Protect Yourself: Tycoon2FA Group Attacking Microsoft 365 Users with Phishing Scams

Background

Recently, security experts have discovered a wave of targeted phishing campaigns aimed at Microsoft 365 users. These campaigns are conducted by Tycoon2FA, a notorious threat actor specializing in phishing-as-a-service (PhaaS). The main goal of these campaigns is to steal user credentials to hijack accounts.

Phishing emails impersonate official Microsoft notifications, such as security alerts or multi-factor authentication (2FA) requests, to create a sense of urgency and lure users into clicking on fake links.

Who is Tycoon2FA?

Tycoon2FA is a well-known cybercriminal group specializing in Phishing-as-a-Service (PhaaS). They not only carry out attacks themselves but also develop and provide phishing tools and support services to other attackers. This is akin to an "outsourcing service" that enables others to easily organize phishing campaigns, particularly targeting users of popular cloud platforms like Microsoft 365.

A notable aspect of Tycoon2FA is their sophistication in updating and enhancing attack techniques. They not only use traditional methods but also apply new tricks, such as creating malformed URLs or designing complex redirect chains to deceive even the most advanced security systems. These tactics help them easily bypass email and browser security layers that many organizations rely on.

Another noteworthy point is that Tycoon2FA leverages legitimate cloud infrastructure like Microsoft Azure, Cloudflare Workers, or Google DoubleClick to host and distribute phishing content. This not only increases credibility with victims but also makes it extremely difficult for security teams to detect and remove fake pages.

The group also frequently spams numerous fake 2FA requests to collect login information, a highly effective method as many organizations are increasingly using 2FA to protect accounts.

Tycoon2FA exemplifies the growing trend of cybercriminal groups using professional, sophisticated, and systematic phishing service models. They are not just attackers but also providers of tools and tactics for the cybercriminal community, making the security battle increasingly challenging.

Technical Analysis

Below are some sophisticated techniques used by criminal groups to conduct phishing activities:

Malformed URLs Technique

The attackers use URLs with backslashes instead of the standard forward slashes, for example, https:\\ instead of https://. This is a deliberate tactic to create "malformed URLs" that regular email security filters often overlook or deprioritize.

However, modern browsers can automatically process and convert these URLs to the standard form, leading users to sophisticated phishing sites. Thus, this method creates a blind spot in email security systems, helping attackers avoid detection and blocking.

Blob URI Technique to Avoid Detection

Another advanced technique recently discovered is the exploitation of Blob URI (Uniform Resource Identifier) — a type of address created by the browser to reference local data in the browser's memory, such as temporary image, audio, or video files.

In phishing campaigns, instead of directly leading to a malicious website on the internet (easily detected by security systems), the email directs users to a legitimate intermediary page, such as onedrive.live.com. This intermediary page then redirects users to an HTML page controlled by the attacker, which creates a Blob URI containing the entire phishing page content right in the victim's browser memory.

Phishing Campaign

Figure 1. A blob URI page impersonating the OneDrive login page

The special feature is that Blob URI only exists locally in the browser, cannot be accessed or scanned remotely by conventional security tools. This makes detecting phishing content very difficult, as automated analysis tools or email scanning software cannot preview the content of a Blob URI. Users will see a fake login page very similar to Microsoft or OneDrive, easily deceived into entering login information.

Phishing Campaign

Figure 2. Infection chain of Blob URI phishing attack

Using Legitimate Cloud Platforms as "Disposable Infrastructure"

Phishing pages are often hosted on reputable cloud platforms like Microsoft Azure, Cloudflare Workers, or Google DoubleClick. Leveraging these legitimate services makes detection and removal much more difficult.

Complex Redirect Chains and Trusted Service Emulation

Phishing emails often direct users to legitimate intermediary pages to avoid being flagged by security systems. From there, users are redirected to HTML pages controlled by the attacker, mimicking the login pages of Microsoft 365 or OneDrive.

Using Fake Domains

The attack infrastructure uses domains and subdomains very similar to legitimate services, increasing the persuasiveness and success rate of social engineering techniques.

IOCs Related to Tycoon2FA Campaign

IOC URLDescription
hxxps[://]microsftmailonlinenyukmvdx2t[.]lgotsna[.]es/Typo-squatted domain targeting M365 users
hxxps[://]googleads[.]g[.]doubleclick[.]net/pcs/click?adurl=%68%74%74%70%73%3A%2F%2F%34[…]%6E%65%74#Redirect via encoded ad link
hxxps[://]783784387348438743-fkhghccdfzc8e8cd[.]z02[.]azurefd[.]net/Azure-hosted phishing page
hxxps[://]4839794398349343-g4eydqdkguhcdvgs[.]z02[.]azurefd[.]netAzure-hosted credential harvesting site
hxxps[://]sdnxk0t5-q[.]alt-bq-4o27qr9a[.]workers[.]devCloudflare Workers disposable phishing
hxxps[://]9kp6wgtaqr[.]cloudflareemail2109399[.]workers[.]devCloudflare Workers disposable phishing

Recommendations

FPT Threat Intelligence recommends organizations and individuals take several measures to prevent this particularly dangerous attack campaign:

  • Update and Upgrade Email Security Systems: Organizations using Microsoft 365 should update email filters to detect and handle malformed URLs, as well as complex redirect chains commonly used in modern phishing campaigns.

  • Enhance Browser Protection: Implement mechanisms to block access to newly discovered malicious domains and alert users about suspicious pages.

  • Raise User Awareness: Train users to recognize phishing emails, especially those with unusual 2FA requests or security alerts; guide them to verify the legitimacy of URLs before entering login information.

  • Behavior Analysis and AI Application: Use user behavior analysis tools and AI to early detect unusual signs in email interactions and web access.

  • Monitor and Handle Attack Infrastructure: Strengthen monitoring of domains and cloud platforms exploited to host phishing content to take timely preventive measures.

References

0
Subscribe to my newsletter

Read articles from Tran Hoang Phong directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Tran Hoang Phong
Tran Hoang Phong

Just a SOC Analyst ^^