Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing
    Cybersecurity

    Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing

    adminBy adminApril 17, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In the wake of a major takedown of phishing’s biggest brand name, Tycoon 2FA, phishers worldwide have scattered. Some have stuck around, but many have moved to other phishing service providers, and some seem to be jumping on a fast-growing trend toward device code phishing.

    It would be shortchanging Tycoon 2FA to merely distinguish it as the world’s premiere phishing-as-a-service (PhaaS) group. A year ago, it accounted for nearly 90% of all PhaaS activity everywhere, according to data from Barracuda. It essentially owned the PhaaS ecosystem.

    The ecosystem evolved, though, and earlier this year Barracuda attributed just less than half of the PhaaS market to Tycoon, with Mamba 2FA not far behind. Then a coordinated law enforcement takedown knocked out 330 of its active domains. It’s still alive and kicking, but its output has dropped from more than 9 million attacks per month to just over 2 million.

    Related:How NIST’s Cutback of CVE Handling Impacts Cyber Teams

    It would be incorrect, though, to infer from those figures that law enforcement caused an 80% drop in phishing activity. Whenever the feds clip major cybercrime rings, the threat actors involved don’t just hang up their keyboards and find a job. They scatter. The way Tycoon 2FA associates seem to be scattering is particularly interesting, as it mirrors some much larger trends researchers are observing in the phishing threat landscape.

    PhaaS Power Politics

    When it comes to such a behemoth as Tycoon 2FA, “You can’t expect one takedown to completely eliminate every aspect of these operations,” says Merium Khalid, director of SOC offensive security with Barracuda’s office of the chief technology officer (CTO). “The way you want to look at it is: They took down the operations, but the infrastructure, the tactics, the techniques, and the code behind everything is still there.”

    While Tycoon has been licking its wounds, groups like EvilProxy and Sneaky 2FA have stepped into the power vacuum it’s left behind. EvilProxy attacks per month rose from just under 3 million to just over 4 million around the time of the takedown, and Sneaky 2FA rose from under 700,000 to nearly 2 million.

    The group that’s benefited the most, though, is Tycoon’s formerly largest competitor, Mamba 2FA. Mamba was responsible for nearly 8 million attacks per month before Tycoon was punched in the nose. Now it’s churning out more than 15 million per month — a nearly 100% surge in mere weeks.

    Like immigrants to new countries, as the hackers have migrated from one phishing service provider to another, they’ve taken what they know with them. “The [Tycoon 2FA] tools and the code and the techniques are actually now in the hands of their competitors like Mamba and EvilProxy. So I think we’re going to be seeing more sophisticated phishing-as-a-service attacks and techniques out there.”

    Related:FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats

    Device Code Phishing Surges

    Selena Larson, senior threat intelligence analyst at Proofpoint, saw it firsthand.

    “Just yesterday I was poking around at some of the device code phishing activity we’re seeing,” she recalls over a Zoom interview. In device code phishing, attackers trick victims into handing over access to their accounts using a service’s legitimate new-device login flow. “One of the campaigns was using a PDF that had an artifact of a Tycoon URL. I was like, ‘Wait a second, is this Tycoon 2FA and EvilTokens?’ Potentially, this actor was just reusing PDFs that they had previously used for Tycoon credential phishing to do, now, EvilTokens device code account takeover.”

    Barracuda came across another case of it. They observed a device code phishing campaign that incorporated one of Tycoon 2FA’s most unique quirks: motivational-style comments that create noise in its source code.

    It’s no surprise, judging by Proofpoint’s latest data. By coincidence or causation, Tycoon 2FA’s takedown has overlapped almost exactly with a steep rise in device code phishing.

    Related:Russia’s ‘Fancy Bear’ APT Continues Its Global Onslaught

    Larson explains that though it’s not new, device code phishing wasn’t terribly common even late into last year. “Since November, December of 2025, it’s been increasing moderately across the landscape, and over the last three to four weeks, in particular, it went from being still fairly uncommon to being quite commonly observed across the threat landscape. Even just within the last two weeks, we’ve gone from seeing a handful of easily identifiable device code phishing kits to having a lot more than that.”

    It’s not clear exactly how much of Tycoon’s user base is moving toward device code, she acknowledges. “But it is, I think, indicative of the explosion of popularity for device code phishing, and these new types of phishing kits incorporating device code phishing into their kits as part of the package that they’re selling.”

    For Larson, it’s only the next logical step in the history of phishing techniques. “It used to be years and years ago that threat actors would just go for your username and password. And so then multifactor authentication (MFA) was created to block that and disrupt those types of capabilities. So, OK, what do the threat actors do? Well, they make MFA phishing kits to grab the whole chain,” she explains.

    “But now we’re at this point where maybe more people are aware that MFA isn’t necessarily the best,” she adds, thanks to kits like Typhoon 2FA. “Now [the threat actors] are like: ‘OK, what’s another type of phishing that we could do? OAuth phishing and device code phishing, I think, are the natural progression of where threat actors are going to go.”

    Don’t miss the latest Dark Reading Confidential podcast, Security Bosses Are All in on AI: Here’s Why,where Reddit CISO Fredrick Lee and Omdia analyst Dave Gruber discuss AI and machine learning in the SOC, how successful deployments have (or haven’t) been, and what the future holds for AI security products. Listen now!

    2FA Adopt Code device Phishers Phishing Scatter Tycoon
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article3 Oscar-winning Netflix movies to watch this weekend (April 17-19)
    Next Article Perfect for the Beach, Pool, or Park, This Skullcandy Portable Speaker on Sale for Just $33 Right Now
    admin
    • Website

    Related Posts

    Payouts King ransomware uses QEMU VMs to bypass endpoint security

    April 17, 2026

    White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology

    April 17, 2026

    Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

    April 17, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google Ads API to require multi-factor authentication

    April 18, 2026

    Grab a Ring video doorbell for just $14

    April 18, 2026

    Payouts King ransomware uses QEMU VMs to bypass endpoint security

    April 17, 2026

    Keep Pushing: We Get 10 More Days to Reform Section 702

    April 17, 2026
    Categories
    • Blogging (64)
    • Cybersecurity (1,373)
    • Privacy & Online Earning (171)
    • SEO & Digital Marketing (842)
    • Tech Tools & Mobile / Apps (1,640)
    • WiFi / Internet & Networking (229)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google Ads API to require multi-factor authentication

    April 18, 2026

    Grab a Ring video doorbell for just $14

    April 18, 2026

    Payouts King ransomware uses QEMU VMs to bypass endpoint security

    April 17, 2026
    Most Popular
    • Google Ads API to require multi-factor authentication
    • Grab a Ring video doorbell for just $14
    • Payouts King ransomware uses QEMU VMs to bypass endpoint security
    • Keep Pushing: We Get 10 More Days to Reform Section 702
    • The latest Android Canary build is hitting older Pixel devices
    • Flawed Cisco update threatens to stop APs from getting further patches
    • White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology
    • Perfect for the Beach, Pool, or Park, This Skullcandy Portable Speaker on Sale for Just $33 Right Now
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.