Microsoft, Coinbase and Europol dismantled Tycoon 2FA phishing service in coordinated takedown

A multinational coalition led by Microsoft and Europol said it disrupted Tycoon 2FA, a phishing-as-a-service platform that had operated since August 2023. According to published accounts from Microsoft, Intel471, Trend Micro, and Coinbase, the service spanned more than 24,000 domains, supported roughly 2,000 paying users, and saw more than 300 domains seized that were tied to control panels and phishing pages. This was a coordinated attempt to take a high-volume credential-theft supplier out of circulation, not just a one-off domain cleanup.

The takedown matters because Tycoon 2FA was built to systematically bypass multi-factor authentication and industrialize account takeover at scale. By packaging advanced attack methods into a turnkey commercial product, the platform materially lowered the barrier for both novice and experienced threat actors to run sophisticated campaigns. For institutions, that translates into elevated fraud risk, higher incident-response load, and a clearer link between cybercrime operations and crypto-funded marketplaces.

How Tycoon 2FA bypassed MFA in practice

Tycoon 2FA relied on Adversary-in-the-Middle (AiTM) tactics that placed a transparent reverse proxy between victims and legitimate login endpoints. Operators used pixel-perfect clones, multi-layer redirect chains, short-lived subdomains, obfuscated scripts, and CAPTCHA controls to stay evasive while still relaying real-time authentication traffic to the genuine service. The core value proposition was operational: keep the login experience looking legitimate while quietly intercepting the session mechanics that matter.

Once a victim successfully completed an MFA challenge, the kit captured session cookies and tokens associated with the authenticated session. Attackers could then replay those tokens to gain account access without needing the second factor again. Published technical reporting indicated the kit could bypass common MFA approaches including SMS one-time codes, push notifications, and TOTP-style codes. In effect, the platform targeted the session layer, which is why conventional MFA alone could still fail under session-replay conditions.

What the coalition actually did and why it’s not “mission accomplished”

The disruption combined legal domain actions, infrastructure takedowns, and technical mitigations across multiple partners. Microsoft’s Digital Crimes Unit pursued civil remedies and registrar actions to seize domains, while partners including Cloudflare implemented network mitigations to reduce service availability. Coinbase said its Global Intelligence team traced cryptocurrency payments used to fund Tycoon 2FA, supported identity leads, and assisted the legal efforts that took control panels offline. This is the playbook defenders want: synchronized legal, technical, and financial disruption that attacks both access and monetization.

Publicly named partners included Microsoft, Europol, Coinbase, Cloudflare, Intel471, Trend Micro, SpyCloud, Proofpoint, and others. Coinbase summarized its participation by stating it partnered to disrupt Tycoon 2FA and that its tracing helped identify administrators and purchasers who funded the service. The common thread across the statements is that crypto payments were treated as a critical signal for attribution and enforcement leverage, not just a background detail.

The takedown removes an active toolset, but it does not remove the underlying technique. Analysts emphasized the practical limits of traditional MFA against AiTM session replay and pointed to phishing-resistant authentication such as FIDO2 security keys or passkeys that cryptographically bind credentials to legitimate origins. The operational takeaway is straightforward: if organizations don’t upgrade authentication and session controls, threat actors will repackage the same approach under a new brand.

Reduced short-term availability of a prominent PhaaS product and a higher likelihood of continued surveillance and enforcement against crypto payment flows linked to phishing services. The broader market signal is that coordinated industry–law enforcement actions are increasingly willing to target the commercial infrastructure of cybercrime, not only the downstream victims.

Share this article

Name Price24H (%)
Bitcoin(BTC)
$70,931.86
-2.31%
Ethereum(ETH)
$2,075.05
-2.03%
Tether(USDT)
$1.00
-0.02%
BNB(BNB)
$647.56
-1.03%
XRP(XRP)
$1.40
-1.18%
USDC(USDC)
$1.00
-0.01%
Solana(SOL)
$88.82
-1.56%
TRON(TRX)
$0.285402
-0.66%
Lido Staked Ether(STETH)
$2,072.65
-2.11%
Dogecoin(DOGE)
$0.093608
-3.35%

Follow us