Police dismantle major phishing platform blamed for attacks on hospitals and schools

International law enforcement agencies have dismantled a major phishing-as-a-service platform used to target hundreds of thousands of accounts worldwide, including those tied to hospitals and schools, Europol said Wednesday.

The service, known as Tycoon 2FA, offered criminals a ready-made toolkit for stealing login credentials and bypassing multi-factor authentication, allowing attackers to access accounts even when additional security checks were enabled.

Authorities disrupted the operation by seizing 330 domains used to host phishing sites and operate the platform’s infrastructure. Active since 2023, Tycoon 2FA sent tens of millions of phishing emails each month and targeted more than 500,000 organizations worldwide.

Healthcare and education organizations were among the hardest hit.

Microsoft said more than 100 members of Health-ISAC, a cybersecurity information-sharing group for the health sector, were successfully phished. In New York alone, at least two hospitals, six public schools and three universities reported attempted or successful compromises tied to Tycoon 2FA.

“These incidents had tangible consequences,” Microsoft stated, with compromised accounts leading to operational disruptions and delays in patient care.

Unlike conventional phishing kits that simply harvest passwords, Tycoon 2FA was designed to defeat strong security protections. The service intercepted authentication sessions in real time, capturing both login credentials and one-time verification codes. This allowed attackers to log in as legitimate users without triggering security alerts.

The platform also lowered the barrier to cybercrime by packaging sophisticated phishing tools into a subscription-based service. At its peak, Tycoon 2FA accounted for about 62% of all phishing attempts blocked by Microsoft.

“Taking this infrastructure offline cuts off a major pipeline for account takeovers and helps protect people and organizations from follow-on attacks such as data theft, ransomware, business email compromise and financial fraud,” the company said.

Authorities believe the service’s developer is based in Pakistan and worked with partners responsible for marketing, payments and customer support. Cybercriminals often paired Tycoon 2FA alongside other illicit services that handled mass email distribution, malware hosting and the resale of stolen account access to conduct high-scale cybercrime campaigns.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Next Post

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

Related Posts

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to
Read More

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident's phone, making it the latest case of abuse of the technology targeting civil society. The interdisciplinary research unit at the University of Toronto's Munk School of Global Affairs & Public
Read More

India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud

India's telecommunications ministry has ordered major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days. According to a report from Reuters, the app cannot be deleted or disabled from users' devices. Sanchar Saathi, available on the web and via mobile apps for Android and iOS, allows users to report suspected fraud,
Read More