7 min read

Inside the Tycoon 2FA and LeakBase Takedowns

Prepared by: Brad Morgan, Head of Managed ServicesLast update: 10 March 2026

A Great Week for Cyber Defence, But Don’t Lower Your Guard Yet

A coordinated international operation has disrupted one of the most prolific phishing platforms on the internet and shut down a major marketplace for stolen credentials, marking a notable moment in the fight against cybercrime.

Law enforcement agencies and private sector partners including Europol, the Federal Bureau of Investigation, Microsoft and Coinbase moved this week against Tycoon 2FA, a phishing-as-a-service platform used to run large-scale account takeover campaigns, while authorities also seized LeakBase, an underground forum where compromised data and credentials were traded.

For security teams that track phishing activity daily, the takedowns represent a meaningful disruption to attacker infrastructure. However, experience shows these operations rarely eliminate the underlying demand; operators typically migrate to new services, meaning the broader threat is unlikely to disappear.

 

What Was Actually Taken Down?

Tycoon 2FA was not just another phishing kit, it was an industrialised phishing platform operating at global scale.

Since emerging in August 2023 it has been linked to:

  • Over 64,000 phishing incidents and tens of thousands of malicious domains

  • Tens of millions of phishing emails each month, targeting more than 500,000 organisations globally. 

  • Approximately 62 percent of phishing attempts blocked by Microsoft as of mid-2025

  • Nearly 100,000 compromised organisations, including schools, healthcare providers and public institutions

  • Around 96,000 confirmed phishing victims, including more than 55,000 Microsoft customers

  • What made Tycoon 2FA particularly dangerous was its adversary-in-the-middle phishing capability.

Instead of simply stealing usernames and passwords, the platform intercepted authentication sessions in real time. This allowed attackers to capture session cookies and authentication codes generated by mobile authenticator applications.

As a result, attackers could bypass traditional multi-factor authentication and maintain access even after passwords were reset, unless active sessions and authentication tokens were explicitly revoked.

Access to the platform was also inexpensive. Subscriptions reportedly started at around 120 US dollars for 10 days, lowering the barrier for criminals with very limited technical skills.

Law enforcement and industry partners disrupted roughly 330 domains linked to the infrastructure and the alleged primary developer has reportedly been identified.

LeakBase, dismantled during Operation Leak in early March 2026, served a different but complementary role. With more than 142,000 members, it functioned as a marketplace for stealer logs, stolen credentials, financial data and compromised databases. Approximately 100 enforcement actions were carried out globally targeting 37 of the forum's most active users.

Combined with earlier operations such as Microsoft's seizure of 338 domains linked to RaccoonO365, these disruptions reflect increasing international cooperation against cybercrime infrastructure.

But they do not remove the underlying demand.

Why This Is Not the End of the Threat

Phishing-as-a-service platforms exist because there is a large market of operators who want to run sophisticated phishing campaigns without building the tooling themselves.

Tycoon 2FA reportedly supported around 2,000 active operators, and they still exist. When infrastructure like this is disrupted, the demand does not disappear, it migrates.

This pattern has repeated across the cybercrime ecosystem for years. A platform is disrupted, operators disperse, and within weeks the community reorganises around the next available service. Early replacements may be less polished or less reliable, but the capability returns quickly.

The statistic that should concern most security leaders is this:

  • 59 percent of successfully compromised accounts in 2025 had multi-factor authentication enabled.

  • The control many organisations consider their primary identity defence was being bypassed at scale.

  • The lesson is not that multi-factor authentication is ineffective, it is that attackers continue to evolve around the controls we deploy.

What Organisations Should Be Doing Now

The disruption of Tycoon 2FA and LeakBase should be treated as an opportunity to review defensive controls, not relax them.

Move toward phishing-resistant authentication

  • SMS-based authentication and authenticator application codes can be intercepted by adversary-in-the-middle phishing frameworks.
  • Organisations should begin moving toward phishing-resistant authentication, such as hardware security keys, passkeys, or certificate-based authentication. These methods cryptographically bind authentication to the device and domain, making them far more difficult for attackers to intercept.
  • This is particularly important for privileged users and remote access systems.

Strengthen conditional access and session controls

  • Session hijacking is central to adversary-in-the-middle phishing.

  • Controls such as conditional access policies, device compliance enforcement, shorter session lifetimes and monitoring for anomalous authentication behaviour significantly reduce the window of opportunity for attackers.

  • Many of these controls already exist within modern identity platforms but are often underutilised.

Monitor exposed credentials and stealer logs

  • Credential marketplaces do not disappear when a forum is seized. The data has already been copied and redistributed.
  • Security teams should actively monitor credential exposure, stealer logs and underground identity intelligence to identify compromised accounts before they are abused.

Prepare for the next platform 

  • The operators who relied on Tycoon 2FA will migrate.

  • Security operations teams should expect new adversary-in-the-middle phishing frameworks to appear and should ensure phishing detection playbooks, identity monitoring and response processes are prepared for that shift.

Understand the cybercrime supply chain

  • Phishing infrastructure, credential markets and malware operations are closely linked.

  • Phishing campaigns steal credentials. Those credentials are sold through underground marketplaces. Access brokers and ransomware operators purchase that access and use it to move deeper into organisations.

  • Disrupting one node creates friction, but the ecosystem adapts.

How Managed Detection Teams Are Addressing This

For organisations running mature security monitoring programs, many of these controls are already becoming standard practice.

Across large managed detection and response environments, phishing and identity-based alerts remain one of the most consistent sources of security incidents. As a result, detection strategies increasingly focus on identity telemetry, session monitoring and credential exposure intelligence.

At Triskele Labs this includes:

  • Detection rules designed to identify adversary-in-the-middle phishing activity, suspicious authentication patterns and anomalous session behaviour across multiple security monitoring platforms.
  • Regular security posture reviews with clients, recommending improvements such as stronger conditional access policies, device-based access enforcement and tighter session controls.
  • Monitoring underground ecosystems for exposed credentials and stealer logs, helping identify compromised identities before they are actively abused.
  • Continuous tuning of phishing and identity detection rules across multiple regions and industries as attacker tooling evolves.

An important part of this model is shared intelligence across the client base.

Threat intelligence derived from security investigations, digital forensics engagements and external intelligence sources is continuously fed back into detection rules, alert enrichment and analyst workflows. When a new phishing technique, infrastructure pattern or credential exposure trend is identified in one environment, that insight is quickly incorporated into monitoring across all environments.

This collective intelligence model allows detection capability to improve continuously as new threats are observed.

A Moment of Optimism With Eyes Wide Open

None of this should take away from the achievement.

Operations of this scale, involving coordinated action between law enforcement and private sector partners across multiple jurisdictions, demonstrate meaningful progress in the global fight against cybercrime.

The arrests, domain seizures and intelligence sharing send a clear message to the criminal ecosystem that the risks are increasing.

But organisations should not interpret these takedowns as a reduction in risk.

The ability for attackers to run sophisticated phishing campaigns that bypass traditional authentication controls should now be considered a baseline threat assumption when designing identity security strategies.

Celebrate the wins. Brief your leadership teams.

Then make sure your identity controls and detection capabilities assume that the next phishing platform is already operating somewhere else.

 


Further reading:

The Hacker News: Europol-Led Operation Takes Down Tycoon 2FA
Microsoft on the issues: How a Global Coalition Disrupted Tycoon
The Hacker News: FBI and Europol Seize LeakBase Forum
Microsoft on the issues: Microsoft Disrupts Cybercrime
Microsoft on the issues: Microsoft Seizes 338 Websites to Disrupt RaccoonO365