heroui logo

Link: Tycoon2FA phishing kit (non-exhaustive)

Sublime Rules

View Source
Summary
This detection rule identifies potential phishing attempts using the Tycoon2FA phishing kit by analyzing specific patterns in the Document Object Model (DOM) structure and observing characteristics associated with content delivery networks (CDN). It examines links within inbound data, focusing on certain indicators like free subdomain hosts and suspicious top-level domains (TLDs). The rule captures the evolving nature of the Tycoon2FA kit, which may not be exhaustive in detecting all variants but aims to complement existing detections. The detection logic includes various parts checking for unique link access patterns, CAPTCHA structures, and other heuristics consistent with the phishing kit's tactics, indicating potential malicious behavior when certain conditions are met, such as the use of randomized image domains for CAPTCHAs and distinct form submissions.
Categories
  • Web
  • Cloud
  • Identity Management
Data Sources
  • Web Credential
  • Network Traffic
Created: 2025-12-03