How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读文章,抓住主要信息。 文章讲的是一个名为Tycoon 2FA的钓鱼平台被 dismantled,这是一个由执法机构和网络安全公司合作的行动。这个平台主要针对启用多因素认证(MFA)的账户,通过伪造网站来绕过MFA,导致大量欺诈邮件和受害者。 接下来,我需要提取关键点:平台名称、被拆除的时间、运作方式、影响范围、执法行动以及后续的影响。同时,要注意字数限制,所以要简洁明了。 然后,我要把这些信息组织成一个连贯的句子,确保涵盖所有重要方面:平台功能、受害者数量、执法措施以及犯罪分子可能填补空白的情况。 最后,检查一下是否符合用户的要求,没有使用“文章内容总结”之类的开头,并且控制在100字以内。 </think> 执法机构与网络安全公司合作摧毁了全球知名钓鱼平台Tycoon 2FA。该平台利用伪造网站绕过多因素认证机制,在全球发送数千万封钓鱼邮件并导致近万名受害者。其运作方式包括实时转发登录凭证和一次性密码以获取合法会话。尽管多因素认证能提升账户安全性,但并非绝对安全。 2026-3-6 17:58:41 Author: www.bitdefender.com(查看原文) 阅读量:7 收藏

In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners one of the world's most prolific phishing-as-a-service platforms has been dismantled.

First appearing in August 2023, Tycoon 2FA was designed specifically to help fraudsters hack into accounts defended by multi-factor authentication and steal session cookies, and was responsible for tens of millions of fraudulent emails and almost tens of thousands of confirmed victims around the world.

What many computer users do not realise is that although enabling multi-factor authentication (MFA) on their Microsoft 365 or Gmail accounts is recommended and hardens their security against hackers, it does not make it impossible for them to be breached.

Tycoon 2FA's key trick was how it could bypass MFA by sitting between the victim and the legitimate service. A fake website that looked identical to the real one doesn't just collect a victim's login credentials - it immediately forwards them to the real site in real time, acting as a transparent proxy. When the victim enters their one-time-password on the fake site, it is forwarded to the real site before it expires, and the attack gains a fully-authenticated session.

For a starting price of roughly US $120 per month, Tycoon 2FA's customers gained access via private Telegram channels to an off-the-shelf phishing kit, allowing even those with limited technical expertise to run sophisticated account-takeover campaigns at scale.

By mid-2025, Tycoon 2FA is said to have accounted for approximately 62% of all phishing attempts blocked by Microsoft, including more than 30 million emails in a single month.

According to reports, healthcare and education organisations were hit hard with more than 100 members of threat-sharing group Health-ISAC were targeted. In New York alone, at least two hospitals, six municipal schools, and three universities faced attempted or successful compromised — causing disruption and delays to patient care and operations.

Acting under a US. court order, Microsoft seized 330 active domains powering Tycoon 2FA's core infrastructure. Meanwhile, law enforcement authorities in Latvia, Lithuania, Portugal, Poland, Spain, and the UK also seized infrastructure used by the criminal operation.

Tech firm Cloudflare went further, announcing that it has banned thousands of domains and Workers projects, suspended related accounts, and erased all associated Workers scripts — blocking the kit's proxy functionality at the edge. For domains that could not be legally seized as local law enforcement agencies were non-cooperative, Cloudflare deployed warning pages to block victims attempting to access phishing links.

Obviously it's a good thing that one of the most dangerous phishing platforms in existence has been taken offline. But it must be remembered that the cybercrime industry abhors a vacuum, and chances are that other criminal operators are likely to fill the void quickly.

One lesson to learn is that not all MFA is created equal. We have in the past encouraged users to not rely upon SMS-based multi-factor authentication because of the problem of SIM-swapping attackers where fraudsters divert login codes to phones under their own control. Tycoon-style proxy attacks, meanwhile, are much more difficult for fraudsters to successfully pull off if users have protected their accounts with hardware security keys or passkeys.


文章来源: https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-bypassed-mfa-120-phishing-kit-global-takedown-shut-down
如有侵权请联系:admin#unsafe.sh