“Tycoon 2FA was widely used by independent affiliates. This means that variants of Tycoon 2FA’s attack code that have been cloned or modified by individual adversaries continue circulating. It also means that independently hosted deployments remain active and that fragmented, low-volume campaigns persist,” Barracuda notes.According to the cybersecurity firm, PhaaS toolsets are increasingly similar to open source software, where threat actors reuse, modify, and redeploy the code.Combined with residual infrastructure, built-in redundancy to survive disruptions, and persistent access to compromised environments, this makes phishing kits sturdier and more difficult to detect and tackle.According to Barracuda, these artifacts reflect an ecosystem diversification, where Tycoon 2FA is redistributed across more platforms rather than restored.“This does not mean the takedown operation failed. Rather, it shows what happens when disruption hits a maturing underground economy, and why security defenses need to look more broadly than individual players,” Barracuda notes.Related:53 DDoS Domains Taken Down by Law EnforcementRelated:US Confirms Handala Link to Iran Government Amid Takedown of Hackers’ SitesRelated:SystemBC Infects 10,000 Devices After Defying Law Enforcement TakedownRelated:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

According to the cybersecurity firm, PhaaS toolsets are increasingly similar to open source software, where threat actors reuse, modify, and redeploy the code.Combined with residual infrastructure, built-in redundancy to survive disruptions, and persistent access to compromised environments, this makes phishing kits sturdier and more difficult to detect and tackle.According to Barracuda, these artifacts reflect an ecosystem diversification, where Tycoon 2FA is redistributed across more platforms rather than restored.“This does not mean the takedown operation failed. Rather, it shows what happens when disruption hits a maturing underground economy, and why security defenses need to look more broadly than individual players,” Barracuda notes.Related:53 DDoS Domains Taken Down by Law EnforcementRelated:US Confirms Handala Link to Iran Government Amid Takedown of Hackers’ SitesRelated:SystemBC Infects 10,000 Devices After Defying Law Enforcement TakedownRelated:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Combined with residual infrastructure, built-in redundancy to survive disruptions, and persistent access to compromised environments, this makes phishing kits sturdier and more difficult to detect and tackle.According to Barracuda, these artifacts reflect an ecosystem diversification, where Tycoon 2FA is redistributed across more platforms rather than restored.“This does not mean the takedown operation failed. Rather, it shows what happens when disruption hits a maturing underground economy, and why security defenses need to look more broadly than individual players,” Barracuda notes.Related:53 DDoS Domains Taken Down by Law EnforcementRelated:US Confirms Handala Link to Iran Government Amid Takedown of Hackers’ SitesRelated:SystemBC Infects 10,000 Devices After Defying Law Enforcement TakedownRelated:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

According to Barracuda, these artifacts reflect an ecosystem diversification, where Tycoon 2FA is redistributed across more platforms rather than restored.“This does not mean the takedown operation failed. Rather, it shows what happens when disruption hits a maturing underground economy, and why security defenses need to look more broadly than individual players,” Barracuda notes.Related:53 DDoS Domains Taken Down by Law EnforcementRelated:US Confirms Handala Link to Iran Government Amid Takedown of Hackers’ SitesRelated:SystemBC Infects 10,000 Devices After Defying Law Enforcement TakedownRelated:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

“This does not mean the takedown operation failed. Rather, it shows what happens when disruption hits a maturing underground economy, and why security defenses need to look more broadly than individual players,” Barracuda notes.Related:53 DDoS Domains Taken Down by Law EnforcementRelated:US Confirms Handala Link to Iran Government Amid Takedown of Hackers’ SitesRelated:SystemBC Infects 10,000 Devices After Defying Law Enforcement TakedownRelated:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Related:53 DDoS Domains Taken Down by Law EnforcementRelated:US Confirms Handala Link to Iran Government Amid Takedown of Hackers’ SitesRelated:SystemBC Infects 10,000 Devices After Defying Law Enforcement TakedownRelated:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Related:US Confirms Handala Link to Iran Government Amid Takedown of Hackers’ SitesRelated:SystemBC Infects 10,000 Devices After Defying Law Enforcement TakedownRelated:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Related:SystemBC Infects 10,000 Devices After Defying Law Enforcement TakedownRelated:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Related:1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

Ionut Arghire is an international correspondent for SecurityWeek.

Source: SecurityWeek