundingSplunk Enterprise Update Patches Code Execution VulnerabilityNIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical SoftwareCisco Patches Critical Vulnerabilities in Webex, ISERansomware Hits Automotive Data Expert AutovistaCapsule Security Emerges From Stealth With $7 Million in Funding Latest News White House Chief of Staff to Meet With Anthropic CEO Over Its New AI TechnologyCoChat Launches AI Collaboration Platform to Combat Shadow AIIn Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker ArrestedAnother DraftKings Hacker Sentenced to PrisonLawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ FollowedRecent Apache ActiveMQ Vulnerability Exploited in the WildTwo North Korean IT Worker Scheme Facilitators Jailed in the USZionSiphon Malware Targets ICS in Water Facilities Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveAnti-ransomware platform Halcyon has named Kirstjen Nielsen and Chris Inglis as Strategic Advisors.ThreatModeler has appointed Kevin Gallagher as Chief Executive Officer.Thomas Bain has been appointed Chief Marketing Officer at Silent Push.More People On The MoveExpert Insights Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- malware — Tycoon 2FA
- malware — Mamba 2FA
- malware — EvilProxy
- malware — Sneaky 2FA