Case 06 — Tycoon 2FA / EvilProxy AiTM Phishing
Sources: Proofpoint EvilProxy series (2023 onward), Mandiant Tycoon 2FA (2024), Sekoia.io (2024-Q4), Microsoft Threat Intelligence.
Background
AiTM (Adversary-in-the-Middle) phishing is the most efficient industrialized way to bypass MFA today. Attackers run reverse proxies (Tycoon 2FA, EvilProxy, Mamba 2FA, Greatness, Strox) that forward credentials and MFA codes in real time to the genuine Microsoft 365 or Google Workspace login. After the victim completes MFA, the proxy keeps the returned session cookie. The attacker injects the cookie into their own browser and gains full account access without ever needing to redo MFA.
Since 2024, Tycoon 2FA hosts thousands of new phishing domains every week. Subscriptions cost $200-300, dramatically lowering the bar for entry.
Email indicators
- Subjects: "Voicemail received", "DocuSign: Please review", "Microsoft Teams: New message", "Shared file: Quarterly Report"
- Multi-hop redirect chain: email → URL shortener / Cloudflare Worker → Turnstile → AiTM domain
- AiTM domain naming: lookalike subdomains such as
login-microsoftonline.<random>.comormfa-verify.<workers.dev> - Domain age usually under 7 days
- TLS via Let's Encrypt — fully valid certificate
Animated walkthrough
Tycoon 2FA / EvilProxy AiTM phishing
- 1AttackerBuy a Tycoon 2FA subscription
- 2AttackerSend voicemail / document-share phishing email
- 3VictimClick link, see a Microsoft login page
- 4VictimEnter credentials
- 5AttackerProxy forwards in real time to real Microsoft
- 6VictimComplete MFA
- 7AttackerSteal session cookie and inject into attacker browser
- 8VigilyxVigilyx blocks at the email layerVigilyx detectslink_scan detects shortener-plus-Worker hops, landing_page_scan identifies AiTM proxy fingerprints, intel matches known Tycoon infrastructure, content_scan triggers on voicemail/MFA terms; fused to High or Critical
Vigilyx detection coverage
Vigilyx beats Tycoon-class platforms via a three-layer combination of redirect-chain analysis, landing-page fingerprinting, and known-infrastructure intelligence:
- URL multi-hop analysis —
link_scanfollows redirects and identifies shortener + Cloudflare Worker + lookalike combinations (crates/vigilyx-engine/src/modules/link_scan.rs) - Landing-page content fingerprints —
landing_page_scanfetches the final page and matches AiTM reverse-proxy traits, missing CSP, abnormal cross-origin asset signatures (crates/vigilyx-engine/src/modules/landing_page_scan.rs) - Dedicated AiTM detection —
aitm_detectanalyzes OAuth login form action domains for anomalies (crates/vigilyx-engine/src/modules/aitm_detect.rs) - New-domain detection —
intelchecks WHOIS/RDAP and raises risk for domains under 7 days old (crates/vigilyx-engine/src/intel.rs) - Tycoon infrastructure intel — OTX/AbuseIPDB continuously tag known Tycoon 2FA infrastructure, hitting
intelimmediately escalates to Critical (crates/vigilyx-engine/src/intel.rs) - Voicemail / MFA / share keyword set —
content_scanships dedicated lists for these phishing themes (crates/vigilyx-engine/src/modules/content_scan/detectors.rs)
In real-world Tycoon 2FA waves throughout 2025, Vigilyx detection was driven mainly by landing_page_scan AiTM fingerprinting — even brand-new domains registered the same day (no IOC coverage) were caught the moment the landing page was fetched.
Defense
- Identity layer (most important) — deploy phishing-resistant MFA (FIDO2 hardware keys, passkeys, Windows Hello). FIDO2 binds origin into the hardware signature, so reverse-proxy domains physically cannot produce a valid signature.
- Gateway — make
landing_page_scanmandatory; treat any email with three or more redirect hops as Medium baseline. - Training — before signing in to any Microsoft service, verify the address bar shows
login.microsoftonline.comorlogin.live.com. Anything else is an attack.
