# Tycoon 2FA Phishers Shift Tactics: Device Code Phishing Emerges as New Threat Vector
As security defenses against traditional phishing attacks have strengthened, the threat landscape continues to evolve. A notable shift has been detected among actors known as "Tycoon," a phishing-for-hire group, who have abandoned their previous two-factor authentication (2FA) interception strategies in favor of a more sophisticated approach: device code phishing. This tactical pivot represents a concerning development in account takeover attacks, exploiting legitimate authentication flows that many organizations have yet to fully secure.
## The Threat: Device Code Phishing Explained
Device code phishing represents a departure from conventional phishing and 2FA bypass techniques. Rather than attempting to intercept or manipulate SMS or time-based one-time passwords (TOTP), attackers now exploit the device code authentication flow—a feature designed to streamline login for devices without traditional browsers, such as smart TVs, IoT devices, and headless applications.
In this attack scenario, victims are deceived into visiting a legitimate-looking website or clicking on a malicious link that mimics their target service's authentication interface. The victim is prompted to enter a code displayed on their screen into a device code authorization page. What the victim doesn't realize is that they're actually authorizing the attacker's device to access their account.
The attack flow typically follows this pattern:
## Background and Context: The Tycoon Evolution
Tycoon has operated as a phishing-for-hire operation, monetizing account takeover attacks by selling access to compromised accounts on the dark web. The group has historically focused on targeting high-value accounts across multiple sectors, including technology companies, financial institutions, and SaaS platforms.
Previously, Tycoon's success relied on intercepting authentication tokens and bypassing 2FA mechanisms through various techniques:
As organizations deployed stronger security measures—including hardware security keys, biometric authentication, and improved 2FA detection mechanisms—Tycoon's traditional methods became less reliable. This forced the group to adapt or face declining profitability.
The shift to device code phishing suggests several tactical advantages for attackers:
## Technical Details: How Device Code Phishing Works
To understand the severity of this threat, it's important to examine the device code flow and its vulnerabilities.
### The Legitimate Device Code Flow
The OAuth 2.0 Device Authorization Grant was designed to solve a real problem: enabling authentication on devices without traditional web browsers. The flow works as follows:
1. Device requests an authorization code from the authentication server
2. Server generates a device code and user code
3. Device displays the user code to the victim
4. Victim visits the authorization endpoint on a web browser and enters the user code
5. Victim approves the device
6. Device polls the server and exchanges the device code for access tokens
This flow is legitimate and widely implemented by major cloud providers, streaming services, and enterprise platforms.
### The Attack Vector
Attackers exploit this flow through social engineering:
| Step | Legitimate User | Attacker |
|------|---|---|
| Initiation | User logs in on their device | Attacker initiates device code flow for their own account |
| User Code Display | Device shows unique code | Attacker sends phishing message to victim with user code |
| Authorization | User enters code on official website | Victim enters code (thinking they're logging into their own account) |
| Authorization Grant | User approves device | Victim unknowingly approves attacker's device |
| Token Exchange | Device receives tokens | Attacker's device receives valid access tokens |
| Result | User logs into their own device | Attacker gains account access |
The effectiveness of this attack lies in its social engineering component. If the phishing page is well-crafted and the victim is in a hurry or suspicious, they may blindly enter the code without examining the URL carefully.
## Why This Matters: Implications for Organizations
The rise of device code phishing presents several concerning implications:
### 1. Expanding Attack Surface
Organizations that have hardened their traditional authentication mechanisms now face attacks through alternative authentication flows. Device code authorization is often less scrutinized than primary login attempts, creating a blind spot in security monitoring.
### 2. Account Takeover at Scale
Device code phishing enables attackers to compromise accounts without requiring:
This dramatically lowers the technical barrier for account takeover attacks.
### 3. Persistent Access
Unlike token theft, device authorization grants long-term credentials. An attacker with an authorized device can maintain access even after the victim changes their password, reset their authenticator, or reviews their active sessions—if the legitimate user doesn't specifically revoke the unauthorized device.
### 4. Detection Challenges
Most users don't regularly audit their authorized devices. An attacker-controlled device authorization may go unnoticed for weeks or months, providing an extended window for data theft, lateral movement, or privilege escalation.
### 5. Cascading Compromise
Account takeover is often just the first step. Attackers use compromised accounts to:
## Recommendations: Defense and Detection
Organizations and individuals should implement layered defenses to mitigate device code phishing risk:
### For Organizations
### For Users
## Conclusion
The Tycoon group's pivot to device code phishing underscores a fundamental principle in security: attackers follow the path of least resistance. As defenses strengthen against traditional attacks, new vulnerabilities emerge. Device code phishing is likely not the last tactic to exploit legitimate authentication mechanisms.
Organizations that have invested heavily in securing passwords and 2FA should not consider their account security complete. A holistic approach—including device authorization monitoring, user education, and risk-based controls—is necessary to defend against the evolving threat landscape. As phishing-for-hire operations continue to adapt, so too must the defenses that protect our accounts and data.