2026-03-20 | OSINT and Intelligence | Oracle-42 Intelligence Research
```html

Email Header Analysis: Tracking the Origin of Tycoon 2FA and SSO Phishing Campaigns

Executive Summary: Adversary-in-the-Middle (AiTM) phishing kits like Tycoon 2FA and SSO-focused campaigns exploit email header manipulation to evade detection and harvest credentials. This article provides a technical deep-dive into using email header analysis—leveraging OSINT and DNS intelligence—to trace phishing infrastructure, attribute campaigns, and disrupt threat actors operating under the Phishing-as-a-Service (PhaaS) model. We analyze real-world IOCs, DNS fingerprints, and header anomalies to reveal how modern phishing campaigns are orchestrated and how defenders can counter them.

Key Findings

Understanding the Threat: Tycoon 2FA and SSO Phishing

Tycoon 2FA is a first-of-its-kind AiTM phishing kit, introduced in August 2023 and distributed via a Phishing-as-a-Service model. Unlike traditional phishing, AiTM kits intercept authentication flows in real time, capturing session tokens and cookies—rendering two-factor authentication (2FA) ineffective. The kit primarily targets Microsoft 365 environments, harvesting credentials and session data to enable account takeover and lateral movement.

SSO-focused phishing campaigns, particularly those targeting educational institutions, have surged in volume. DNS-based analysis reveals coordinated campaigns using fake login portals mimicking university SSO pages. These attacks are not isolated; they are orchestrated through rented infrastructure, bulletproof hosting, and compromised SMTP relays to bypass email filtering.

In both cases, email header manipulation plays a central role in obfuscating the true origin of phishing emails. Attackers forge headers, abuse legitimate services, and chain compromised systems to deliver malicious payloads undetected.

The Role of Email Headers in Phishing Attribution

Email headers are a goldmine of forensic data. Each hop in the email delivery chain leaves a trace in the headers, including:

When analyzed in aggregate, these fields allow analysts to:

DNS Intelligence: Uncovering the Backend Infrastructure

While email headers reveal delivery mechanics, DNS intelligence uncovers the command-and-control (C2) and hosting infrastructure behind phishing campaigns. Techniques include:

For example, in SSO phishing campaigns targeting higher education, DNS analysis has uncovered clusters of domains hosted on bulletproof hosting providers in offshore jurisdictions, with MX records pointing to compromised university mail servers—used as relays to bypass security controls.

Case Study: Tracing a Tycoon 2FA Campaign via Email Headers and DNS

In a recent incident, a phishing email purporting to be a Microsoft Teams notification was delivered to a target organization. Header analysis revealed:

DNS lookups on the originating IP showed:

Further correlation revealed that the Message-ID matched Tycoon 2FA samples reported in OSINT feeds, confirming the campaign’s affiliation with the PhaaS operation. The infrastructure was subsequently flagged for takedown via abuse channels and DNS sinkholing.

Recommendations for Defenders and Intelligence Teams

To effectively disrupt AiTM and SSO phishing campaigns, organizations should implement a multi-layered OSINT and intelligence-driven defense:

1. Automate Email Header Analysis

2. Leverage DNS Intelligence

3. Disrupt PhaaS Infrastructure