Task-specific Atlas Agents investigate threats at machine speed with full transparency, expert validation, and explainable outcomes you can trust.
Atlas Extended Detection and ResponseOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Atlas User ExperienceSee what our SOC sees, review investigations, and see how we are protecting your business.
Atlas Platform IntegrationsSeamless integrations and threat investigation that adapts to your tools and evolves with your business.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
On March 31st, 2026, threat actors compromised the Axios npm (Node Package Manager) package, publishing two malicious versions, 1.14.1 and 0.30.4, to the npm registry. This supply chain…
On March 27th, 2026, F5 confirmed exploitation of a previously known vulnerability in its BIG-IP Access Policy Manager (APM) versions. The flaw, tracked as CVE-2025-53521 (CVSS: 9.3),…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership Careers Event Calendar → Newsroom → Aston Villa Football Club →We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Search our site
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
Following the organized global coalition takedown of Tycoon 2FA phishing infrastructure led by Microsoft in coordination with industry partners including eSentire, our Threat Response Unit (TRU) has observed significant changes in the threat actors' tactics and infrastructure. Although many tactics mirror those outlined in our earlier analysis, "Phish & Chips: Serving Up Tycoon 2FA's Secrets", this blog introduces new technical indicators to help organizations detect and defend against this evolving Phishing-as-a-Service (PhaaS) threat.

Observations in this section are derived from Microsoft Entra ID sign‑in telemetry, enabling analysis of source infrastructure, user agents, and ASN‑level patterns.
Prior to the coordinated takedown of Tycoon 2FA infrastructure, initial login attempts associated with Tycoon 2FA campaigns were commonly observed as originating from the following ASNs:
Sign-in attempts were associated with the following technical indicators:
Following the takedown, threat actors quickly pivoted to new infrastructure providers, with login attempts originating from the following ASNs:
Technical Indicators:
Notably, the user agent used in login attempts has been updated to the latest Axios version (1.13.6), suggesting the phishing kit is actively maintained and evolving. Additionally, analysis of post‑takedown Tycoon 2FA authentication activity shows heavy reliance on ProxyLine infrastructure for the majority of newly observed source IPs.
However, continued authentication attempts originating from AS9009 (M247 Europe SRL) were observed independently of ProxyLine, indicating that Tycoon 2FA operators are leveraging multiple authentication infrastructure sources in parallel.
ProxyLine (proxyline[.]net) is a commercial datacenter proxy service that provides the underlying infrastructure for the majority of newly observed post‑takedown Tycoon 2FA authentication activity, as identified through Entra ID sign‑in telemetry. The service offers IPv4/IPv6 proxies with HTTP and SOCKS5 support and is distributed across an extensive global network.

ProxyLine advertises proxy coverage across 100+ countries spanning six continents, including Russia, Ukraine, USA, major European nations (Germany, UK, France, Italy, Spain), Asia-Pacific (Australia, China, India, Japan), and numerous other regions. This extensive geographic footprint allows threat actors to rotate through exit nodes worldwide, significantly complicating attribution and geographic-based blocking efforts.
In Gmail-targeted phishing campaigns, we have observed ProxyLine infrastructure usage (specifically via AS214238 (HOST TELECOM LTD)) since at least February 2026, predating takedown efforts.
ProxyLine's low-cost commercial service model makes it widely accessible to a variety of threat actors. The pricing table for this service is shown in the figure below.

ProxyLine offers several features that make it attractive to threat actors, including:
Our analysis reveals that Tycoon 2FA operators have implemented evasion mechanisms to avoid detection by security researchers and automated analysis systems. The phishing page queries ipinfo.io to identify the visitor's external IP and associated ASN/organization. Requests originating from Leaseweb, M247, Cloudflare (AS13335), Google, or Microsoft are redirected to the legitimate Carrefour website, helping conceal the phishing content from security researchers and automated analysis systems that operate from those infrastructure providers.

In some cases, we have also observed Tycoon 2FA leverage geojs.io for capturing victim IP address and country information to enrich stolen credentials with geographic context.

The following CyberChef recipe can be used to decrypt credentials in transit, as Tycoon 2FA continues to use the same AES key and IV referenced in our previous blog, "Phish & Chips: Serving Up Tycoon 2FA's Secrets".
Similar blocking logic is employed for Gmail-targeted phishing pages, using api.ipapi.is as the IP intelligence source. In observed incidents, victims were redirected to legitimate websites like Kajabi[.]com, as shown in the figure below.

We've observed the implementation of WebSocket-based communication in Gmail-targeted phishing campaigns.

WebSocket usage enables:
Despite the infrastructure diversification and operational adaptations described above, source code analysis reveals minimal functional changes to the Tycoon 2FA phishing kit between pre-takedown and post-takedown versions.

The comparison above demonstrates that three critical components remain functionally identical:
This complete code consistency indicates threat actors prioritized operational continuity over kit redevelopment, maintaining the same codebase while exclusively pivoting infrastructure.
Our incident data shows a clear shift in ASN usage following takedown efforts, with Tycoon 2FA operators improving operational resilience by making use of several new infrastructure providers.
The figure below (a stacked bar graph of ASNs by date) highlights this rapid infrastructure adaptation, and the need for continued vigilance to detect and disrupt campaigns.

Detailed Indicators of Compromise (IOCs) including IP addresses, domains, and URLs, are available in our threat intelligence repository here.
Advanced KQL Hunting Query:
Key IOCs:
ASNs of Interest:
External Legitimate Services Used by Tycoon 2FA:
Check Domain:
To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTEDThe eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.