{"id":19485,"date":"2026-04-13T10:25:08","date_gmt":"2026-04-13T10:25:08","guid":{"rendered":"https:\/\/www.ignition-technology.com\/benelux\/?p=19485"},"modified":"2026-04-13T10:25:08","modified_gmt":"2026-04-13T10:25:08","slug":"tycoon2fa-phishing-as-a-service-platform-persists-following-takedown","status":"publish","type":"post","link":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/","title":{"rendered":"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown"},"content":{"rendered":"<div style=\"max-width: 800px;margin: 0 auto;line-height: 1.7;font-size: 16px\">\n<p>On March 4, 2026, Europol\u00a0<a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/global-phishing-service-platform-taken-down-in-coordinated-public-private-action?mtm_campaign=&amp;utm_medium=soc&amp;utm_source=lnkd&amp;utm_term=spklr&amp;utm_content=19955083759&amp;utm_campaign=threat+intel&amp;utm_activation=content%3A+crowdstrike+blog\" target=\"_blank\" rel=\"noopener noreferrer\" data-tracked=\"true\">announced<\/a>\u00a0the technical disruption of\u00a0Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that enabled cybercriminals to bypass multifactor authentication (MFA) and compromise email accounts. Law enforcement authorities from six countries worked with industry partners to seize 330 domains that formed the platform\u2019s core infrastructure.<\/p>\n<p>Infrastructure takedowns are a challenging and important aspect of adversary disruption and a centerpiece of law enforcement and private sector cooperation in cybersecurity. In situations where direct physical enforcement actions such as arrests are infeasible, disrupting bad actors&#8217; operational means can often be the most efficacious and direct way to impose costs on criminals who otherwise act with relative impunity. Nonetheless, law enforcement bodies and their industry partners often go into these technically complicated efforts knowing full well that adversaries are resilient and will likely ultimately overcome or circumvent technical disruptions and reemerge as threats once again.<\/p>\n<p>CrowdStrike applauds Europol and its partners in their disruption efforts against\u00a0Tycoon2FA. CrowdStrike has often joined law enforcement partners in conducting similar disruption efforts and will continue to do so in the future. As a part of this collaborative spirit, CrowdStrike also stands ready to help provide visibility into the efficacy of disruption operations and help provide &#8220;long-tail support&#8221; to its customers and the public when criminals attempt to reconstitute their infrastructure in the wake of disruptions.<\/p>\n<p>Since the date of the Tycoon2FA takedown, the CrowdStrike Falcon\u00ae Complete Next-Gen MDR team and CrowdStrike Counter Adversary Operations team observed a short-term decrease in the volume of Tycoon2FA campaign activity; however, the volume of cloud compromises has since increased to levels previously observed by Falcon Complete. This resumed campaign volume &#8211; and the continuation of previously observed Tycoon2FA tactics, techniques, and procedures (TTPs) &#8211; suggests the actors responsible for the PhaaS are likely to remain active in the threat landscape in the short to medium term and warrant continued vigilance by defenders.<\/p>\n<p>Tycoon2FA\u00a0is a clear example of how today&#8217;s adversaries operate; they are highly adaptive, technically capable, and persistent in pursuing their objectives. Even as the threat landscape shifts, actors behind platforms like these continue to evolve their TTPs and find ways to maintain pressure on defenders. Staying ahead of that persistence requires continuous visibility across the full attack surface, the ability to correlate signals across domains in real time, and the expertise to act on them decisively. The AI-native CrowdStrike Falcon\u00ae platform and the expert defenders in Counter Adversary Operations and Falcon Complete give organizations the speed and depth of coverage needed to detect, disrupt, and respond before adversaries achieve their objectives.<\/p>\n<hr style=\"margin: 40px 0\" \/>\n<h2>Impact of the Disruption<\/h2>\n<p>Tycoon2FA\u00a0began its operations in 2023 and provided a subscription-based toolkit that intercepted live authentication sessions using adversary-in-the-middle (AITM) techniques. In mid-2025, the platform was responsible for 62% of all phishing attempts blocked by\u00a0<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2026\/03\/04\/how-a-global-coalition-disrupted-tycoon\/?utm_medium=soc&amp;utm_source=lnkd&amp;utm_term=spklr&amp;utm_content=19955083759&amp;utm_campaign=threat+intel&amp;utm_activation=content%3A+crowdstrike+blog\" target=\"_blank\" rel=\"noopener noreferrer\" data-tracked=\"true\">Microsoft<\/a>;\u00a0Tycoon2FA\u00a0purportedly generated more than 30 million malicious emails in a single month. Given this prominence, the attempt at disrupting the tool was notable as an effort by law enforcement to disrupt a key component of the PhaaS ecosystem.<\/p>\n<p>The March 4th\u00a0Tycoon2FA\u00a0disruption was the result of coordinated action between Europol\u2019s European Cybercrime Centre (EC3) and law enforcement authorities in Latvia, Lithuania, Portugal, Poland, Spain, and the United Kingdom, alongside industry partners. The coordinated effort targeted 330 domains comprising the platform\u2019s infrastructure. Additional actions against the individuals related to the PhaaS operation have not yet been reported.<\/p>\n<p>This\u00a0Tycoon2FA\u00a0takedown follows law enforcement\u2019s September 2025 targeting of\u00a0RaccoonO365, which operated as\u00a0Tycoon2FA\u2019s primary competitor and also enabled threat actors (with minimal technical expertise) to conduct sophisticated phishing campaigns.<\/p>\n<p>Falcon Complete observed numerous Tycoon2FA incidents in 2024, 2025, and 2026, with TTPs that include:<\/p>\n<ul>\n<li data-tracked=\"true\">Using phishing emails to direct victims to\u00a0Tycoon2FA\u00a0CAPTCHA pages<\/li>\n<li data-tracked=\"true\">Stealing victims\u2019 session cookies upon CAPTCHA validation<\/li>\n<li data-tracked=\"true\">Extracting victims\u2019 email addresses via a JavaScript (JS) file<\/li>\n<li data-tracked=\"true\">Populating fake Microsoft 365 or Google login pages, which are hosted on a\u00a0Tycoon2FA\u00a0domain<\/li>\n<li data-tracked=\"true\">Proxying victims\u2019 credentials to a legitimate Microsoft 365 cloud account via an obfuscated JS file<\/li>\n<li data-tracked=\"true\">Authenticating to the victim\u2019s cloud environment using the stolen cookies and credentials<\/li>\n<\/ul>\n<hr style=\"margin: 40px 0\" \/>\n<h2>How the Platform Operated<\/h2>\n<p>Tycoon2FA provided subscribers with a web-based control panel to configure phishing campaigns. This included templates, redirect chains, and credential harvesting mechanisms.<\/p>\n<p><strong>Core capabilities included:<\/strong><\/p>\n<ul style=\"padding-left: 20px\">\n<li>Custom phishing templates mimicking trusted login pages<\/li>\n<li>Session cookie interception during authentication<\/li>\n<li>Real-time credential relay to legitimate services<\/li>\n<li>Campaign tracking dashboards for attackers<\/li>\n<li>Automated infrastructure rotation to evade detection<\/li>\n<\/ul>\n<p>Attackers could configure phishing flows that mimicked legitimate login experiences, including CAPTCHA challenges and MFA prompts, increasing the likelihood of success.<\/p>\n<div style=\"margin: 30px 0;text-align: center\">\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19492 alignnone\" style=\"text-align: start\" src=\"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Picture1-500x390.png\" alt=\"\" width=\"529\" height=\"413\" srcset=\"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Picture1-500x390.png 500w, https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Picture1-300x234.png 300w, https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Picture1-96x75.png 96w, https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Picture1-480x374.png 480w, https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Picture1.png 523w\" sizes=\"auto, (max-width:767px) 480px, 529px\" \/><\/p>\n<p style=\"font-size: 14px;color: #666\">Example phishing page and authentication flow.<\/p>\n<\/div>\n<hr style=\"margin: 40px 0\" \/>\n<div style=\"max-width: 800px;margin: 0 auto;line-height: 1.7;font-size: 16px\">\n<h2>Understanding Tycoon2FA<\/h2>\n<\/div>\n<div style=\"max-width: 800px;margin: 0 auto;line-height: 1.7;font-size: 16px\">\n<p>First observed in 2023, Tycoon2FA rapidly became a dominant phishing-as-a-service platform, lowering the barrier to entry for cybercriminals by providing ready-to-use phishing infrastructure.<\/p>\n<p>The platform enabled adversary-in-the-middle (AiTM) attacks, allowing attackers to intercept authentication flows in real time and bypass MFA protections.<\/p>\n<p>Campaigns using Tycoon2FA targeted a wide range of industries including finance, healthcare, education, and government, often impersonating trusted services such as Microsoft 365, Gmail, and cloud platforms.<\/p>\n<\/div>\n<hr style=\"margin: 40px 0\" \/>\n<h2>Defense Evasion Techniques<\/h2>\n<p>Tycoon2FA stood out for its advanced evasion capabilities. It continuously adapted its infrastructure and techniques to avoid detection.<\/p>\n<ul style=\"padding-left: 20px\">\n<li>Dynamic CAPTCHA challenges to block automated analysis<\/li>\n<li>Heavy JavaScript obfuscation and randomized code<\/li>\n<li>Browser fingerprinting and geolocation filtering<\/li>\n<li>Detection of security tools and sandbox environments<\/li>\n<li>Multi-layer redirect chains using legitimate services<\/li>\n<\/ul>\n<p>These techniques made traditional detection methods less effective, requiring more advanced behavioral and real-time analysis approaches.<\/p>\n<\/div>\n<div style=\"max-width: 800px;margin: 0 auto;line-height: 1.7;font-size: 16px\">\n<hr style=\"margin: 40px 0\" \/>\n<h2>Resurgence and Ongoing Threat<\/h2>\n<p>Following the disruption, Tycoon2FA activity dropped briefly but returned to previous levels within days. Attack techniques and infrastructure patterns remained largely unchanged.<\/p>\n<p>Threat actors continued to leverage:<\/p>\n<ul style=\"padding-left: 20px\">\n<li>Business email compromise (BEC) campaigns<\/li>\n<li>Cloud account takeovers<\/li>\n<li>Malicious redirect chains<\/li>\n<li>Compromised legitimate services<\/li>\n<\/ul>\n<p>This rapid recovery highlights the resilience and adaptability of modern phishing ecosystems.<\/p>\n<hr style=\"margin: 40px 0\" \/>\n<h2>Outlook<\/h2>\n<p>While\u00a0Tycoon2FA\u00a0continues to operate after the temporary disruption of its infrastructure by the coordinated industry and law enforcement operation, CrowdStrike nonetheless applauds the efforts by Europol and its partners to disrupt this threat actor&#8217;s operations.<\/p>\n<p>When cross-domain disruption avenues are unavailable to law enforcement bodies, infrastructure disruption &#8211; even if only temporary &#8211; can serve to frustrate, slow down, and confuse adversaries. As recovery from such disruptions occurs, CrowdStrike and other industry partners must stand ready to orient themselves to the evolving nature of these threats.<\/p>\n<p>Falcon Complete continues to detect and prevent threats such as those described in this blog at the phishing, DNS resolution, cloud authentication, and BEC Exchange inbox level through CrowdStrike Falcon\u00ae Next-Gen SIEM and the Falcon platform. Threat actors like those who operate\u00a0Tycoon2FA\u00a0likely readily adapt to disruptions by developing rapid recovery mechanisms and leveraging jurisdictional safe havens to maintain operations. It is also highly likely that the operators will continue to evolve TTPs to try to evade detection and defenders, including the use of new ASNs. Customers of the\u00a0Tycoon2FA\u00a0phish kit continue to transmit emails with successful compromises, which requires enterprises to continue to employ defense-in-depth approaches to combat AITM PhaaS actors in the threat landscape.<\/p>\n<p>Staying ahead of adversaries requires continuous visibility across the full attack surface, real-time signal correlation across domains, and the expertise to act decisively. In the face of resilient adversaries who work to mitigate the impacts of disruption efforts, CrowdStrike combines its AI-native platform with expert human defenders in Counter Adversary Operations and Falcon Complete to empower organizations to stay ahead of threats, effectively disrupting and neutralizing attacks before adversaries can achieve their objectives.<\/p>\n<hr style=\"margin: 40px 0\" \/>\n<h2>Additional Resources<\/h2>\n<ul>\n<li>Visit the\u00a0<a href=\"https:\/\/www.crowdstrike.com\/en-us\/platform\/threat-intelligence\/?utm_medium=soc&amp;utm_source=lnkd&amp;utm_term=spklr&amp;utm_content=19955083759&amp;utm_campaign=threat+intel&amp;utm_activation=content%3A+crowdstrike+blog\">Counter Adversary Operations<\/a>\u00a0webpage to learn about CrowdStrike\u2019s threat intelligence and hunting solutions.<\/li>\n<li>Learn how\u00a0<a href=\"https:\/\/www.crowdstrike.com\/en-us\/services\/falcon-complete-next-gen-mdr\/?utm_medium=soc&amp;utm_source=lnkd&amp;utm_term=spklr&amp;utm_content=19955083759&amp;utm_campaign=threat+intel&amp;utm_activation=content%3A+crowdstrike+blog\">Falcon Complete<\/a>\u00a0helps stop breaches faster.<\/li>\n<li>Read the\u00a0<a href=\"https:\/\/www.crowdstrike.com\/en-us\/global-threat-report\/?utm_medium=soc&amp;utm_source=lnkd&amp;utm_term=spklr&amp;utm_content=19955083759&amp;utm_campaign=threat+intel&amp;utm_activation=content%3A+crowdstrike+blog\">CrowdStrike 2026 Global Threat Report<\/a>\u00a0for the latest insights on adversaries, tradecraft, and activity.<\/li>\n<li style=\"list-style-type: none\"><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Contact:<\/strong><br \/>\n<a href=\"mailto:sales-bnl@ignition-technology.eu\">sales-bnl@ignition-technology.eu<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>On March 4, 2026, Europol\u00a0announced\u00a0the technical disruption of\u00a0Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that enabled cybercriminals to bypass multifactor authentication<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":24,"featured_media":19490,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[10,78,1],"tags":[],"class_list":["post-19485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","category-crowdstrike-blogs","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown - Ignition Technology Benelux<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown\" \/>\n<meta property=\"og:description\" content=\"On March 4, 2026, Europol\u00a0announced\u00a0the technical disruption of\u00a0Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that enabled cybercriminals to bypass multifactor authentication [\u2026]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology Benelux\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-13T10:25:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Blog-Tycoon.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1060\" \/>\n\t<meta property=\"og:image:height\" content=\"698\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ignition Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ignition Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/\"},\"author\":{\"name\":\"Ignition Technology\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/person\\\/99b9fb8dc28b4385c22b498f176f5f91\"},\"headline\":\"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown\",\"datePublished\":\"2026-04-13T10:25:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/\"},\"wordCount\":1307,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2026\\\/03\\\/Blog-Tycoon.png\",\"articleSection\":[\"Blogs\",\"CrowdStrike Blogs\",\"Uncategorized\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/\",\"name\":\"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown - Ignition Technology Benelux\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2026\\\/03\\\/Blog-Tycoon.png\",\"datePublished\":\"2026-04-13T10:25:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2026\\\/03\\\/Blog-Tycoon.png\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2026\\\/03\\\/Blog-Tycoon.png\",\"width\":1060,\"height\":698},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/person\\\/99b9fb8dc28b4385c22b498f176f5f91\",\"name\":\"Ignition Technology\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/51af47896fae05e3fb43cdca232c231d368e81e6ad177de174a0dc829bebe2d0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/51af47896fae05e3fb43cdca232c231d368e81e6ad177de174a0dc829bebe2d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/51af47896fae05e3fb43cdca232c231d368e81e6ad177de174a0dc829bebe2d0?s=96&d=mm&r=g\",\"caption\":\"Ignition Technology\"},\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/author\\\/tomchamberlain\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown - Ignition Technology Benelux","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/","og_locale":"en_GB","og_type":"article","og_title":"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown","og_description":"On March 4, 2026, Europol\u00a0announced\u00a0the technical disruption of\u00a0Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that enabled cybercriminals to bypass multifactor authentication [\u2026]","og_url":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/","og_site_name":"Ignition Technology Benelux","article_published_time":"2026-04-13T10:25:08+00:00","og_image":[{"width":1060,"height":698,"url":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Blog-Tycoon.png","type":"image\/png"}],"author":"Ignition Technology","twitter_card":"summary_large_image","twitter_creator":"@ignition_tech","twitter_site":"@ignition_tech","twitter_misc":{"Written by":"Ignition Technology","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/#article","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/"},"author":{"name":"Ignition Technology","@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/person\/99b9fb8dc28b4385c22b498f176f5f91"},"headline":"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown","datePublished":"2026-04-13T10:25:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/"},"wordCount":1307,"commentCount":0,"publisher":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#organization"},"image":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Blog-Tycoon.png","articleSection":["Blogs","CrowdStrike Blogs","Uncategorized"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/","url":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/","name":"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown - Ignition Technology Benelux","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Blog-Tycoon.png","datePublished":"2026-04-13T10:25:08+00:00","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Blog-Tycoon.png","contentUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2026\/03\/Blog-Tycoon.png","width":1060,"height":698},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/benelux\/"},{"@type":"ListItem","position":2,"name":"Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/benelux\/#website","url":"https:\/\/www.ignition-technology.com\/benelux\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/benelux\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/benelux\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/benelux\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]},{"@type":"Person","@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/person\/99b9fb8dc28b4385c22b498f176f5f91","name":"Ignition Technology","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/51af47896fae05e3fb43cdca232c231d368e81e6ad177de174a0dc829bebe2d0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/51af47896fae05e3fb43cdca232c231d368e81e6ad177de174a0dc829bebe2d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51af47896fae05e3fb43cdca232c231d368e81e6ad177de174a0dc829bebe2d0?s=96&d=mm&r=g","caption":"Ignition Technology"},"url":"https:\/\/www.ignition-technology.com\/benelux\/blog\/author\/tomchamberlain\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/posts\/19485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/comments?post=19485"}],"version-history":[{"count":10,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/posts\/19485\/revisions"}],"predecessor-version":[{"id":19502,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/posts\/19485\/revisions\/19502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/media\/19490"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/media?parent=19485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/categories?post=19485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/tags?post=19485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}