top of page
Writer's pictureDaniel Eberhorn

🛡️💼 'Tycoon' Malware Kit Bypasses Microsoft and Google MFA Protection 💼🛡️

Updated: May 18


An engaging image of a chessboard with a commanding black king piece centered and highlighted on a glossy surface. The king is set against a backdrop featuring digital security elements such as shields, locks, and cyber icons, symbolizing strategic defense in cybersecurity. This visual metaphor reflects the concept of protecting digital assets against threats, with a focus on proactive measures and control within the cyber domain.

Image generated by OpenAI's DALL·E

 

As previously discussed in an earlier blog post - Ransomware Revealed: How It Works, RaaS & Its Impact on Businesses - Ransomware-as-a-Service (RaaS) has established itself as a successful and established business model in the DarkNet. This business model philosophy has now made its way into the phishing sector.


Tycoon 2FA: The New Threat on the Horizon

Since about August last year, the Phishing-as-a-Service (PhaaS) platform "Tycoon 2FA" has been available and has recently received an update that significantly enhances its effectiveness. This was revealed by researchers from Sekoia in a blog post published on March 26 - which also provides technical details.


The Unending Challenge of Digital Security

In today's digital world, protecting personal and business data has become a constant challenge that requires perseverance and attention. In this endless race for security, there is one adversary that stands out for its sophistication and stealth: the Tycoon 2FA PhishKit.


The Targets: Microsoft 365 and Gmail

This phishing kit, a service for cybercriminals, specifically targets user accounts on Microsoft 365 and Gmail. It uses sophisticated methods to bypass two-factor authentication (2FA), a security measure considered one of the cornerstones of modern cyber defense.


The Growing Threat

Remarkably, between October 2023 and February 2024, over 1,100 domain names associated with the Tycoon 2FA PhishKit were identified. This number underscores the breadth and depth of the threat posed by this phishing kit.


A New Era of Phishing Attacks

With its user-friendly templates, Tycoon 2FA enables its users to conduct targeted phishing campaigns aimed at circumventing two-factor authentication and exploiting unprotected accounts.



The Clever Bait

It all starts with a seemingly harmless email that can be fatal. Tycoon 2FA uses a tactic as old as the Internet itself: phishing.

The methodology used by PhishKit to lure unsuspecting users is characterized by sophisticated sophistication. By incorporating a malicious link or QR code into the phishing email, the victim is redirected to a faithfully replicated but completely compromised login page. Convinced that they are complying with a legitimate request, the user unknowingly transmits their access data directly to the attackers.


The Sophisticated Fake

One attribute of the Tycoon 2FA PhishKit lies in its ability to differentiate and analyze traffic. The kit can precisely identify when a potential victim has fallen for the phishing baits laid out. This targeted distinction capability allows the PhishKit to follow only those interactions that promise a successful fraud attempt. For this purpose, users are redirected to a carefully designed, fake login page that is a spitting image of the authentic login pages of services like Microsoft 365 or Gmail. These pages are designed to mimic the visual and functional characteristics of the real login pages, not raising any suspicion. Once a user enters their login details on such a page, these data are immediately intercepted and transmitted to the attackers. The use of SSL/TLS encryption on these pages further enhances the appearance of legitimacy, thereby lowering the users' suspicion.



Overcoming Two-Factor Authentication

The PhishKit represents a serious threat even to accounts secured with two-factor authentication (2FA). This kit employs an attack method to cleverly forward 2FA requests - whether through Microsoft Authenticator push notifications, one-time passwords via authenticator apps, SMS, or phone call verifications - to the victim while simultaneously intercepting the responses in real-time. This man-in-the-middle attack technique allows Tycoon 2FA to effectively bypass the additional layer of security by transmitting the authentication information in real-time to the fake site, thus tricking the security measures. After successfully circumventing the 2FA, the PhishKit gains access to the victim's session cookies. These cookies contain essential authentication tokens, enabling the attackers to gain unnoticed and indefinite access to the victim's account, as if they were the legitimate owners. Since Microsoft only displays such activities in hard-to-find submenus, it often remains hidden from users that an unauthorized session is active.



The Digital Raid

With the stolen data in hand, attackers can not only cause financial damage but also misuse confidential information. The consequences of such a breach range from data loss and identity theft to significant reputational damage.


Making Life Hard for PhaaS

To effectively protect oneself and one's company against Tycoon 2FA and similar phishing threats, proven strategies exist. These are based on a balanced mix of technological protections and the conscious behavior of users towards potential threats.


Awareness and Training

Continuous education of the workforce on the risks and identification features of phishing attacks is crucial. Regular training enables employees to identify suspicious emails and attempted attacks.


Critical Examination of Emails

All incoming emails should be carefully examined for unusual content, links, and attachments. A critical examination helps to identify potential threats early on.


Verification of Senders

Verifying the sender's address can reveal whether a message is legitimate. This is especially true for emails that appear to come from trustworthy organizations but are received unexpectedly.


Robust Authentication Procedures

Implementing MFA systems that support FIDO2 provides an additional layer of security through the use of physical security keys, as opposed to software-based solutions.


Detection of Security Anomalies

Integrating advanced monitoring systems that indicate atypical access attempts or unusual user activities can sound an early alarm and detect potential intrusion attempts.


Cautious Handling of QR Codes

It is essential to promote a critical attitude towards QR codes, as they can be easily manipulated and used as an entry point for phishing attacks.


Phishing Website Detection Technologies

Modern detection systems designed specifically to identify phishing websites use machine learning and artificial intelligence to recognize fraudulent URLs and content. These tools can analyze in real-time whether a webpage is authentic or poses potential risks, warning users accordingly before sensitive data is entered.



Conclusion

No single measure can perform miracles on its own, but by combining these strategies, a robust defense strategy against increasingly sophisticated phishing attacks can be developed, effectively protecting digital assets. Even for security experts, the challenge of recognizing such sophisticated attacks in the short amount of time, given the high workload and the deluge of emails faced daily, can be considerable.


Phishing emails typically aim to trick users into revealing personal information, such as:


  • Access credentials (e.g., username, password)

  • Banking information (e.g., credit card numbers, bank account information)

  • Personal identification information (e.g., Social Security numbers, birthdates)

The emails may employ various tactics to deceive the victim, including:


  • Urgent requests to take immediate action, e.g., resetting passwords due to alleged security breaches.

  • Offers or rewards that seem too good to be true, to entice users to click on links or open file attachments.

  • Deceptively authentic imitations of legitimate companies or organizations to gain trust and persuade victims to disclose sensitive information.


It's important to emphasize that phishing emails and campaigns are constantly evolving and adapting to current events and trends. Therefore, it's advisable to remain vigilant and promote security awareness regularly to counter phishing attacks effectively.

bottom of page