DNS Filtering Blog: Latest Trends and Updates | DNSFilter

Tycoon 2FA Infrastructure Expansion: A DNS Perspective | DNSFilter

Written by Will Strafach | Jul 8, 2025 10:00:00 AM


Our analysis of Tycoon 2FA infrastructure has revealed significant operational changes, including the platform's coordinated expansion surge in Spanish (.es) domains starting April 7, 2025, and evidence suggesting highly targeted subdomain usage patterns. This blog shares our findings from analyzing 11,343 unique FQDNs (fully qualified domain names) and provides 65 root domain indicators of compromise (IOCs) to help network defenders implement more effective blocking strategies.

Background

Tycoon 2FA is a sophisticated phishing-as-a-service (PhaaS) platform that has been active since August 2023, specializing in adversary-in-the-middle (AiTM) attacks to bypass multi-factor authentication. The platform operates through a "C2 triangle" architecture consisting of three infrastructure components that can be hosted on different (or sometimes the same) FQDNs: phishing landing pages, target check/gateway APIs that return filtering decisions, and credential collection servers. This distributed approach uses ephemeral subdomains across slightly longer-lived root domains.

Individual threat actors handle victim targeting and luring, while the centralized Tycoon infrastructure manages the technical aspects of credential harvesting and session token theft. Rather than hosting phishing infrastructure themselves, attackers simply need to direct victims to specific links that leverage the shared Tycoon platform.

The platform typically employs several attack vectors: compromised web pages hosting "View Document" buttons that redirect to Tycoon infrastructure, malicious attachments containing embedded lures, and direct phishing emails. Once victims reach the Tycoon infrastructure, they encounter pages that often mimic Cloudflare verification screens before presenting fake Microsoft 365 login portals designed to harvest credentials and session cookies.

— This picture shows the differences between a real and fake Microsoft login page, but sometimes there are no differences to spot. Checking the domain before entering credentials and having strict web filtering are still important to reduce compromise.

Tycoon 2FA's infrastructure strategy relies on short-lived, burnable FQDNs (individual subdomains) hosted on longer-lived root domains, creating a two-tier system. Our analysis, based on internal DNS resolver data, suggests this design may facilitate target-specific campaigns, as 99.6% of individual subdomains receive fewer than 10 DNS queries (median: 2 queries), indicating most subdomains serve very limited, potentially individualized purposes rather than broad campaign distribution. The platform continuously evolves its obfuscation techniques to slow down detection and analysis.

Novel Findings

Coordinated Expansion into Spanish (.es) Domains

While ANY.RUN has previously noted Tycoon 2FA's use of .es domains, our data reveals a coordinated operational surge in .es infrastructure starting April 7, 2025. Our monitoring shows 13 domains simultaneously going live on this date, representing a significant scaling of Spanish TLD (top level domain) operations that has not been previously quantified.

Key observations about the .es infrastructure:

  • Coordinated deployment: 13 domains went live simultaneously on April 7, 2025

  • Higher subdomain generation: .es domains demonstrate significantly more intensive subdomain generation compared to .ru infrastructure

  • Sustained operations: Multiple .es domains remain currently active with 18 domains showing activity through June 2025

Enhanced Obfuscation Techniques

Our analysis confirms that Tycoon 2FA continues refining its evasion methods. We've observed augmentations to publicly documented obfuscation techniques, including:

  • Implementation of Base91 encoding alongside traditional Base64

  • Nested encoding schemes going 1-2 layers deep within encrypted blobs

  • These changes appear designed to defeat automated decryption scripts rather than represent fundamental shifts in obfuscation methodology

Evidence of Target-Specific Subdomain Operations

Analysis of DNS query patterns across our 11,343 unique FQDN dataset reveals compelling evidence that Tycoon 2FA may employ target-specific subdomain generation:

  • 99.6% of subdomains received fewer than 10 total DNS queries
  • 94.3% received fewer than 5 queries
  • Median query count: 2 queries per subdomain

This usage pattern suggests most subdomains are created for specific campaigns or individual targets rather than broad distribution, explaining the platform's massive subdomain generation rates while maintaining operational security through compartmentalization.

Target-Specific Subdomain Strategy

Our analysis of 11,343 unique FQDNs across 65 root domains reveals sophisticated operational targeting:

  • Root domain persistence: Average operational lifetime of 29.2 days

  • FQDN specialization: 99.6% of individual subdomains receive fewer than 10 DNS queries in their lifespan (median: 2 queries)

  • Campaign specificity: Low query volumes suggest subdomains may be generated for specific targets or campaigns

  • Generation intensity: Average of 174 unique subdomains per root domain, with the most active domain hosting 619 subdomains

Indicators of Compromise

The following table contains 65 root domains we believe are associated with Tycoon 2FA infrastructure. Network defenders should implement wildcard blocking at the root domain level (e.g., *.domain.tld) to achieve maximum coverage against this threat.

Root Domain

Lifetime

First Seen

Last Seen

aaoepshsq.es

Currently Active

June 2025

June 2025

eeacukybnpjg.es

Currently Active

June 2025

June 2025

eqpwropc.es

61-70 days

April 2025

June 2025

gkgqfod.es

61-70 days

April 2025

June 2025

grmpimqnat.es

61-70 days

April 2025

June 2025

hukqpeny.es

51-60 days

April 2025

June 2025

igzyhagplqy.es

Currently Active

June 2025

June 2025

jzgonpxuildt.es

61-70 days

April 2025

June 2025

kayatbqdqg.es

61-70 days

April 2025

June 2025

kzvjz.es

Currently Active

June 2025

June 2025

kyuze.es

Currently Active

June 2025

June 2025

onkttyhqjycn.es

Currently Active

June 2025

June 2025

pxihkdtkdqw.es

Currently Active

June 2025

June 2025

qsfajwsg.es

Currently Active

June 2025

June 2025

siferhs.es

51-60 days

April 2025

June 2025

smjaskgdtoyq.es

61-70 days

April 2025

June 2025

tjdneho.es

51-60 days

April 2025

June 2025

tvknzupwbdfg.es

Currently Active

June 2025

June 2025

ugyqwmm.es

61-70 days

April 2025

June 2025

vxdex.es

61-70 days

April 2025

June 2025

wgfnv.es

61-70 days

April 2025

June 2025

xrltbpv.es

51-60 days

April 2025

June 2025

xubyc.es

51-60 days

April 2025

June 2025

yqqeuvuu.es

51-60 days

April 2025

June 2025

zijtrr.es

61-70 days

April 2025

June 2025

aezeib.ru

6-10 days

March 2025

March 2025

aepafrzv.ru

6-10 days

February 2025

February 2025

ajcffp.ru

6-10 days

March 2025

March 2025

aldiwe.ru

Less than 1 day

March 2025

March 2025

aodhgh.ru

Less than 1 day

April 2025

April 2025

biijvi.ru

11-15 days

March 2025

March 2025

bnschb.ru

61-70 days

April 2025

June 2025

br-izeffs.ru

11-15 days

February 2025

February 2025

cjjivd.ru

61-70 days

April 2025

June 2025

cjtahr.ru

3 days

April 2025

April 2025

cuisbp.ru

11-15 days

March 2025

March 2025

djktgj.ru

11-15 days

March 2025

March 2025

drogdordr.ru

71-80 days

January 2025

April 2025

eabnpk.ru

61-70 days

April 2025

June 2025

fukbaf.ru

1 day

March 2025

March 2025

gadyks.ru

11-15 days

March 2025

March 2025

gijbwpyq.ru

61-70 days

April 2025

June 2025

glatrcisfx.ru

Currently Active

April 2025

June 2025

gqzxtn.ru

11-15 days

March 2025

March 2025

hjxjov.ru

11-15 days

March 2025

March 2025

hxnywi.ru

6-10 days

March 2025

March 2025

jaamzjd.ru

5 days

February 2025

March 2025

kdyukk.ru

6-10 days

March 2025

April 2025

kqnsgn.ru

1 day

March 2025

March 2025

lnlwyw.ru

1 day

March 2025

March 2025

mlniojjrwm.ru

61-70 days

April 2025

June 2025

mtytwr.ru

Less than 1 day

April 2025

April 2025

nmpjkg.ru

6-10 days

March 2025

March 2025

purpxqha.ru

61-70 days

April 2025

June 2025

revishbos.ru

51-60 days

January 2025

March 2025

szsnqp.ru

16-20 days

March 2025

April 2025

tjezyf.ru

11-15 days

March 2025

March 2025

tljepz.ru

Less than 1 day

March 2025

March 2025

udxbjl.ru

Less than 1 day

March 2025

March 2025

ujoybi.ru

6-10 days

March 2025

March 2025

v-bnhatn.ru

26-30 days

February 2025

March 2025

virbutr.ru

4 days

February 2025

February 2025

zpimlc.ru

61-70 days

April 2025

June 2025

zqrhhm.ru

61-70 days

April 2025

June 2025

zvaznx.ru

11-15 days

March 2025

March 2025


Defensive Recommendations

  1. Implement wildcard domain blocking for all 65 root domains listed above

  2. Monitor for subdomain pattern matching: Look for 4-6 character randomized subdomains on these domains

References and Prior Work

This research builds upon extensive community analysis of the Tycoon 2FA platform:

The coordinated expansion of .es infrastructure and the target-specific subdomain operational model demonstrate Tycoon 2FA's continued evolution as a sophisticated PhaaS threat. The platform's ability to generate thousands of specialized subdomains for individualized targeting, combined with persistent root domain infrastructure, creates a formidable challenge for traditional security approaches. By understanding these operational patterns and implementing root domain-level controls, defenders can achieve significantly better coverage against this advanced platform.