ANY.RUN Discovers A New Salty2fa And Tycoon2fa Phishing Hybrid Targeting Enterprises
Overview of the New Phishing Attack
Following an abrupt drop in Salty2FA activity, ANY began seeing samples that combine Salty's early stages with Tycoon2FA's later payloads. The consistent overlap in indicators and behavior confirms that recent phishing campaigns are now running a unified chain built from both frameworks
Key findings include:
. Hybrid payloads observed: Samples showed Salty2FA's initial stages followed by Tycoon2FA's execution chain almost line-for-line.
. Fallback behavior identified: When Salty domains failed with SERVFAIL, the payload switched to Tycoon2FA hosting and delivery infrastructure.
. Cross-kit indicators detected: Shared IOCs, overlapping TTPs, and matched detection rules confirmed the presence of both kits within single sessions.
. Potential operator link: The overlap aligns with earlier assessments pointing to Storm-1747, known operators of Tycoon2FA, suggesting shared control or cooperation behind both kits.
. Impact on attribution: The merging of client-side code complicates traditional kit-level attribution and requires updated detection logic.
. Operational shift expected: More cross-kit blending is likely, meaning defenders should prepare for phishing campaigns that move between frameworks mid-execution.
For a deeper look at the hybrid samples, full code comparisons, and guidance for SOC teams, visit the ANY blog.
How This Hybrid Affects SOC Teams
The unified Salty2FA–Tycoon2FA workflow means phishing incidents may shift frameworks mid-execution. This complicates attribution and weakens traditional signatures. SOC teams should monitor both kits together, emphasize behavioral detection, and watch for fallback payloads that bridge one framework to the other.
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.

Comments
No comment