Our analysis of Tycoon 2FA infrastructure has revealed significant operational changes, including the platform's coordinated expansion surge in Spanish (.es) domains starting April 7, 2025, and evidence suggesting highly targeted subdomain usage patterns. This blog shares our findings from analyzing 11,343 unique FQDNs (fully qualified domain names) and provides 65 root domain indicators of compromise (IOCs) to help network defenders implement more effective blocking strategies.
Tycoon 2FA is a sophisticated phishing-as-a-service (PhaaS) platform that has been active since August 2023, specializing in adversary-in-the-middle (AiTM) attacks to bypass multi-factor authentication. The platform operates through a "C2 triangle" architecture consisting of three infrastructure components that can be hosted on different (or sometimes the same) FQDNs: phishing landing pages, target check/gateway APIs that return filtering decisions, and credential collection servers. This distributed approach uses ephemeral subdomains across slightly longer-lived root domains.
Individual threat actors handle victim targeting and luring, while the centralized Tycoon infrastructure manages the technical aspects of credential harvesting and session token theft. Rather than hosting phishing infrastructure themselves, attackers simply need to direct victims to specific links that leverage the shared Tycoon platform.
The platform typically employs several attack vectors: compromised web pages hosting "View Document" buttons that redirect to Tycoon infrastructure, malicious attachments containing embedded lures, and direct phishing emails. Once victims reach the Tycoon infrastructure, they encounter pages that often mimic Cloudflare verification screens before presenting fake Microsoft 365 login portals designed to harvest credentials and session cookies.
Tycoon 2FA's infrastructure strategy relies on short-lived, burnable FQDNs (individual subdomains) hosted on longer-lived root domains, creating a two-tier system. Our analysis, based on internal DNS resolver data, suggests this design may facilitate target-specific campaigns, as 99.6% of individual subdomains receive fewer than 10 DNS queries (median: 2 queries), indicating most subdomains serve very limited, potentially individualized purposes rather than broad campaign distribution. The platform continuously evolves its obfuscation techniques to slow down detection and analysis.
While ANY.RUN has previously noted Tycoon 2FA's use of .es domains, our data reveals a coordinated operational surge in .es infrastructure starting April 7, 2025. Our monitoring shows 13 domains simultaneously going live on this date, representing a significant scaling of Spanish TLD (top level domain) operations that has not been previously quantified.
Key observations about the .es infrastructure:
Our analysis confirms that Tycoon 2FA continues refining its evasion methods. We've observed augmentations to publicly documented obfuscation techniques, including:
Analysis of DNS query patterns across our 11,343 unique FQDN dataset reveals compelling evidence that Tycoon 2FA may employ target-specific subdomain generation:
This usage pattern suggests most subdomains are created for specific campaigns or individual targets rather than broad distribution, explaining the platform's massive subdomain generation rates while maintaining operational security through compartmentalization.
Our analysis of 11,343 unique FQDNs across 65 root domains reveals sophisticated operational targeting:
The following table contains 65 root domains we believe are associated with Tycoon 2FA infrastructure. Network defenders should implement wildcard blocking at the root domain level (e.g., *.domain.tld
) to achieve maximum coverage against this threat.
Root Domain |
Lifetime |
First Seen |
Last Seen |
aaoepshsq.es |
Currently Active |
June 2025 |
June 2025 |
eeacukybnpjg.es |
Currently Active |
June 2025 |
June 2025 |
eqpwropc.es |
61-70 days |
April 2025 |
June 2025 |
gkgqfod.es |
61-70 days |
April 2025 |
June 2025 |
grmpimqnat.es |
61-70 days |
April 2025 |
June 2025 |
hukqpeny.es |
51-60 days |
April 2025 |
June 2025 |
igzyhagplqy.es |
Currently Active |
June 2025 |
June 2025 |
jzgonpxuildt.es |
61-70 days |
April 2025 |
June 2025 |
kayatbqdqg.es |
61-70 days |
April 2025 |
June 2025 |
kzvjz.es |
Currently Active |
June 2025 |
June 2025 |
kyuze.es |
Currently Active |
June 2025 |
June 2025 |
onkttyhqjycn.es |
Currently Active |
June 2025 |
June 2025 |
pxihkdtkdqw.es |
Currently Active |
June 2025 |
June 2025 |
qsfajwsg.es |
Currently Active |
June 2025 |
June 2025 |
siferhs.es |
51-60 days |
April 2025 |
June 2025 |
smjaskgdtoyq.es |
61-70 days |
April 2025 |
June 2025 |
tjdneho.es |
51-60 days |
April 2025 |
June 2025 |
tvknzupwbdfg.es |
Currently Active |
June 2025 |
June 2025 |
ugyqwmm.es |
61-70 days |
April 2025 |
June 2025 |
vxdex.es |
61-70 days |
April 2025 |
June 2025 |
wgfnv.es |
61-70 days |
April 2025 |
June 2025 |
xrltbpv.es |
51-60 days |
April 2025 |
June 2025 |
xubyc.es |
51-60 days |
April 2025 |
June 2025 |
yqqeuvuu.es |
51-60 days |
April 2025 |
June 2025 |
zijtrr.es |
61-70 days |
April 2025 |
June 2025 |
aezeib.ru |
6-10 days |
March 2025 |
March 2025 |
aepafrzv.ru |
6-10 days |
February 2025 |
February 2025 |
ajcffp.ru |
6-10 days |
March 2025 |
March 2025 |
aldiwe.ru |
Less than 1 day |
March 2025 |
March 2025 |
aodhgh.ru |
Less than 1 day |
April 2025 |
April 2025 |
biijvi.ru |
11-15 days |
March 2025 |
March 2025 |
bnschb.ru |
61-70 days |
April 2025 |
June 2025 |
br-izeffs.ru |
11-15 days |
February 2025 |
February 2025 |
cjjivd.ru |
61-70 days |
April 2025 |
June 2025 |
cjtahr.ru |
3 days |
April 2025 |
April 2025 |
cuisbp.ru |
11-15 days |
March 2025 |
March 2025 |
djktgj.ru |
11-15 days |
March 2025 |
March 2025 |
drogdordr.ru |
71-80 days |
January 2025 |
April 2025 |
eabnpk.ru |
61-70 days |
April 2025 |
June 2025 |
fukbaf.ru |
1 day |
March 2025 |
March 2025 |
gadyks.ru |
11-15 days |
March 2025 |
March 2025 |
gijbwpyq.ru |
61-70 days |
April 2025 |
June 2025 |
glatrcisfx.ru |
Currently Active |
April 2025 |
June 2025 |
gqzxtn.ru |
11-15 days |
March 2025 |
March 2025 |
hjxjov.ru |
11-15 days |
March 2025 |
March 2025 |
hxnywi.ru |
6-10 days |
March 2025 |
March 2025 |
jaamzjd.ru |
5 days |
February 2025 |
March 2025 |
kdyukk.ru |
6-10 days |
March 2025 |
April 2025 |
kqnsgn.ru |
1 day |
March 2025 |
March 2025 |
lnlwyw.ru |
1 day |
March 2025 |
March 2025 |
mlniojjrwm.ru |
61-70 days |
April 2025 |
June 2025 |
mtytwr.ru |
Less than 1 day |
April 2025 |
April 2025 |
nmpjkg.ru |
6-10 days |
March 2025 |
March 2025 |
purpxqha.ru |
61-70 days |
April 2025 |
June 2025 |
revishbos.ru |
51-60 days |
January 2025 |
March 2025 |
szsnqp.ru |
16-20 days |
March 2025 |
April 2025 |
tjezyf.ru |
11-15 days |
March 2025 |
March 2025 |
tljepz.ru |
Less than 1 day |
March 2025 |
March 2025 |
udxbjl.ru |
Less than 1 day |
March 2025 |
March 2025 |
ujoybi.ru |
6-10 days |
March 2025 |
March 2025 |
v-bnhatn.ru |
26-30 days |
February 2025 |
March 2025 |
virbutr.ru |
4 days |
February 2025 |
February 2025 |
zpimlc.ru |
61-70 days |
April 2025 |
June 2025 |
zqrhhm.ru |
61-70 days |
April 2025 |
June 2025 |
zvaznx.ru |
11-15 days |
March 2025 |
March 2025 |
This research builds upon extensive community analysis of the Tycoon 2FA platform:
The coordinated expansion of .es infrastructure and the target-specific subdomain operational model demonstrate Tycoon 2FA's continued evolution as a sophisticated PhaaS threat. The platform's ability to generate thousands of specialized subdomains for individualized targeting, combined with persistent root domain infrastructure, creates a formidable challenge for traditional security approaches. By understanding these operational patterns and implementing root domain-level controls, defenders can achieve significantly better coverage against this advanced platform.