• About
  • Subscribe
  • Contact
Wednesday, March 11, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home CISO

TrendAI drives global takedown of Tycoon 2FA phishing operation

by FutureCISO Editors
March 11, 2026
Phishing susceptibility remains high among bank employees

Photo by Markus Winkler from Pexels: https://www.pexels.com/photo/phishing-awareness-in-digital-security-30885916/

Share on FacebookShare on Twitter

Trend Micro TrendAI has played a crucial role in the global takedown of Tycoon 2FA, a phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA).

This operation was realised through extensive collaboration with Europol and various industry partners, including Cloudflare, Microsoft, and Proofpoint.

Launched in August 2023, Tycoon 2FA allowed cybercriminals to capture live authentication sessions using adversary-in-the-middle (AitM) techniques, providing them with real-time access to user credentials, one-time passcodes, and session cookies.

This capability effectively undermined the MFA protections relied upon by many enterprises, escalating the risk of large-scale account compromises.

At the time of its disruption, Tycoon 2FA boasted around 2,000 users and had utilised more than 24,000 domains, primarily targeting Microsoft 365 and other cloud services.

“This was not a single phishing campaign. It was an industrialised service built to make MFA bypass accessible to thousands of criminals. Identity is now the primary attack surface,” said Robert McArdle, director for cybercrime research at TrendAI. He emphasised that such operations shift the risk from isolated incidents to systemic vulnerabilities affecting numerous organisations.

The takedown operation illustrates the importance of coordinated intelligence sharing among law enforcement and private sector partners.

TrendAI had been monitoring Tycoon 2FA's infrastructure and operator behaviour over an extensive period, eventually linking the operation to individuals known as SaaadFridi and MrXaad. This intelligence was instrumental in supporting the collaborative enforcement action.

Despite this significant disruption, TrendAI cautions that threats persist. The nature of phishing-as-a-service operations means that the disruption of one service often leads to the emergence of others. Cybercriminals can resell harvested credentials on established criminal marketplaces, facilitating follow-up attacks such as business email compromise (BEC) and data theft.

Related:  Quantum Firewall Software R82.10 to unify approach to AI-driven security

As a response to this evolving threat landscape, TrendAI recommends several proactive strategies for organisations:

  1. Adopt phishing-resistant authentication: Move beyond traditional MFA to more robust authentication methods.
  2. Implement advanced security measures: Deploy email and collaboration security solutions capable of detecting lateral phishing and brand impersonation.
  3. Conduct continuous monitoring: Maintain vigilance over identity risk posture, acted upon with immediate response capabilities for anomalous behaviours.
  4. Use real-time inspection tools: Enable URL and web content inspection to identify fake login infrastructures effectively.
  5. Regular training and simulations: Conduct phishing simulation exercises to enhance employee awareness and reduce human risk factors.

“The disruption of Tycoon 2FA demonstrates the power of actionable intelligence in cybersecurity,” McArdle added.

“We will continue monitoring operators and the infrastructure used to perpetuate these services to safeguard our customers and increase the operational costs for those engaged in cybercrime.” Robert McArdle

Tags: cybersecurity collaborationMFA bypass threatsTrendAI phishing-as-a-serviceTycoon 2FA

FutureCISO Editors

No Result
View All Result

Recent Posts

  • TrendAI drives global takedown of Tycoon 2FA phishing operation
  • Trellix SecondSight to enhance cyber resilience against advanced threats
  • From lecturer to CISO: People-first path to resilient leadership
  • Survey says 87% of security teams prioritise agentic AI adoption
  • Trust and protection: HID's key findings on identity security

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • HR, education and Training
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl