Tykit Analysis: New Phishing Kit Stealing Hundreds of Microsoft Accounts in Finance
A new phishing kit named Tykit has been discovered targeting Microsoft 365 accounts across various industries. The campaign, active since May 2025, uses SVG files as delivery vectors and implements a multi-stage attack chain. Tykit mimics Microsoft login pages, employs evasion tactics, and executes client-side code in several stages. The most affected industries include construction, professional services, IT, finance, government, and telecom, with victims spread across the US, Canada, LATAM, EMEA, Southeast Asia, and the Middle East. The kit utilizes Cloudflare Turnstile for anti-bot protection and implements basic anti-debugging measures. It exfiltrates stolen credentials through a series of API calls to its command and control servers.
Pulse ID: 68f7ffe93793818f9533f09b
Pulse Link: https://otx.alienvault.com/pulse/68f7ffe93793818f9533f09b
Pulse Author: AlienVault
Created: 2025-10-21 21:49:29
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Asia #Canada #Cloud #CyberSecurity #Government #ICS #InfoSec #Microsoft #MiddleEast #Mimic #OTX #OpenThreatExchange #Phishing #RAT #SVG #Telecom #bot #AlienVault