Tycoon2FA Phishkit Updates Tactics with PDF Lures and Redirects

Tycoon is back with a new phishing trick! The threat group has updated its tactics, using PDF lures and clever redirects to steal credentials. The script first displays a Cloudflare “Verify You’re a Human” check: a common tactic used to bypass automated security scans and filter out bots. A single overlooked phishing attempt can lead to credential theft, ransomware infections, and unauthorized access to sensitive business data. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Victims are tricked into clicking a fake company policy notice, leading them straight to a phishing site. After passing this check, the victim is redirected to a fake Outlook login page designed to steal credentials. Note: If the phishing attempt targets a Windows user, the fake Outlook page loads. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security. The attack begins with a PDF disguised as an official notice, warning the victim of a Company Device Policy Violation. Security researchers have seen this tactic before: using PHP files with embedded JavaScript to execute redirections. Once the victim clicks the link, they are first redirected to /.res444.php/, a PHP script that executes JavaScript. This subtle yet effective trick will help adversaries to evade detection and improve their phishing success rate. Cybercriminals like Tycoon are constantly refining their tactics, making phishing attacks more deceptive and harder to detect. Their latest approach shows how even a simple PDF can lead to compromised accounts, stolen data, and serious business disruptions. If the victim is using Linux, a fake gym website appears instead.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 12 Mar 2025 17:20:27 +0000


Cyber News related to Tycoon2FA Phishkit Updates Tactics with PDF Lures and Redirects

Tycoon2FA Phishkit Updates Tactics with PDF Lures and Redirects - Tycoon is back with a new phishing trick! The threat group has updated its tactics, using PDF lures and clever redirects to steal credentials. The script first displays a Cloudflare “Verify You’re a Human” check: a common tactic used to ...
10 months ago Cybersecuritynews.com
Tycoon2FA phishing kit targets Microsoft 365 with new tricks - In a separate but related report, Trustwave says it has identified a dramatic increase in phishing attacks using malicious SVG (Scalable Vector Graphics) files, driven by PhaaS platforms like Tycoon2FA, Mamba2FA, and Sneaky2FA. Trustwave underlines ...
9 months ago Bleepingcomputer.com
PhishKit Evasion Tactics: What You Need to Pay Attention to Right Now - PhishKit, a notorious phishing toolkit, has evolved with sophisticated evasion tactics that challenge traditional cybersecurity defenses. This article delves into the latest techniques employed by PhishKit to bypass detection, including dynamic ...
4 months ago Cybersecuritynews.com
Tycoon2FA, EvilProxy, Sneaky2FA: How To Defend Against These Phishing Kit Attacks  - Threat actors behind toolkits like Tycoon2FA, EvilProxy, and Sneaky2FA are getting smarter, setting up infrastructure that bypasses 2FA and mimics trusted platforms like Microsoft 365 and Cloudflare to steal user credentials without raising red ...
6 months ago Cybersecuritynews.com
Apple Releases Updates for Older Devices in 2021 - Apple released updates to many of its older devices in 2021, including the iPhones, iPads, and Macs. The updates are to address security vulnerabilities that were discovered in the company's older devices. Apple has previously released several ...
3 years ago Thehackernews.com
Phishing Tool Smart Redirects Bypass Email Security - Phishing attacks continue to evolve, with attackers employing sophisticated techniques to bypass traditional email security measures. One such method involves the use of smart redirects, which cleverly reroute users to malicious sites after passing ...
2 months ago Darkreading.com
CVE-2018-18689 - The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, a Signature Wrapping vulnerability exists in multiple products. An attacker can use ...
5 years ago
As a SOC/DFIR Team Member, How To Investigate Phishing Kit Attacks - A critical methodology for investigating phishing kit attacks involves using Threat Intelligence (TI) Lookup tools like ANY.RUN’s platform, which aggregates data from millions of sandbox sessions to identify emerging threats. However, forensic ...
10 months ago Cybersecuritynews.com
Microsoft Edge to Use Adobe Acrobats PDF Rendering Technology - Microsoft and Adobe have joined forces to incorporate Adobe Acrobat's PDF rendering engine directly into the Edge browser, replacing the existing PDF engine. Starting in March 2023, new versions of Microsoft Edge for Windows 10 and Windows 11 will be ...
2 years ago Bleepingcomputer.com
Actors Behind AppSuite PDF and PDF Editor Malware Campaigns Uncovered - Recent investigations have uncovered the threat actors behind the AppSuite PDF and PDF Editor malware campaigns, revealing sophisticated tactics targeting users through malicious PDF files. These campaigns primarily distribute malware via compromised ...
4 months ago Cybersecuritynews.com Unknown threat actors
Exploitation of Windows SmartScreen Bypass Flaw Facilitates Deployment of DarkGate RAT - The operators behind the DarkGate malware have been taking advantage of a recently patched flaw in Windows SmartScreen through a phishing scheme. This campaign involves circulating counterfeit Microsoft software installers to spread the malicious ...
1 year ago Cysecurity.news CVE-2024-21412 CVE-2023-36025
Operation HollowQuill Weaponizing PDF Documents to Infiltrate Academic & Government Networks - A sophisticated cyber espionage campaign dubbed “Operation HollowQuill” has been uncovered targeting academic institutions and government agencies worldwide through weaponized PDF documents. Once opened, these documents silently deploy a ...
9 months ago Cybersecuritynews.com
CVE-2023-45803 - urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a ...
2 years ago
PDF Tool to Detect Malicious PDF Files - Cybersecurity News - Malicious PDF files remain a significant threat vector in cybersecurity, often used to deliver malware or exploit vulnerabilities. Detecting these threats early is crucial for protecting sensitive data and systems. This article introduces a ...
3 months ago Cybersecuritynews.com
Fake Browser Updates Used in Malware Distribution - Cybersecurity researchers from Proofpoint have identified a rising trend in threat activity that employs fake browser updates to disseminate malware. At least four distinct threat clusters have been tracked utilizing this deceptive tactic. Fake ...
2 years ago Infosecurity-magazine.com
CVE-2024-37891 - urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* ...
1 year ago
CVE-2021-34527 - <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An ...
1 year ago
CVE-2018-18688 - The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, an Incremental Saving vulnerability exists in multiple products. When an attacker uses the ...
5 years ago
Microsoft fixes ‘Print to PDF’ feature broken by Windows update - Last month, the company also warned that the June 2025 Windows security updates might be delayed due to an incorrect metadata timestamp and rolled out a configuration update to address a known issue causing Windows Update failures on some Windows 11 ...
6 months ago Bleepingcomputer.com
Why you might not be done with your January Microsoft security patches - The January patching window for your firm has probably come and gone. Has it? While January included a huge release of patches, several releases in other months have provided more than one headache for the patch management community. These are the ...
2 years ago Csoonline.com CVE-2022-41099 CVE-2022-37966
Windows "inetpub" security fix can be abused to block future updates - After people installed this month's Microsoft Patch Tuesday security updates, Windows users suddenly found an "inetpub" folder owned by the SYSTEM account created in the root of the system drive, normally the C: drive. In an update to a security ...
9 months ago Bleepingcomputer.com CVE-2025-21204
Microsoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugs - Today is Microsoft's March 2024 Patch Tuesday, and security updates have been released for 60 vulnerabilities, including eighteen remote code execution flaws. This Patch Tuesday fixes only two critical vulnerabilities: Hyper-V remote code execution ...
1 year ago Bleepingcomputer.com
Microsoft fixes VPN failures caused by April Windows updates - The list of impacted Windows versions includes Windows 11, Windows 10, and Windows Server 2008 and later. Since Redmond includes all security fixes in a single update, uninstalling the April updates will also remove all fixes for patched security ...
1 year ago Bleepingcomputer.com
New polyglot malware hits aviation, satellite communication firms - The archive contains an LNK (Windows shortcut) file disguised as an XLS, as well as two PDF files ("about-indic.pdf" and "electronica-2024.pdf"). Both PDFs are polyglot files containing a legitimate PDF file structure but an additional malicious file ...
10 months ago Bleepingcomputer.com
Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information - Once executed, the malware begins its covert operation to harvest banking credentials, credit card information, and other sensitive financial data from compromised systems. A sophisticated banking trojan known as Lampion has resurfaced with an ...
8 months ago Cybersecuritynews.com