← Back to BrewedIntel
malwarehighAI-enhanced PhishingIdentity TheftMFA BypassTycoon2FAStorm-1747

Apr 02, 2026 • Sherrod DeGrippo

Threat actor abuse of AI accelerates from tool to cyberattack surface

AI is fundamentally transforming the cyber threat landscape by enhancing attack precision, scale, and effectiveness. Microsoft research reveals AI-enabled...

Source
Microsoft Security Blog
Category
malware
Severity
high

Executive Summary

AI is fundamentally transforming the cyber threat landscape by enhancing attack precision, scale, and effectiveness. Microsoft research reveals AI-enabled phishing campaigns achieve 450% higher click-through rates compared to traditional methods, with click rates reaching 54%. Storm-1747's Tycoon2FA operation exemplifies this shift, generating tens of millions of phishing emails monthly and compromising nearly 100,000 organizations since 2023, accounting for 62% of all blocked phishing attempts at its peak. The operation deployed adversary-in-the-middle techniques to bypass MFA in real-time. Microsoft disrupted Tycoon2FA in March 2025, seizing 330 domains in coordination with Europol. The article emphasizes that the structural threat has changed from individual sophisticated actors to an industrialized cybercrime ecosystem that lowers entry barriers for all threat actors through AI-enhanced services and modular subscription models.

Summary

Generative AI is upgrading cyberattacks, from 450% higher phishing click‑through rates to industrialized MFA bypass. The post Threat actor abuse of AI accelerates from tool to cyberattack surface appeared first on Microsoft Security Blog .

Published Analysis

AI is fundamentally transforming the cyber threat landscape by enhancing attack precision, scale, and effectiveness. Microsoft research reveals AI-enabled phishing campaigns achieve 450% higher click-through rates compared to traditional methods, with click rates reaching 54%. Storm-1747's Tycoon2FA operation exemplifies this shift, generating tens of millions of phishing emails monthly and compromising nearly 100,000 organizations since 2023, accounting for 62% of all blocked phishing attempts at its peak. The operation deployed adversary-in-the-middle techniques to bypass MFA in real-time. Microsoft disrupted Tycoon2FA in March 2025, seizing 330 domains in coordination with Europol. The article emphasizes that the structural threat has changed from individual sophisticated actors to an industrialized cybercrime ecosystem that lowers entry barriers for all threat actors through AI-enhanced services and modular subscription models. Generative AI is upgrading cyberattacks, from 450% higher phishing click‑through rates to industrialized MFA bypass. The post Threat actor abuse of AI accelerates from tool to cyberattack surface appeared first on Microsoft Security Blog . For the last year, one word has represented the conversation living at the intersection of AI and cybersecurity: speed. Speed matters, but it’s not the most important shift we are observing across the threat landscape today. Now, threat actors from nation states to cybercrime groups are embedding AI into how they plan, refine, and sustain cyberattacks. The objectives haven’t changed, but the tempo, iteration, and scale of generative AI enabled attacks are certainly upgrading them. Explore integrated security solutions with Microsoft Defender However, like defenders, there is typically a human-in-the-loop still powering these attacks, and not fully autonomous or agentic AI running campaigns. AI is reducing friction across the attack lifecycle; helping threat actors research faster, write better lures, vibe code malware, and triage stolen data. The security leaders I spoke with at RSAC™ 2026 Conference this week are prioritizing resources and strategy shifts to get ahead of this critical progression across the threat landscape. The operational reality: Embedded, not emerging The scale of what we are tracking makes the scope impossible to dismiss. Threat activity spans every region. The United States alone represents nearly 25% of observed activity, followed by the United Kingdom, Israel, and Germany. That volume reflects economic and geopolitical realities. 1 But the bigger shift is not geographic, it’s operational. Threat actors are embedding AI into how they work across reconnaissance, malware development, and post-compromise operations. Objectives like credential theft, financial gain, and espionage might look familiar, but the precision, persistence, and scale behind them have changed. Email is still the fastest inroad Email remains the fastest and cheapest path to initial access. What has changed is the level of refinement that AI enables in crafting the message that gets someone to click. When AI is embedded into phishing operations, we are seeing click-through rates reach 54%, compared to roughly 12% for more traditional campaigns. That is a 450% increase in effectiveness . That’s not the result of increased volume, but the result of improved precision. AI is helping threat actors localize content and adapt messaging to specific roles, reducing the friction in crafting a lure that converts into access. When you combine that improved effectiveness with infrastructure designed to bypass multifactor authentication (MFA), the result is phishing operations that are more resilient, more targeted, and significantly harder to defend at scale. A 450% increase in click-through rates changes the risk calculus for every organization. It also signals that AI is not just being used to do more of the same, it is being used to do it better. Tycoon2FA: What industrial-scale cybercrime looks like Tycoon2FA is an example of how the actor we track as Storm-1747 shifted toward refinement and resilience. Understanding how it operated teaches us where threats might be headed, and fueled conversations in the briefing rooms at RSAC 2026 this week that focused on ecosystem instead of individual actors. Tycoon2FA was not a phishing kit, it was a subscription platform that generated tens of millions of phishing emails per month. It was linked to nearly 100,000 compromised organizations since 2023. At its peak, it accounted for roughly 62% of all phishing attempts that Microsoft was blocking every month. This operation specialized in adversary-in-the-middle attacks designed to defeat MFA. It intercepted credentials and session tokens in real time and allowed attackers to authenticate as legitimate users without triggering alerts, even after passwords were reset. But the technical capability is only part of the story. The bigger shift is structural. Storm-1747 was...

Linked Entities

  • Tycoon2FA
  • Storm-1747