Tycoon2FA Phishkit

Tycoon is back with a new phishing trick! The threat group has updated its tactics, using PDF lures and clever redirects to steal credentials. Victims are tricked into clicking a fake company policy notice, leading them straight to a phishing site.

This subtle yet effective trick will help adversaries to evade detection and improve their phishing success rate.

Let’s break down what’s changed and how this attack actually works.

How the Tycoon Attack Works

The attack begins with a PDF disguised as an official notice, warning the victim of a Company Device Policy Violation. The message pressures them to review the evidence by clicking a button inside the document.

See the phishing PDF inside ANY.RUN’s sandbox: View analysis session

PDF with phishing link inside secure ANY.RUN sandbox

Once the victim clicks the link, they are first redirected to /.res444.php/, a PHP script that executes JavaScript. The script first displays a Cloudflare “Verify You’re a Human” check: a common tactic used to bypass automated security scans and filter out bots.

google
Cloudflare verification inside ANY.RUN’s virtual machine

After passing this check, the victim is redirected to a fake Outlook login page designed to steal credentials.

Fake Outlook login page displayed inside ANY.RUN sandbox

In ANY.RUN’s sandbox, we see clear phishing indicators:

  • The Outlook favicon is missing, making the page look suspicious.
  • The URL contains random characters, a tactic often used to evade detection.
  • Suricata rules trigger an alert, confirming that this is a phishing attempt.
Suricata rule triggered

Note: If the phishing attempt targets a Windows user, the fake Outlook page loads. If the victim is using Linux, a fake gym website appears instead.

Protect your business from evolving phishing threats by analyzing attacks in real-time -> Start your 14-day free trial of ANY.RUN today

A Subtle Yet Effective Change in Tycoon Tactics

Security researchers have seen this tactic before: using PHP files with embedded JavaScript to execute redirections. However, Tycoon has fine-tuned their approach to slip past detection systems:

  • Their previous file, res444.php, contained Base64-encoded JavaScript, which then used AES decryption to fetch the phishing domain.
  • The updated file, .res444.php, skips the encryption and automatically redirects the victim to the Outlook phishing domain.
  • If a hash (#) is present in the URL, a random uppercase letter (A-Z) is appended before redirection, likely to bypass security filters.

Don’t Let Evolving Threats Put Your Business at Risk

Cybercriminals like Tycoon are constantly refining their tactics, making phishing attacks more deceptive and harder to detect. Their latest approach shows how even a simple PDF can lead to compromised accounts, stolen data, and serious business disruptions.

The key takeaway? Every suspicious link, attachment, or redirect needs to be analyzed before it can cause harm. A single overlooked phishing attempt can lead to credential theft, ransomware infections, and unauthorized access to sensitive business data.

With tools like ANY.RUN’s Interactive Sandbox, you can:

✔️ Analyze phishing links and malware in a safe, controlled environment
✔️ Detect hidden scripts, redirects, and suspicious network activity
✔️ Get real-time threat intelligence to prevent costly breaches

Don’t wait until it’s too late. Start your 14-day free trial of ANY.RUN today and keep your business secure.

googlenews
Balaji N
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.