CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 18, 2026

Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing

Dark Reading Archived Apr 18, 2026 ✓ Full text saved

In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.

Full text archived locally
✦ AI Summary · Claude Sonnet


    THREAT INTELLIGENCE CYBERSECURITY OPERATIONS CYBER RISK VULNERABILITIES & THREATS NEWS Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow. Nate Nelson,Contributing Writer April 17, 2026 5 Min Read SOURCE: HARRY WEDZINGA VIA ALAMY STOCK PHOTO In the wake of a major takedown of phishing's biggest brand name, Tycoon 2FA, phishers worldwide have scattered. Some have stuck around, but many have moved to other phishing service providers, and some seem to be jumping on a fast-growing trend toward device code phishing. It would be shortchanging Tycoon 2FA to merely distinguish it as the world's premiere phishing-as-a-service (PhaaS) group. A year ago, it accounted for nearly 90% of all PhaaS activity everywhere, according to data from Barracuda. It essentially owned the PhaaS ecosystem. The ecosystem evolved, though, and earlier this year Barracuda attributed just less than half of the PhaaS market to Tycoon, with Mamba 2FA not far behind. Then a coordinated law enforcement takedown knocked out 330 of its active domains. It's still alive and kicking, but its output has dropped from more than 9 million attacks per month to just over 2 million. Related:How NIST's Cutback of CVE Handling Impacts Cyber Teams It would be incorrect, though, to infer from those figures that law enforcement caused an 80% drop in phishing activity. Whenever the feds clip major cybercrime rings, the threat actors involved don't just hang up their keyboards and find a job. They scatter. The way Tycoon 2FA associates seem to be scattering is particularly interesting, as it mirrors some much larger trends researchers are observing in the phishing threat landscape. PhaaS Power Politics When it comes to such a behemoth as Tycoon 2FA, "You can't expect one takedown to completely eliminate every aspect of these operations," says Merium Khalid, director of SOC offensive security with Barracuda's office of the chief technology officer (CTO). "The way you want to look at it is: They took down the operations, but the infrastructure, the tactics, the techniques, and the code behind everything is still there." While Tycoon has been licking its wounds, groups like EvilProxy and Sneaky 2FA have stepped into the power vacuum it's left behind. EvilProxy attacks per month rose from just under 3 million to just over 4 million around the time of the takedown, and Sneaky 2FA rose from under 700,000 to nearly 2 million. LOADING... The group that's benefited the most, though, is Tycoon's formerly largest competitor, Mamba 2FA. Mamba was responsible for nearly 8 million attacks per month before Tycoon was punched in the nose. Now it's churning out more than 15 million per month — a nearly 100% surge in mere weeks. Like immigrants to new countries, as the hackers have migrated from one phishing service provider to another, they've taken what they know with them. "The [Tycoon 2FA] tools and the code and the techniques are actually now in the hands of their competitors like Mamba and EvilProxy. So I think we're going to be seeing more sophisticated phishing-as-a-service attacks and techniques out there." Related:FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats Device Code Phishing Surges Selena Larson, senior threat intelligence analyst at Proofpoint, saw it firsthand. "Just yesterday I was poking around at some of the device code phishing activity we're seeing," she recalls over a Zoom interview. In device code phishing, attackers trick victims into handing over access to their accounts using a service's legitimate new-device login flow. "One of the campaigns was using a PDF that had an artifact of a Tycoon URL. I was like, 'Wait a second, is this Tycoon 2FA and EvilTokens?' Potentially, this actor was just reusing PDFs that they had previously used for Tycoon credential phishing to do, now, EvilTokens device code account takeover." Barracuda came across another case of it. They observed a device code phishing campaign that incorporated one of Tycoon 2FA's most unique quirks: motivational-style comments that create noise in its source code. It's no surprise, judging by Proofpoint's latest data. By coincidence or causation, Tycoon 2FA's takedown has overlapped almost exactly with a steep rise in device code phishing. Related:Russia's 'Fancy Bear' APT Continues Its Global Onslaught Larson explains that though it's not new, device code phishing wasn't terribly common even late into last year. "Since November, December of 2025, it's been increasing moderately across the landscape, and over the last three to four weeks, in particular, it went from being still fairly uncommon to being quite commonly observed across the threat landscape. Even just within the last two weeks, we've gone from seeing a handful of easily identifiable device code phishing kits to having a lot more than that." It's not clear exactly how much of Tycoon's user base is moving toward device code, she acknowledges. "But it is, I think, indicative of the explosion of popularity for device code phishing, and these new types of phishing kits incorporating device code phishing into their kits as part of the package that they're selling." For Larson, it's only the next logical step in the history of phishing techniques. "It used to be years and years ago that threat actors would just go for your username and password. And so then multifactor authentication (MFA) was created to block that and disrupt those types of capabilities. So, OK, what do the threat actors do? Well, they make MFA phishing kits to grab the whole chain," she explains. "But now we're at this point where maybe more people are aware that MFA isn't necessarily the best," she adds, thanks to kits like Typhoon 2FA. "Now [the threat actors] are like: 'OK, what's another type of phishing that we could do? OAuth phishing and device code phishing, I think, are the natural progression of where threat actors are going to go." Don't miss the latest Dark Reading Confidential podcast, Security Bosses Are All in on AI: Here's Why,where Reddit CISO Fredrick Lee and Omdia analyst Dave Gruber discuss AI and machine learning in the SOC, how successful deployments have (or haven't) been, and what the future holds for AI security products. Listen now! About the Author Nate Nelson Contributing Writer Nate Nelson is a journalist and scriptwriter. He writes for "Darknet Diaries" — the most popular podcast in cybersecurity — and co-created the former Top 20 tech podcast "Malicious Life." Before joining Dark Reading, he was a reporter at Threatpost. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports CISO Survey 2026: The State of Incident Response Readiness AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications KuppingerCole Business Application Risk Management Leadership Compass 2026 CISO AI Risk Report Access More Research Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning Zero Trust Architecture for Cloud environments: Implementation Roadmap Tips for Managing Cloud Security in a Hybrid Environment? Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up More Webinars You May Also Like THREAT INTELLIGENCE Iran's Cyber-Kinetic War Doctrine Takes Shape by Alexander Culafi MAR 06, 2026 THREAT INTELLIGENCE CISA: Pro-Russia Hacktivists Target US Critical Infrastructure by Elizabeth Montalbano, Contributing Writer DEC 10, 2025 THREAT INTELLIGENCE How Malware Authors Are Incorporating LLMs to Evade Detection by Robert Lemos, Contributing Writer NOV 26, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice VULNERABILITIES & THREATS EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses byRob Wright APR 14, 2026 8 MIN READ СLOUD SECURITY CSA: CISOs Should Prepare for Post-Mythos Exploit Storm byAlexander Culafi APR 13, 2026 6 MIN READ СLOUD SECURITY Navigating the Unique Security Risks of Asia's Digital Supply Chain byAlexander Culafi APR 15, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection LOADING... Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning MON, MAY 11, 2026 AT 1:00PM ET Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Best practices for incident response planning Building a Robust SOC in a Post-AI World Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 18, 2026
    Archived
    Apr 18, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗