Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed

Posted on November 5, 2025November 5, 2025 By CWS

The Tycoon 2FA phishing package has emerged as one of the subtle Phishing-as-a-Service platforms since its debut in August 2023, particularly engineered to bypass two-factor authentication and multi-factor authentication protections on Microsoft 365 and Gmail accounts.

This superior risk employs an Adversary-in-the-Center strategy, using reverse proxy servers to host convincing phishing pages that completely replicate respectable login interfaces whereas capturing person credentials and session cookies in real-time.

In response to the Any.run malware developments tracker, Tycoon 2FA leads with over 64,000 reported incidents this yr, making it one of the prevalent phishing threats within the present panorama.

The assault spreads by way of a number of distribution vectors together with malicious PDF paperwork, SVG information, PowerPoint displays, and emails containing phishing hyperlinks.

Menace actors have additionally leveraged cloud storage platforms akin to Amazon S3 buckets, Canva, and Dropbox to host faux login pages, making detection more difficult for conventional safety options.

What makes this marketing campaign significantly harmful is its skill to steal authentication codes even when two-factor authentication is enabled, successfully rendering this safety measure ineffective towards the delicate interception strategies employed by the package.

Cybereason analysts recognized that the phishing package implements a number of pre-redirection checks as protection mechanisms towards detection, together with area verification, CAPTCHA challenges, bot and scanning device detection, and debugger checks that actively search for safety researchers analyzing the code.

These checks make sure that solely real victims attain the ultimate phishing web page whereas automated safety instruments and analysts are redirected to benign web sites.

The package additionally demonstrates a sophisticated understanding of organizational safety insurance policies by analyzing error messages from login makes an attempt, permitting attackers to tailor their campaigns for max effectiveness.

The technical sophistication extends to the usage of boilerplate templates that dynamically generate faux login pages primarily based on precise responses from Microsoft servers, making a seamless expertise that prompts customers to enter their MFA codes, that are then relayed to respectable servers in real-time, efficiently bypassing this essential safety layer.

Multi-Stage JavaScript Execution and Credential Harvesting

The assault unfolds by way of a fancy multi-stage JavaScript execution chain designed to evade detection whereas harvesting credentials.

Assault chain (Supply – Cybereason)

The preliminary HTML web page incorporates a JavaScript file with a base64-encoded payload compressed utilizing the LZ-string algorithm, which decompresses and executes the hidden payload in reminiscence.

The second stage employs a method known as DOM Vanishing Act, the place malicious JavaScript code removes itself from the Doc Object Mannequin after execution, leaving no seen hint for safety instruments inspecting the web page code.

The script incorporates three completely different base64-encoded payloads, every designed to run underneath particular situations.

The primary payload makes use of XOR cipher obfuscation and executes solely when window.location.pathname.break up incorporates an exclamation mark or greenback signal, confirming that the person arrived through the supposed malicious hyperlink moderately than by way of automated scanning.

Electronic mail extraction (Supply – Cybereason)

The e-mail extraction course of creates a customized string by appending “WQ” to the sufferer’s electronic mail deal with earlier than exfiltrating it to the command-and-control server through POST request to /zcYbH5gqRHbzSQXiK8YtTbhpNSGtkZc6xbMyRBGazbWU8fjfq, the place the server responds with AES-encrypted payloads decrypted utilizing the CryptoJS library.

When victims enter credentials into the faux login web page, the attacker performing as a intermediary instantly receives the data and submits it to respectable Microsoft servers.

The sufferer’s webpage is then dynamically up to date primarily based on server responses utilizing webparts, making the phishing try seem seamless and extremely convincing.

The ultimate JavaScript payload collects browser info together with navigator.userAgent and sends requests to geolocation providers, encrypting the gathered information with a hardcoded key earlier than transmission to the attacker’s endpoint at /tdwsch3h8IoKcUOkog9d14CkjDcaR0ZrKSA95UaVbbMPZdxe, efficiently finishing the credential theft operation.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:2FA, Accounts, Attack, Detailed, Gmail, Kit, Microsoft, Phishing, Targeting, Techniques, Tycoon

Post navigation

Previous Post: RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises
Next Post: 5 Actionable Tactics for SOC Analysts

Related Posts

Cornwell Quality Tools Data Breach Cyber Security News
46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks Cyber Security News
Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore Cyber Security News
PyPI Released Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers Cyber Security News
ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates Cyber Security News
Microsoft Patched Windows Server 2025 Restart Bug Disconnects AD Domain Controller Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface
  • 5 Actionable Tactics for SOC Analysts
  • Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed
  • RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises
  • New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface
  • 5 Actionable Tactics for SOC Analysts
  • Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed
  • RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises
  • New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News