Cybersecurity researchers from Trustwave’s Risk Intelligence Workforce have uncovered a large-scale phishing marketing campaign orchestrated by the infamous hacker group Storm-1575, also referred to as “Dadsec.”
Since September 2023, this group has been leveraging a Phishing-as-a-Service (PhaaS) platform referred to as Tycoon2FA to focus on Microsoft 365 customers, aiming to reap credentials by meticulously crafted phishing pages.
This marketing campaign, lively since at the very least August 2023, showcases a disturbing evolution in phishing ways, mixing superior evasion strategies with shared infrastructure between Dadsec and Tycoon2FA, pointing to a extremely coordinated and interconnected PhaaS ecosystem.

Refined Phishing Marketing campaign Targets Microsoft 365 Customers
Investigations reveal that Tycoon2FA, suspected to be a clone or adaptation of Dadsec’s personal phishing package, employs an Adversary-in-the-Center (AiTM) method to intercept consumer inputs and bypass multi-factor authentication (MFA).
By internet hosting phishing pages on attacker-controlled servers, the platform captures session cookies and authentication tokens, enabling persistent entry to compromised accounts even when victims change their passwords.
The marketing campaign begins with misleading emails containing HTML attachments or QR codes that redirect customers to pretend Microsoft login pages, typically pre-filling the sufferer’s electronic mail deal with to boost credibility.
Since July 2024, researchers have detected hundreds of such phishing pages, supported by distinctive PHP sources like “res444.php,” and newer variants similar to “cllascio.php” and “.000.php” launched in March 2025, showcasing the adaptability of the risk actors.

Shared Infrastructure Reveals Deep Connections in PhaaS Ecosystem
A vital discovering is the overlap in infrastructure between Dadsec and Tycoon2FA, suggesting a shared operational framework.
Domains linked to each platforms resolve to widespread IP addresses and Autonomous System Numbers (ASNs), notably AS19871 (NETWORK-SOLUTIONS-HOSTING), and sometimes make the most of the Russian top-level area “.RU” with constant URL patterns embedding sufferer knowledge.
These domains, incessantly hosted on Cyber Panel, show templated webpages with similar HTML physique hashes and titles like “Works Creatively,” indicating a centralized phishing toolkit.
Tycoon2FA additional enhances its deception with customized Cloudflare Turnstile challenges and anti-analysis options, similar to keystroke detection and disabling browser inspection instruments, whereas deploying decoy pages mimicking reputable platforms like Microsoft Phrase On-line to lure unsuspecting customers.
The technical sophistication of Tycoon2FA is obvious in its use of obfuscation strategies like AES decryption and Base64 encoding to hide command-and-control (C2) communications, alongside dynamic content material adjustment based mostly on browser detection.
As soon as credentials are entered, the phishing portal encrypts and exfiltrates knowledge starting from electronic mail addresses to geolocation particulars by way of companies like “geojs” to distant servers for validation.
This marketing campaign’s skill to tailor phishing experiences, mixed with its rising infrastructure, underscores the escalating risk posed by PhaaS platforms.
As these instruments evolve, safety groups should improve intrusion evaluation, adapt detection mechanisms, and foster collaboration inside the cybersecurity neighborhood to counter the persistent and complicated dangers introduced by teams like Storm-1575 and platforms like Tycoon2FA.
Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get On the spot Updates!