Recently, an international operation coordinated by Europol He played a major hit against one of the most efficient phishing factories in recent years: the platform known as Tycoon2FA. The joint action - involving police agencies from several countries and a coalition of technology companies - disconnected hundreds of domains that formed the backbone of the service and left out of line control panels and subplanting pages used by criminals.
According to the Europol press release, 330 domains linked to the service were seized and deactivated, and operational measures were carried out in countries such as Latvia, Lithuania, Portugal, Poland, Spain and the United Kingdom, with coordination from the Europol European Cybercrime Centre. You can consult the official communiqué on the Europol site here: europol.europa.eu.

Microsoft, which led the technical interruption with the support of several private actors, describes Tycoon2FA as a platform that operated since at least August 2023 and was exploited by criminals to avoid multi-factor authentication protections on a large scale. The company's researchers estimated that by mid-2025 Tycoon2FA was generating tens of millions of phishing e-mails per month and represented a very high proportion of the attempts to subplant blocked by its systems. Microsoft analysis is available on your security blog here: microsoft.com / security / blog.
The key technical element that made this platform dangerous was its design as a service of "adversary-in-the-middle" (AITM). In practical terms, Tycoon2FA acted as an inverse proxy: when a victim tried to log into services such as Microsoft 365 or Gmail through a fraudulent page, the platform intercepted in real time both the credentials and session cookies and the MFA codes that the user introduced. From the victim's perspective, the login process might seem successful, but attackers gained access to the authenticated session and could maintain control even if the password was changed later.
This behavior explains why many affected organizations did not immediately detect intrusion: it was not just about the theft of passwords, but about the capture of tokens and active sessions that allowed the attacker to move with apparently valid credentials. Microsoft also warned that, unless active sessions and tokens are explicitly revoked, the simple re-establishment of passwords is not enough to cut off malicious access.
One factor that accelerated risk dissemination was the commercial model of the platform: Tycoon2FA was sold for short periods through channels such as Telegram, which facilitated actors with little technical knowledge to launch sophisticated attacks against organizations of all sizes. This "criminal access economy" turns complex tools into commodities and multiplies the scope of malicious campaigns.
The arrest and neutralization of the infrastructure alone does not eliminate the risk: the suplanting campaigns come back with variations and other kits can quickly occupy the vacuum. That is why it is necessary to understand what measures actually reduce exposure.
First of all, multifactor authentication is still necessary, but it is not infallible. There are differences between methods: SMS codes and codes sent by authentication apps are susceptible to AITM attacks and interception processes; instead, solutions based on public keys (e.g., FIDO2 / WebAuthn and physical security keys) offer proven resistance to this type of interception because they do not make a reusable secret available that can be retransmitted by a proxy.
Secondly, it is essential to incorporate session controls: when a commitment is suspected, active sessions and tokens must be revoked, re-authenticated and access records reviewed to identify anomalous latences or locations. It also helps conditional access policy that limits the validity of sessions according to the device, network or user behavior.
Besides the technical layer, e-mail prevention remains critical: more aggressive anti-phishing filters, domain authenticity validation (DMARC, SPF, DKIM) and content and link analysis reduce the likelihood of a victim reaching a fraudulent page. The collaboration between security firms, infrastructure providers and police forces, as seen in this operation, increases the effectiveness of these defenses.
For IT organizations and administrators, the practical recommendations are to prioritize the adoption of physical-resistant authentication (FIDO2), enable automatic session revocation by detecting changes in credentials, further deactivate inherited authentication methods and monitor telemetry indicating atypical session beginnings. In response, it is essential to have clear procedures to act on a possible AITM: identification of scope, revocation of tokens, blocking of committed accounts and reporting to affected users.

Finally, this episode highlights something that experts have been repeating for years: security is not a single control, but layers that must be combined and updated continuously. The disarticulation of Tycoon2FA is an important operational success, but the threat evolves and requires companies, public administrations and users to strengthen both technology, awareness and digital hygiene practices.
If you want to deepen, the Europol communiqué details international cooperation and measures taken, and Microsoft's technical analysis explains how the platform worked and why it was so effective against certain MFA methods: Europol and Microsoft Security Blog. For context on good authentication practices and session management, the NIST authentication guide provides useful foundations: NIST SP 800-63B.
The lesson is clear: public-private cooperation can dismount large criminal operations, but it is to be hoped that malicious actors will adapt their tools. Effective defense requires constant updating, quick response and a determined bet on authentication mechanisms that resist real-time attempts to supplanting.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...