

Security In Practice | CyOps Consulting Team
Infrastructure seizure stops new phishing messages from deploying. It does not revoke the session tokens already stolen during active campaigns. That distinction defines the operational gap that the Tycoon 2FA disruption announcement does not close.
Tycoon 2FA operated as PhaaS (Phishing-as-a-Service) infrastructure, an industrialised delivery mechanism for AiTM (Adversary-in-the-Middle) phishing. AiTM does not steal passwords. It relays authentication prompts in real time and captures the live session token after the user successfully authenticates. The MFA prompt fires, and the attacker captures the resulting token anyway (Microsoft 2026). The credential is not compromised. The session is.
Microsoft’s post-takedown tracking data confirms that Tycoon 2FA allowed threat actors to maintain persistence even after password resets unless sessions and tokens were explicitly revoked (Microsoft 2026). Treating this week’s Europol and Microsoft announcement as resolution misreads the risk. The takedown is not the story. What matters is what the takedown exposed.
Where Current Thinking Breaks
The working assumption in most identity programmes is simple: MFA is deployed, therefore phishing risk is mitigated. That assumption is incomplete when applied to AiTM-class attacks. The Canadian Centre for Cyber Security’s AiTM guidance, based on over 100 campaigns targeting Microsoft Entra ID accounts between 2023 and early 2025, shows that attackers have standardised their approach. They do not defeat MFA. They wait for users to complete it and then capture the resulting session token (Canadian Centre for Cyber Security 2025). MFA-enabled status answers a question attackers stopped asking.
Tycoon 2FA turned this technique into PhaaS infrastructure that is industrialised, commoditised, and accessible to threat actors without advanced technical capability. Vendor data suggests that approximately 30% of credential attacks in 2024 used PhaaS infrastructure, with projections approaching 50% in 2025 (Sakthivel 2024).
The threat model has shifted. The attacker doesn’t need to beat your MFA. They wait for you to beat it for them. This is not a theoretical gap. Here are the three ways it is playing out in practice.
Gap 1: FIDO2 Deployment Does Not Equal AiTM Protection in Mixed-Mode Configurations
Most enterprise FIDO2 deployments are incomplete in a specific way. Hardware keys are registered, but legacy fallback methods such as push notifications, one-time passwords, and SMS codes remain enabled in authentication policy. IOActive research published in February 2026 identified an authentication downgrade attack that exploits this configuration. A serverless transparent proxy operating on trusted CDN infrastructure intercepts the authentication flow and forces the user back to a phishable method, even when a FIDO2 hardware key is registered. The forensic footprint on that infrastructure is effectively zero (IOActive 2026).
The gap persists because FIDO2 rollouts are expensive and operationally disruptive. Organisations that complete hardware key deployment often assume the investment delivers full protection. Authentication policies that enforce hardware-key-only access for privileged accounts are not default configurations and require deliberate design decisions that many teams have not made (IOActive 2026).
The consequence is direct. An organisation that has completed a FIDO2 rollout and declared itself protected against AiTM may still be exploitable through the downgrade path. Logs will show a legitimate user authenticating with a legitimate method. There is no anomaly to detect.
What most coverage misses is the asymmetry. The downgrade attack does not break FIDO2 cryptography. It manipulates the authentication flow upstream of the cryptographic challenge, so detection logic focused on cryptographic anomalies will not trigger (IOActive 2026). Attacker tooling cost is near-zero, using free-tier serverless services. Defender remediation requires no new procurement, only a configuration change.
Action: Audit authentication policy configuration for privileged accounts. Determine whether hardware-key-only enforcement is in place or whether fallback methods remain available as downgrade paths. A tiered enforcement approach, starting with administrative accounts, reduces operational friction while addressing the highest-risk exposure first.
Gap 2: Stolen Session Tokens From Active Tycoon 2FA Campaigns Are Still Valid
As stated earlier, infrastructure seizure stops new phishing messages from deploying. It does not invalidate session tokens and cookies stolen during the active campaigns. Intelligence from exposed PhaaS operator panels revealed hundreds of thousands of captured credentials and authentication records, primarily tied to corporate email domains (TrendAI 2026). TrendAI warned explicitly that previously captured credentials and session cookies may remain circulation post-takedown (TrendAI 2026).
Identity teams typically lack operational runbooks for bulk token revocation following a threat infrastructure disruption. The event is treated as news rather than an operational trigger. There is no standard incident response (IR) playbook for this scenario, which makes the gap procedural rather than technical.
The consequence is direct. Organisations may currently have active attacker sessions tied to earlier campaigns if tokens have not been revoked. The attacker no longer needs the phishing infrastructure. The session persists until expiration or explicit invalidation.
Coverage of the takedown has described how the PhaaS infrastructure operated. It has not addressed the detection and revocation work now required. The detection signal for active token replay exists in the identity platform’s risk event logs, but only if teams know where to look and understand the false positive characteristics of that signal (Microsoft 2026a; Microsoft 2026b).
Run the detection queries below against the risk event log table. Prioritise detections at high risk level. Low and medium risk level detections carry an elevated false positive rate and should be treated as investigative leads (Microsoft 2026a). For accounts in healthcare, education, and finance verticals (sectors most heavily targeted per available partner intelligence), execute targeted bulk session revocation and forced re-authentication as a proactive measure regardless of whether the detection fires.
Note: Full visibility into anomalous token detections requires, at a minimum, an identity protection P2 licence entitlement; without it, detections surface without specificity (Microsoft 2026a).
Detection Queries: Anomalous Token Reuse (Entra ID / Log Analytics)
In Short
The takedown does not close the active threat window. Infrastructure seizure stops new phishing messages from deploying, but it does not invalidate session tokens stolen during active campaigns in Q4 2025 and Q1 2026. This window includes over three million phishing messages in February 2026 alone. Attacker sessions established before the disruption remain valid until explicitly revoked. Most identity teams do not have an IR runbook for this scenario. Proactive bulk session revocation is required now rather than after detection fires.
A completed FIDO2 rollout does not equal AiTM (Adversary-in-the-Middle) protection. A published, near-zero-cost downgrade attack can force authentication back to phishable fallback methods such as push, OTP, and SMS, even when a hardware key is registered. This occurs by intercepting the flow upstream of the cryptographic challenge on trusted CDN infrastructure. The forensic footprint is effectively zero. Hardware-key-only enforcement for privileged accounts is not the default and requires a deliberate policy decision that most teams have not made.
Default token lifetimes were not designed for a session-theft threat model. Default refresh token lifetimes allow attacker persistence through password resets and standard remediation cycles without triggering detection. Continuous Access Evaluation (CAE), which enables near real-time revocation without forcing constant re-authentication, is not enabled by default. Microsoft confirmed that the disrupted infrastructure allowed persistence even after passwords were reset. CAE is a configuration decision within existing platform capabilities and typically requires only a licensing entitlement check.
All three remediation actions require no new procurement. The Shadowserver Special Report (published 4 March 2026, 25,206 domain events across 237 national CSIRTs) is available free via national CSIRT request (AusCERT, NCSC-UK, CISA) or via a free Shadowserver subscription. Cross-reference against email gateway and DNS logs for Q4 2025 to Q1 2026, prioritise is_panel = Yes domains, and execute targeted bulk session revocation. Authentication policy audit and CAE enablement are configuration changes. The gap is prioritisation, not budget.
Primary
AADUserRiskEvents
| where RiskEventType == "anomalousToken"
| where RiskState == "atRisk"
| where RiskDetail !has "aiConfirmedSigninSafe"
| project TimeGenerated, UserPrincipalName, RiskLevel,
DetectionTimingType, IpAddress, Location,
CorrelationId, RequestId, RiskDetail
| order by RiskLevel desc, TimeGenerated desc
The detection queries above are scoped to Microsoft Entra ID / Log Analytics. Equivalent anomalous token risk events exist in Okta’s ThreatInsight and System Log, and in Ping Identity’s audit logs; detection field names differ but the underlying risk event types are consistent. Entra ID specifics are prioritised here given the confirmed targeting of Microsoft-authenticated accounts in Tycoon 2FA campaigns.
Gap 3: Default Token Lifetime Configuration Is Not Calibrated for an AiTM Threat Model
Default enterprise identity platform refresh token lifetimes allow persistent access well beyond a single session. An attacker holding a stolen token can maintain access through password resets, security remediation cycles, and standard alerting cycles without triggering detection. Token lifetime policies are not treated as a priority in standard cloud platform hardening checklists. Those checklists were written when the primary threat was password compromise, not session token theft.
The reason is structural. Ownership of token lifetime configuration frequently lacks clear ownership across identity, endpoint, and cloud security teams (Microsoft 2026). Continuous Access Evaluation (CAE) enables near-real-time token revocation without requiring constant re-authentication and exists as a middle path between short token lifetimes and persistent session risk. It requires deliberate configuration, however, and is not enabled by default for all authentication scenarios. Most teams have not been required to make this configuration decision explicitly because the prevailing threat model did not demand it.
The consequence is not theoretical. Session token theft attacks present as legitimate authentication. Without tightened token lifetimes combined with anomalous session detection, an attacker can remain persistent through multiple remediation cycles. Microsoft confirmed that the disrupted PhaaS infrastructure allowed threat actors to establish persistence even after passwords were reset (Microsoft 2026).
Neither control requires new budget, a point that current coverage has not addressed. CAE is a configuration available within existing platform capabilities, subject to licensing entitlement verification (Microsoft 2026). Most teams have not audited whether these controls are active. That is the obstacle, not technical capability.
Two actions follow. First, audit current token lifetime policy settings, evaluate CAE configuration status, and verify licensing entitlement. Confirm whether CAE is enabled for the relevant authentication scenarios or whether default token lifetimes remain in place. Second, use the Shadowserver indicators of compromise (IOC) dataset to identify which accounts to prioritise for targeted session revocation before that configuration takes effect.
On 4 March 2026, Shadowserver published a Special Report containing 25,206 domain events across 237 National CSIRTs globally, covering domains assessed to have been used in the disrupted PhaaS infrastructure with registration start and end dates between 2023-03-19 and 2027-04-03 (Shadowserver Foundation 2026). Pull the hostname list, cross-reference against gateway and DNS query logs for the Q4 2025 to Q1 2026 window, prioritise domains where is_panel = Yes (confirmed command-and-control infrastructure) and execute targeted bulk session revocation for matched accounts.
Shadowserver Tycoon 2FA IOC Dataset: Access Pathways (Published 4 March 2026)
Operational caveat: This dataset identifies historical domain contact between first_seen_time and last_seen_time fields, which may indicate past or current malicious activity. It does not identify currently active attacker sessions. The cross-reference workflow produces a prioritised account list for targeted revocation, not a confirmed compromise list.
