Trustwave Research Reveals Cybersecurity Risks Threatening Patient Lives in Healthcare. Learn More

Trustwave Research Reveals Cybersecurity Risks Threatening Patient Lives in Healthcare. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Microsoft Security
Unlock the full power of Microsoft Security
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Tycoon2FA New Evasion Technique for 2025

The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at slipping past endpoints and detection systems. These include using a custom CAPTCHA rendered via HTML5 canvas, invisible Unicode characters in obfuscated JavaScript, and anti-debugging scripts to thwart inspection.

This blog takes a closer look at these methods to better understand how this kit is evolving and what defenders should be aware of.

 

1. Obfuscation Using Invisible Unicode Characters and Proxies

Lately, the Tycoon 2FA landing pages have incorporated a clever obfuscation technique using invisible Unicode characters. This technique, when paired with JavaScript Proxy objects, is designed to complicate static analysis and defer script execution until runtime.

This behavior is demonstrated in a real-world Tycoon 2FA phishing landing page, as shown in this Urlscan.io session: https://urlscan.io/result/0195c73f-bfd0-7000-8386-94b11ace6088/dom/

Figure 1. Tycoon 2FA using invisible Unicode characters to encode JavaScript code. The obfuscartion is actually quite simple but clever.
Figure 1. Tycoon 2FA using invisible Unicode characters to encode JavaScript code. The obfuscation is actually quite simple but clever.

Tycoon is using specific invisible Unicode characters to encode binary data:

  • Halfwidth Hangul Filler to represent binary 0
    • UTF-16: 0xFFA0
    • UTF-8: EF BE A0
  • Hangul Filler to represent binary 1
    • UTF-16: 0x3164
    • UTF-8: E3 85 A4

The screenshot below shows how these invisible Unicode characters are converted into their escaped Unicode representations using CyberChef:

Figure 2. Escaping the invisible Unicode characters in this sample
Figure 2. Escaping the invisible Unicode characters in this sample reveals a series of UTF-16 values ‘\uFFA0’ for binary 0 and ‘\u3164’ for binary 1.

Figure 3. Diagram of the decoding process
Figure 3. Diagram of the decoding process.

In figure 3, the encoded characters are joined into a binary string, which is then split into 8-bit segments (bytes). Each byte is then converted into its corresponding character. When an attacker wants to execute a script, they encode it using these invisible Unicode characters to represent binary.

Here's the decoding mechanism:

Figure 4. Snippet of the decoding mechanism
Figure 4. Snippet of the decoding mechanism.

As you can see in figure 4, the property name on the obfEvaluator proxy becomes the carrier of the payload. Once accessed, it triggers the decoder and dynamically evaluates the reconstructed JavaScript code.

This method:

  • Makes the payload invisible to the human eye.
  • Evades static analysis and simple pattern-matching.
  • Delays execution until runtime, often only when specific conditions are met.

Combined with other evasion layers, this approach adds a frustrating layer of indirection for analysts and defenders.

 

2. From Cloudflare Turnstile to Custom CAPTCHA

Previously, many phishing kits — including Tycoon 2FA — leaned on third-party CAPTCHA services like Cloudflare Turnstile. These services offered basic anti-bot protection, but they also introduced a weak point for defenders. Security teams could more easily fingerprint and block phishing pages using recognizable third-party elements.

Figure 5. Tycoon2FA new custom CaptchaCAPTCHA solution
Figure 5. Tycoon2FA new custom CAPTCHA solution.

Tycoon has now pivoted to a custom CAPTCHA solution, likely in an attempt to reduce its detectability and increase friction for automated analysis tools. The CAPTCHA is rendered using an HTML5 canvas element with randomized characters, background noise, and slight distortions. Here's a simplified breakdown of how it works:

Figure 6. Simplified version of the CAPTCHA mechanism
Figure 6. Simplified version of the CAPTCHA mechanism.

If CAPTCHA verification fails, a new one is generated. If successful, it sends form data and fetches instructions from an attacker-controlled server. If the server responds with an error or a non-expected value, it injects a webpage using base64-decoded HTML, loading a decoy page.

Figure 7. Screengrab of the decoy page
Figure 7. Screengrab of the decoy page.

This technique is more than cosmetic; it helps Tycoon blend into legitimate login workflows while allowing the attacker to dynamically serve decoys or reroute victims.

 

3. Anti-Debugging JavaScript

Tycoon 2FA also includes anti-debugging scripts to hinder researchers and slow down detection:

Figure 8. Anti-debugging routine of the Tycoon 2FA phishing landing page
Figure 8. Anti-debugging routine of the Tycoon 2FA phishing landing page.

This script:

  • Detects browser automation (navigator.webdriver, PhantomJS, Burp Suite)
  • Blocks dev tools shortcuts (F12, Ctrl+Shift+I, Ctrl+U, etc.)
  • Prevents right-click (disabling "Inspect Element")
  • Uses debugger with a timing check to detect if execution is paused by a debugger
  • Redirects to another site (rakuten.com) if analysis is suspected

These layers of obfuscation and evasion make dynamic analysis harder and extend the lifespan of phishing campaigns.

 

What This Means for Defenders

The recent updates to the Tycoon 2FA kit show a clear move toward stealth and evasion. While none of these techniques are groundbreaking individually, their combined use can complicate detection and response.

  • HTML5-based visuals like the custom CAPTCHA can mislead users and add legitimacy to phishing attempts.
  • Unicode and Proxy-based obfuscation can delay detection and make static analysis more difficult.
  • Anti-debugging behaviors may hide malicious activity from researchers and automated tools.

Security teams should consider behavior-based monitoring, browser sandboxing, and a deeper inspection of JavaScript patterns to stay ahead of these tactics.

 

YARA Detection Rule

YARA-Detection-Rule
Figure 9. YARA detection rule.

 

CyberChef Recipe to Decode the Tycoon2FA Javascript

CyberChef -1
Figure 10. CyberChef Recipe to Decode the Tycoon2FA Javascript.

Figure 11. To use the recipe, Click on Load Recipe, and copy-paste the Recipe to the Recipe Form
Figure 11. To use the recipe, click on "Load Recipe" and copy/paste the Recipe to the Recipe Form.

Figure 12. Paste the Tycoon2FA phishing landing page HTML source code to the CyberChef input form
Figure 12. Paste the Tycoon2FA phishing landing page HTML source code to the CyberChef input form.

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo