Tycoon 2FA Operators Adopt OAuth Device Code Phishing to Bypass MFA

Tycoon 2FA Operators Adopt OAuth Device Code Phishing to Bypass MFA
Cybercriminals behind the Tycoon 2FA phishing kit have added a powerful new weapon to their playbook.

By combining their well-known phishing infrastructure with OAuth Device Code abuse, they can now steal access to Microsoft 365 accounts without ever capturing a single password.

The Tycoon 2FA phishing kit first gained attention as a Phishing-as-a-Service (PhaaS) platform. It was designed to help attackers bypass multi-factor authentication by relaying credentials through a middle layer.

Over the past year, the operators have continued evolving their methods and refining their delivery chains to stay ahead of detection tools and vendor blocklists. Even after a major disruption in March 2026, the group refused to slow down.

230-entry ASN owner blocklist hardcoded in the Layer 2 controller script (Source - eSentire)
230-entry ASN owner blocklist hardcoded in the Layer 2 controller script (Source – eSentire)

Analysts at eSentire said in a report shared with Cyber Security News (CSN) that the campaign was identified in late April 2026 by their Threat Response Unit (TRU).

The eSentire team found that Tycoon 2FA operators had kept their core kit nearly intact following the March 2026 coalition takedown led by Microsoft and Europol, only this time they layered in an OAuth device code flow to harvest tokens instead of credentials.

The attack starts with a convincing lure email that contains a click-tracking link from Trustifi, a legitimate enterprise email security platform.

The HumanCheck CAPTCHA widget presented to the victim after passing Layer 2 anti-analysis checks (Source - eSentire)
The HumanCheck CAPTCHA widget presented to the victim after passing Layer 2 anti-analysis checks (Source – eSentire)

Trustifi itself was not compromised. Threat actors are simply exploiting the platform’s clean reputation to slip past email gateways and route victims through a chain of malicious redirects without raising early alarms.

Once clicked, the link moves through multiple layers before reaching the final payload. The delivery chain uses encrypted payloads, anti-analysis checks, a fake Microsoft CAPTCHA page, and a vendor blocklist covering over 230 organizations. This is designed to ensure only real victims reach the last stage of the attack.

OAuth Device Code Phishing

At the heart of this campaign is a clever abuse of the OAuth 2.0 Device Authorization Grant, a legitimate protocol built for devices like smart TVs that cannot easily handle traditional login flows.

In the normal flow, a device generates a short code, and the user enters it at a trusted website to grant access. Tycoon 2FA operators have now weaponized this process entirely.

Microsoft deviceauth page with code FG7JZ7TJB (Source - eSentire)
Microsoft deviceauth page with code FG7JZ7TJB (Source – eSentire)

In this attack, victims are shown a Microsoft 365 voicemail notification lure. They are instructed to copy a user code and visit the real Microsoft device login page at microsoft.com/devicelogin.

Since the victim is interacting with genuine Microsoft infrastructure, MFA is triggered and completed normally.

What the victim does not realize is that by approving the prompt, they are granting access tokens to an attacker-controlled device running in the background. The phish does not bypass MFA but changes what MFA is authorizing.

A Kit That Survived Takedown Intact

One of the most striking findings in the eSentire report is how little the kit has changed despite major law enforcement disruption.

The same AES encryption key, the same anti-debug timing trap, the same Check Domain grammar, and the same backend route patterns from 2025 are still present in this 2026 campaign.

This level of continuity shows the operators backed up their codebase and resumed operations without skipping a beat.

Post-compromise analysis of Entra sign-in logs revealed that operator activity came from Node.js automation tools using the user-agent strings “node” and “undici.”

These are strong indicators of a backend polling client and highly unusual in any normal production environment.

Defenders should treat these user-agents appearing against the Microsoft Authentication Broker AppId as an immediate red flag.

Operator infrastructure has also shifted toward Alibaba Cloud, specifically AS45102, as part of a broader hosting rotation after previous providers faced takedown pressure.

eSentire’s Threat Response Unit recommends that organizations implement Microsoft Entra Conditional Access policies to block OAuth Device Code flows for regular end-users.

Admins should also restrict user consent for OAuth apps and require admin approval for all third-party application access.

Enabling Continuous Access Evaluation ensures token revocation propagates quickly after any confirmed incident. Teams should also hunt for the specific KQL queries and URLscan patterns published by eSentire to identify related activity across their environments.

Indicators of Compromise (IoCs):-

TypeIndicatorDescription
URLhxxps[://]events[.]trustifi[.]com/api/o/v1/click/69f218d9bd8f28639a2460c7/…Trustifi click-tracking lure URL used for reputation laundering; decoded ObjectId timestamps to April 29, 2026
URLhxxps[://]cookies[.]28gholland[.]workers[.]dev/Cloudflare Workers throwaway subdomain; actual delivery point for the malicious payload
URLhxxps[://]shivacrio[.]com/bytecore~tx1j8Tycoon 2FA “Check Domain” used to gate victims and filter security researchers in real time
URLhxxps[://]fijothi[.]com/dhkjCVBfLnfbhFjpYPoDKNMmLIQjNkGLMQPMQUBJFWELKIYHJHWDIESXVUZHHJNFTNMW<random>Operator C2 backend domain used for AES-CBC encrypted session communication
OAuth AppId29d9ed98-a469-4536-ade2-f981bc1d605eMicrosoft Authentication Broker AppId impersonated during the OAuth Device Code consent flow
OAuth AppId4765445b-32c6-49b0-83e6-1d93765276caOfficeHome AppId; primary AppId for the credential-relay kit variant (per TRU April 2026 reporting)
IP Address47.90.180.205Alibaba Cloud (AS45102) operator IP observed during the token-acquisition phase
IP Address47.252.11.99Alibaba Cloud (AS45102) operator IP observed during sustained refresh-token reuse phase
User-AgentnodeNode.js bare user-agent; operator polling client signature during initial token acquisition
User-AgentundiciNode.js native HTTP client user-agent; operator backend signature during sustained refresh-token reuse
ASNAS45102Alibaba (US) Technology Co., Ltd.; active operator-side ASN observed since approximately April 10, 2026
Encryption Key1234567890123456Hardcoded AES-CBC key and IV used in CryptoJS encryption layer; consistent kit fingerprint across campaigns
MongoDB ObjectId69f218d9bd8f28639a2460c7Object ID embedded in lure URL path; decodes to April 29, 2026, 14:42:33 UTC

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Tycoon 2FA Operators Adopt OAuth Device Code Phishing to Bypass MFA appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading