A new phishing campaign has emerged that distributes the Tycoon 2FA phishing kit through fraudulent timesheet notification emails. The emails, crafted to appear as automated payroll reports, are part of a sophisticated credential theft operation. These phishing messages exploit the ubiquity of timesheet systems in corporate environments, using urgent language about payroll issues to trick recipients into clicking embedded links. This marks an evolution in phishing techniques as attackers now leverage legitimate platforms to bypass traditional email security filters.
The phishing campaign uses Pinterest as an intermediary redirector, a tactic that allows the attackers to evade email gateway detection. When the victim clicks on the embedded “review” button, they are first redirected to a Pinterest subdomain, which then leads them to the final payload hosted on a compromised Russian domain. This multi-step delivery process serves two purposes: it utilizes Pinterest’s trusted reputation to avoid detection and obscures the ultimate malicious destination from both the user and security scanners.
This approach shows the attackers’ increasing sophistication and their ability to bypass traditional security measures.
Once the victim lands on the final payload, the Tycoon 2FA phishing kit is deployed. This phishing-as-a-service kit has evolved to include advanced anti-detection features, such as obfuscated JavaScript that alters payload signatures and geofencing to block access from cybersecurity researcher locations. Additionally, the kit now mimics legitimate login portals, including those for Microsoft 365, Salesforce, Workday, and various banking services. The inclusion of these services suggests that the attackers may be collaborating with ransomware affiliates, aiming to gain privileged access to networks.
The use of platforms like Pinterest as an intermediary reflects a broader trend where threat actors exploit legitimate cloud services to enhance the effectiveness of their attacks. By utilizing these platforms, they can bypass secure email gateways, defeat browser-based phishing protections, and maintain operational flexibility with easily replaceable redirectors. As two-factor authentication becomes more widespread, attackers continue refining their methods, indicating that traditional security measures are no longer enough. Organizations must adapt by implementing behavior-based detection systems and enforcing least-privilege access models to combat evolving credential theft operations.