ShinyHunters has exposed a critical weakness in cloud systems. The McGraw Hill breach shows how misconfigured Salesforce portals enabled large scale data leaks, with no software flaw to fix. This marks a shift toward exploiting common operational gaps rather than rare vulnerabilities.
Anthropic’s Mythos clampdown, April’s record Patch Tuesday and Nvidia’s Blackwell‑to‑Rubin GPU roadmap mark a turning point in cyber defence, exposing how deeply allied nations now rely on US‑controlled, agentic AI to detect and counter zero‑day threats.
Booking.com confirms hackers accessed customer names, emails, addresses, and booking details via third-party compromise. Stolen data is already fuelling targeted WhatsApp phishing attacks, exposing deep supply chain vulnerabilities in global travel platforms.
23rd March 2026 Cyber Update: Tycoon 2FA Phishing Takedown
A global coalition led by Microsoft and Europol has dismantled the Tycoon 2FA phishing-as-a-service platform, a major criminal enterprise that enabled attackers to bypass multi-factor authentication and compromise nearly 100,000 organisations worldwide.
Cyber News Centre's cyber update for 23rd March 2026: A coordinated global operation has dismantled the prolific Tycoon 2FA phishing-as-a-service platform, which enabled thousands of cybercriminals to bypass multi-factor authentication and attack organisations across Australia and the world.
The Update and Why It Matters
Update: A global law enforcement and private sector coalition, led by Microsoft and Europol and supported by partners including Coinbase, Cloudflare, Intel471, Proofpoint, Shadowserver and SpyCloud, has dismantled the infrastructure of Tycoon 2FA, one of the largest phishing-as-a-service operations worldwide. Acting under a court order from the U.S. District Court for the Southern District of New York, investigators seized roughly 330 active domains used for Tycoon 2FA control panels and phishing pages, disrupting a criminal ecosystem that had operated more than 24,000 domains since its launch. By mid‑2025, Tycoon 2FA was responsible for approximately 62% of all phishing attacks blocked by Microsoft, generating around 30 million malicious emails per month and reaching more than 500,000 organisations worldwide, with notable exposure across critical sectors such as healthcare, education and finance.
The service functioned as a transparent reverse proxy, enabling attackers to hijack authenticated sessions and persist access even after password changes, fuelling business email compromise, data theft and downstream ransomware campaigns. Microsoft and its partners have also identified the primary developer as Pakistan-based Saad Fridi and signalled that civil and criminal proceedings will continue as investigators pursue operators and high-value customers of the platform, which is estimated to have impacted tens of thousands of individual victims and nearly 100,000 organisations.
Why it Matters: The takedown of Tycoon 2FA shows the industrial scale of the credential theft economy and the limitations of traditional multi-factor authentication when deployed without phishing-resistant protections. For Australian organisations—especially in healthcare, education, financial services and government—this incident underlines that MFA alone is not a guarantee of account security when sophisticated AiTM tools can proxy logins and capture session tokens.
The platform’s success in compromising enterprise accounts highlights systemic risk to corporate data, supply chains and financial assets, where a single stolen session can be used for invoice fraud, payroll diversion and high-impact business email compromise. This operation reinforces the need for phishing-resistant authentication such as FIDO2 security keys, conditional access policies, device-based signals and continuous session monitoring, combined with an assume-breach approach to detection and response to contain intrusions even after initial access is gained.
As law enforcement and technology providers continue to disrupt major PhaaS platforms, organisations need to harden identity systems, reduce reliance on legacy MFA alone and prepare for the rapid emergence of successor services seeking to fill the gap left by Tycoon 2FA.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
ShinyHunters has exposed a critical weakness in cloud systems. The McGraw Hill breach shows how misconfigured Salesforce portals enabled large scale data leaks, with no software flaw to fix. This marks a shift toward exploiting common operational gaps rather than rare vulnerabilities.
Booking.com confirms hackers accessed customer names, emails, addresses, and booking details via third-party compromise. Stolen data is already fuelling targeted WhatsApp phishing attacks, exposing deep supply chain vulnerabilities in global travel platforms.
Anthropic’s rapid push into enterprise AI and its $30B raise signal a new phase where autonomous systems drive both productivity and cyber risk. As AI executes tasks at machine speed, markets, governments and workers face a sharper question: who controls the systems now shaping outcomes.
Zero‑day bugs in high‑privilege edge and security tools are being weaponised faster than organisations can patch, compressing response windows for Asia–Pacific defenders and turning shared enterprise stacks into a regional blast radius for attack.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!