The recovery and evolution of Tycoon2FA - a phishing kit specialized in avoiding authentication - confirms a dangerous trend: criminal operations not only resist police actions, but reuse and refine techniques to exploit legitimate authentication flows. Recent research shows that its operators have added support for the so-called "device code" attack and that they are taking advantage of legitimate follow-up links, such as those of Trust, to redirect victims to delivery chains in the browser that end up authorizing devices controlled by the attackers in Microsoft 365 accounts.
The vector is simple in appearance but effective in practice: the victim receives an email with a follow-up link that passes through legitimate services and several layers of opuscado JavaScript; when you reach the fraudulent page you are asked to copy a device code and paste it into microsoft.com / devilutin, the real Microsoft screen. When the victim completes the flow, Microsoft emits tokens OAuth that the attacker can use to access mail, calendar and cloud storage without the need to steal traditional credentials or break the MFA locally. For an attacker this amounts to persistent and difficult access to detect.

This method has increased in recent months: security firms have reported an exponential increase in device- code phishing campaigns and a proliferation of PhaaS kits and services (Physing- as- a- Service) that automate the campaign, reducing the technical barrier for less specialized actors. An analysis of the increase in this technique can be found in Proofpoint's report on the evolution of the vice-code phishing Here., while the post-takedown reconstruction and hardening of Tycoon2FA was documented by Abnormal Security in this report.
A relevant feature of the kit is its ability to camouflage in front of researchers and automated tools: it detects analysis environments such as Selenium, Playwright or burpsuite, blocks ranges associated with cloud suppliers and security services, and redirects all suspicious traffic to legitimate pages to make the investigation difficult. This capacity for evasion increases the cost and complexity of detection, and explains why operators return to activity after police interruption measures.
For security teams and identity managers, the implications are clear: controls focused exclusively on the protection of credentials are no longer sufficient. It is essential to review and tighten OAuth consent policies, limit the use of device flow when it is not necessary and force administrative reviews for third-party applications. Microsoft offers capabilities such as Continuous Access Evaluation (CAE) and conditional access policies that help mitigate this type of abuse; its adoption should be accelerated in corporate environments.
In parallel to configuration changes, there are concrete operational measures: monitor the input ID (before Azure AD) logs for authentication via device _ code, track the use of the "Microsoft Authentication Broker" and unusual signals such as Node.js' User-Agents, and audit registered devices and application consents. When suspicious activity is detected, it is appropriate to revoke tokens and sessions, remove unrecognized devices and force a reconsent of applications with less privilege.
The re-use of legitimate services (e.g. mail security platform tracking links) as redirection vectors poses another challenge: the providers of such tools can end up being used without their knowledge or by committed customers. If your organization detects malicious use of a tracking or delivery provider, contact the supplier immediately and share evidence; coordination between victims, suppliers and response equipment accelerates mitigation and possible removal of malicious content.

For end-users, prevention goes through education and prudence: distrust unexpected emails that ask to copy codes and paste them on another page, confirm the veracity of invoices or notices by contacting the issuer through independent channels, and prioritize the use of FIDO2 keys or MFA methods that do not depend on copying / hitting codes where possible. Although MFA remains crucial, this type of attack shows that not all second factor factors offer the same protection against malicious OAuth consent schemes.
The teams that need IOC and technical references for detection and response can consult the resources published by the researchers; eSentire, who investigated the Tycoon2FA chain and its new layers of evasion, published details and technical recommendations in its analysis available here and there are lists of indicators published in public repositories that facilitate integration into detection tools and automatic blockages. Adopting these signals, adjusting consent policies and strengthening identity telemetry are urgent steps to reduce the impact of these campaigns.
Ultimately, the lesson is that the war against modern phishing requires a combination of technical improvement, identity governance and sectoral cooperation: without stricter controls over OAuth and without a coordinated response between suppliers and organizations, kits such as Tycoon2FA will continue to find ways to recycle legitimate infrastructure for fraud.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...