Tycoon2FA phishing platform returns after recent police disruption
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章,抓住主要信息。 文章讲的是一个叫做Tycoon2FA的网络钓鱼平台,它被执法部门和微软破坏了。他们 seizing 了330个域名,但没过多久,这个平台又恢复了之前的活动水平。 CrowdStrike的报告提到,在执法行动后,活动量短暂下降到25%,但很快就回升了。 此外,Tycoon2FA专门针对微软和Gmail账户,绕过双重认证。它每月生成3000万钓鱼邮件,占微软拦截量的62%。 CrowdStrike还提到,尽管基础设施被破坏,但犯罪分子迅速恢复,并继续支持各种非法活动。 总结的时候要涵盖这些关键点:平台被破坏、迅速恢复、钓鱼邮件数量、影响范围以及犯罪分子的快速恢复能力。 </think> 欧ropol和微软等机构于3月4日成功破坏了网络钓鱼服务Tycoon2FA平台, seizing 330个域名。然而,该平台在几天内迅速恢复到之前的活动水平。CrowdStrike报告指出,在执法行动后,Tycoon2FA的活动量短暂下降至25%,随后回升至原有水平。该平台专门针对Microsoft 365和Gmail账户,并通过中间人机制绕过双重认证保护。每月生成约3000万封钓鱼邮件,占微软拦截总量的62%。尽管执法行动导致部分基础设施被破坏,但犯罪分子迅速恢复并继续支持多种非法活动。 2026-3-23 22:0:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Tycoon2FA phishing platforms returns after recent police disruption

The Tycoon2FA phishing-as-a-service (PhaaS) platform that Europol and partners disrupted on March 4 has already returned to previously observed activity levels.

Microsoft led the technical disruption, which involved seizing 330 domains part of Tycoon2FA’s backbone infrastructure that included control panels and phishing pages used in attacks.

However, the disruption caused by the law enforcement was short-lived, as CrowdStrike noticed the cybercrime service return to normal operational volumes within days.

“Falcon Complete observed a short-term decrease in the volume of Tycoon2FA campaign activity following the takedown, with daily volumes on March 4 and March 5, 2026, reducing to 25% of pre-disruption levels,” reads CrowdStrike’s report.

“However, this volume subsequently returned to pre-disruption levels, with daily levels of cloud compromise active remediations returning to early 2026 levels.”

First documented by Sekoia roughly two years ago, Tycoon2FA appeared online as a PhaaS platform dedicated to targeting Microsoft 365 and Gmail accounts, featuring adversary-in-the-middle mechanisms that enable bypassing two-factor authentication (2FA) protections.

A month later, Trustwave reported that Tycoon2FA’s operators were actively improving the platform, adding new, advanced features, and enticing more cybercriminals to purchase access.

Tycoon2FA is a significant actor on the phishing scene, with Microsoft reporting that it generated 30 million phishing emails per month, accounting for 62% of all emails blocked by the tech giant.

According to CrowdStrike, Tycoon2FA is back in business using largely unchanged techniques, tactics, and procedures (TTPs), and supported a diverse set of illegal activities, like business email compromise (BEC), email thread hijacking, cloud account takeovers, and malicious SharePoint links.

After the disruption action, Tycoon2FA has been used in malicious email campaigns that relied on malicious URLs and shortener services, legitimate platforms such as presentation tools, where redirection mechanisms are abused, and also compromised domains.

AI-generated decoy web pages used in Tycoon2FA attacks
AI-generated decoy web pages used in Tycoon2FA attacks
Source: CrowdStrike

Interestingly, some of the old infrastructure remained active, indicating that the disruption was incomplete, while new phishing domains and IP addresses were registered quickly following the law enforcement operation.

Regarding the observed post-compromise activity, this includes the creation of inbox rules, hidden folders for fraud emails, and preparation for BEC operations.

Ultimately, CrowdStrike comments that, without arrests or physical seizures, it’s easy for cybercriminals to recover and replace the impacted infrastructure. As long as the demand from the phishing ecosystem is high, the motive for PhaaS platform operators remains unchanged.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/tycoon2fa-phishing-platform-returns-after-recent-police-disruption/
如有侵权请联系:admin#unsafe.sh