Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Tykit

149
Global rank
120 infographic chevron month
Month rank
124 infographic chevron week
Week rank
0
IOCs

Tykit is a sophisticated phishing-as-a-service (PhaaS) kit that emerged in May 2025, designed to steal Microsoft 365 corporate credentials through an innovative attack vector: malicious SVG files.

Phishingkit
Type
Unknown
Origin
1 April, 2025
First seen
5 January, 2026
Last seen

How to analyze Tykit with ANY.RUN

Type
Unknown
Origin
1 April, 2025
First seen
5 January, 2026
Last seen

IOCs

Domains
segy.xyz
segy.cc
loginmicr0sft0nlineeckaf.52632651246148569845521065.cc
segy.shop
satoshicommands.com
segy2.cc
hire.gworkmatch.com
hire.yt
segy.zip
o3loginrnicrosoftlogcu02re.1uypagr.com
Last Seen at

Recent blog posts

post image
Integrating a Malware Sandbox into SOAR Workf...
watchers 695
comments 0
post image
5 Ways MSSPs Can Win Clients in 2026
watchers 603
comments 0
post image
Release Notes: AI Sigma Rules, Live Threat La...
watchers 1155
comments 0

Tykit Unmasked: How the SVG Phishing Kit Hijacks Microsoft 365 Logins

Key Takeaways

  1. Tykit is a phishing kit (not a binary malware) that abuses SVG attachments to stealthily redirect victims to fake Microsoft 365 login pages.
  2. It uses multi-stage redirection, obfuscated JavaScript, and Cloudflare Turnstile CAPTCHA to evade detection.
  3. The principal threat is credential theft, which can lead to serious downstream compromise (email, data, lateral movement).
  4. Known IOCs include hashes and “segy” domains used in exfiltration logic.

Use ANY.RUN’s Threat Intelligence Lookup to search by domain patterns, explore Tykit samples, gather additional IOCs for detection.

domainName:"segy*".

Domains linked to Tykit campaigns found via TI Lookup Domains linked to Tykit campaigns found via TI Lookup

  1. Detection requires combining email/attachment filtering, network monitoring, behavioral telemetry, and threat intelligence.
  2. Prevention hinges on enforcing strong MFA / zero trust, limiting privileges, and sanitizing risky attachments.
  3. Use TI Lookup to pivot from one Tykit artifact to hundreds of related connection points, and use ANY.RUN’s Interactive Sandbox to visualize its redirection chain and extract behavioral indicators.

View a Tykit analysis session in the sandbox:

Tykit sample in the Sandbox Tykit sample detonated in the ANY.RUN Sandbox

What is Tykit Malware?

Tykit emerges in 2025 as a phishing kit that departs from simpler credential-stealers by embedding JavaScript inside SVG image files. These SVGs act as stealthy “redirectors” or “trampolines” rather than being seen as overt phishing HTML pages.

Once the victim interacts (for example, being prompted to “enter the last 4 digits of your phone number” within the SVG), the flow proceeds through a trampoline script or intermediate redirect, then to a phishing page (often imitating Microsoft 365).

The phishing landing page typically contains a Cloudflare Turnstile anti-bot / CAPTCHA widget to block automated scanners or bots, then shows a fake Microsoft login portal. After credential submission, JSON-style API calls are made to attacker-controlled domains (often containing “segy” strings) to validate or exfiltrate data.

Researchers have observed that many samples share nearly identical code structure, obfuscation, domain naming patterns, redirect logic, and C2 endpoints. This suggests a templated (or service) model rather than one-off bespoke campaigns.

The first recorded sightings in ANY.RUN’s sandbox traces date to May 2025, with campaign activity peaking in September – October 2025. Tykit has been identified targeting organizations across various sectors globally (US, Canada, EMEA, Southeast Asia) and particularly in industries that rely heavily on Microsoft 365 and corporate email: finance, government, IT, construction, professional services, telecommunications, real estate, education, etc.

Because the core mechanism is phishing / credential capture (rather than remote code execution, file encryption, etc.), it is often classified in reports as a phishing kit rather than a “malware” in the classic sense. But its sophistication, multi-stage execution, use of obfuscation and anti-detection controls, and templated reuse give it traits worth analyzing like malware

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Tykit Malware Victimology

Tykit primarily preys on corporate users in sectors handling sensitive data, with finance and construction leading the pack due to their reliance on Microsoft 365 for financial transactions and project management.

Other targeted industries include IT, professional services, government, and telecommunications, where quick access to cloud resources is critical.

Geographically, North American companies, particularly in the US and Canada, face the brunt, followed by European entities in the EMEA region and Southeast Asian firms.

Victims are often mid-to-large organizations with distributed workforces, making them vulnerable to phishing via email attachments disguised as invoices or diagrams—common lures in construction and finance.

The kit's global reach shows no favoritism toward small businesses; instead, it exploits the ubiquity of Microsoft 365, affecting over 15,000 organizations tracked in related threat reports.

How Tykit Functions

Tykit employs a multi-stage attack architecture designed to evade detection while maximizing credential harvesting efficiency.

Stage 1: Initial Delivery via SVG

The attack begins with an SVG file, typically delivered through phishing emails as an attachment or embedded link. SVG files are XML-based vector image formats that can contain embedded scripts. Tykit exploits this by hiding JavaScript code within the SVG structure.

The malicious code uses XOR encoding and reconstruction techniques to rebuild the payload, which then executes via the dangerous eval() function. This approach bypasses many email security gateways that don't deeply inspect SVG contents, treating them as simple image files.

Stage 2: Trampoline Redirection

When the victim opens the SVG file in their browser, the embedded JavaScript executes automatically, redirecting them to a "trampoline" page (an intermediate server that performs additional checks and forwards the victim to the main phishing infrastructure).

The trampoline typically includes a fake verification step, such as prompting victims to "enter the last 4 digits of your phone number" (though any input is accepted). This creates a false sense of security and legitimacy while collecting additional targeting data.

The victim's email address is encoded in Base64 and passed as a URL parameter (e.g., ?s=[base64-encoded-email]), allowing the phishing page to personalize the attack.

Stage 3: Anti-Bot Protection

The victim is then presented with a Cloudflare Turnstile CAPTCHA, which serves dual purposes:

  • Blocks automated analysis tools and security crawlers
  • Adds perceived legitimacy to the attack

The phishing page also implements basic anti-debugging techniques:

  • Blocking browser developer tools (F12, Ctrl+Shift+I)
  • Disabling right-click context menus
  • Detecting and blocking common analysis tools

Stage 4: Phishing Page Presentation

After passing the CAPTCHA, victims reach a convincing Microsoft 365 login page that closely mimics the legitimate interface, including:

  • Authentic-looking Microsoft branding and logos
  • Proper color schemes and layouts
  • Real-time email validation
  • Progressive authentication flows matching genuine Microsoft login experiences

Stage 5: Credential Exfiltration via API Calls

When victims enter their credentials, obfuscated JavaScript captures the data and transmits it through a series of API calls to the attacker's C2 servers:

  1. POST to /api/validate: Validates the submitted email address and determines next steps

  2. POST to /api/login: Exfiltrates credentials, including email addresses, passwords, expired JWT tokens (for authenticity), session data.

  3. POST to /x.php: Secondary logging endpoint for debugging or additional data collection.

The server response dictates the victim's experience:

  • Success: Displays benign HTML to mask the theft, often redirecting to legitimate Microsoft pages
  • Error: Shows "incorrect password" messages, encouraging re-entry
  • Info status: Triggers additional logging

This multi-request architecture allows attackers to validate credentials in real-time, immediately identifying high-value accounts and potentially bypassing MFA through AitM techniques.

Evasion / anti-detection measures observed:

  • Obfuscation and dynamic reconstruction of JavaScript (XOR, string splitting) to hinder static detection.
  • Use of SVG as a vector (less commonly flagged) rather than pure HTML or script attachments.
  • Use of Cloudflare Turnstile as anti-bot mechanism to block automated crawling or security scanners.
  • Reuse of common templates / code means defenders can cluster via pivoting and identify variants.

To sum up: Tykit’s functionality is not a binary dropper or red team tool, but a cleverly engineered front-end phishing kit with multiple stages, obfuscation, anti-bot measures, and template reuse.

Analysis of a Typical Tykit Phishing Attack Flow

SOC teams can quickly identify Tykit attacks using ANY.RUN’s Interactive Sandbox, which provides a fast, safe, virtual environment for hands-on analysis of malware and phishing.

Check out sandbox analysis of Tykit

Initial Delivery: Common Vectors

Tykit kill chain A common kill chain of a Tykit attack

Tykit phishing attacks tend to start with SVG images that redirect the browser to a fraudulent page. These files typically feature deceptive prompts, such as a "check stub" asking users to input seemingly harmless information, like the last four digits of a phone number, though any input is usually accepted to proceed.

Tykit fake prompt Fake prompt asking the user to enter phone digits

Trampoline and CAPTCHA Stage

After the initial interaction, the page redirects to a trampoline script, which then forwards the victim to the main phishing site. The URL often includes encoded parameters, such as the victim’s email in Base64 format.

The next step usually involves a CAPTCHA page, often using Cloudflare Turnstile or similar anti bot protections. These pages may also incorporate basic anti debugging techniques, like blocking DevTools access or disabling the context menu, to hinder analysis.

Tykit CAPTCHA page Tykit uses anti-bot protection on the phishing page using Cloudflare Turnstile

Credential Capture and C2 Communication

Once the CAPTCHA is bypassed, victims encounter a spoofed login page, commonly mimicking trusted services like Microsoft 365. Simultaneously, a background request is sent to the command and control (C2) server, typically at an endpoint like /api/validate. This request includes a session or license key, a redirect URL, and the victim’s decoded email. The C2 server responds with instructions for the next stage, often embedded in HTML, along with a status update.

Password Exfiltration and Final Actions

The final stage usually presents a password entry form. Obfuscated JavaScript embedded in the page handles the exfiltration of stolen credentials to the C2 server, often via a POST request to an endpoint like /api/login. This request typically includes the victim’s email, password, an authorization token (sometimes expired), and other metadata.

Tykit Suricata rule ANY.RUN's Interactive Sandbox automatically detects Tykit attacks

The server’s response dictates subsequent actions, such as rendering additional HTML, triggering debugging processes, or displaying fake error messages to maintain the illusion of legitimacy.

How Tykit malware threatens businesses and organizations

Although the toolkit itself is not destructive, its threat to organizations is serious because:

Credential compromise leads to further attacks

  • Once attackers gain valid credentials, they can access email, OneDrive, SharePoint, Teams, and other Microsoft 365 services — exposing sensitive data, internal communications, intellectual property, and business information.
  • Attackers can use compromised accounts to send phishing emails internally (“business email compromise” / BEC), impersonate executives, or pivot to other accounts.
  • Attackers may use credentialed access to escalate privileges, move laterally, access endpoint management tools, perform privilege escalation, or deploy ransomware / malware later.
  • The credential compromise could cause regulatory exposure (e.g. GDPR in Europe), reputational damage, financial loss from fraud, and erosion of trust.

Evasion and persistence

  • Because the phishing kit uses multi-layer redirections and anti-bot (Turnstile) logic, it may evade automated defenses and static detection.
  • Shared “segy” infrastructure means that once one campaign is known, many related ones can be identified — but until that pivoting is done, many go undetected.

Scale and reuse

  • As a phishing-as-a-service template, Tykit can be reused by multiple threat actors, increasing the number of campaigns and victim exposures.
  • The modular nature allows attackers to customize landing pages, redirect logic, and domain naming to evade blocking.

Indirect risks

  • Exfiltrated credentials can be sold or traded on underground forums.
  • The malicious infrastructure and overlapping campaign infrastructure may help attackers orchestrate broader phishing or even inject malware.
  • Trust in the organization’s security posture can be undermined.

Thus, Tykit's danger is its role as a stepping stone: the initial breach vector that enables far more serious intrusions.

Gathering Threat Intelligence on Tykit Malware

Detection of Tykit is challenging because it is a phishing kit (not a file-based payload). But TI solutions like ANY.RUN’s Threat Intelligence Lookup help with connecting indicators of compromise to the phishkit’s activities and mining additional IOCs.

TI helps map the evolution of Tykit (new domains, variant payloads, new redirect patterns), enabling defenders to anticipate new waves or clusters.

Start exploring the threat by looking it up by the name:

threatName:"tykit"

Tykit samples submitted to the Sandbox Tykit samples submitted to the Sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Tykit is a rising phishing kit threat that leverages SVG attachments, multi-stage redirects, and obfuscation logic to steal Microsoft 365 credentials. Though it doesn’t drop malware on endpoints itself, its consequences can be severe, enabling email compromise, lateral movement, and further attacks.

Because of its phishing-based nature, the most effective defenses lie in preventative controls (MFA, conditional access, email filtering), behavioral detection, and threat intelligence to rapidly identify new variants.

Sandboxes like ANY.RUN help uncover Tykit’s execution logic and support pivoting, while TI feeds help defenders block known infrastructure and hunt unknown variants. Together, these solutions and strategies form a layered defense against credential-harvesting kits like Tykit.

Start gathering actionable threat intelligence on Tykit by signing up to ANY.RUN’s TI Lookup: protect your business with timely detection and response.

HAVE A LOOK AT

Havoc screenshot
Havoc
havoc
Havoc is an advanced post-exploitation framework used by hackers to take control of a system once they've breached it. With Havoc, attackers can run commands remotely, inject malicious processes, and access sensitive data. It's often used in targeted attacks, allowing cybercriminals to stay hidden in a network while stealing information or launching further attacks. Its flexibility and ability to bypass detection make it a serious threat, especially in environments that rely on traditional security tools.
Read More
Virlock screenshot
Virlock
virlock
Virlock is a unique ransomware strain that combines encryption capabilities with file infection techniques. First observed in 2014, it stands out due to its polymorphic nature and ability to embed its code into compromised files, ensuring continued propagation. Once it infects a system, it encrypts files and locks the screen, demanding a ransom for file recovery and system access.
Read More
Salty 2FA screenshot
Salty 2FA
salty2fa
Salty 2FA is a sophisticated Phishing-as-a-Service (PhaaS) framework tailored to hijack user sessions, steal credentials, and gain unauthorized access to corporate systems. Delivered primarily via targeted emails, this kit employs multi-stage evasion tactics, making it a stealthy tool for cybercriminals aiming at high-value enterprise accounts.
Read More
Octo screenshot
Octo
octo coper
Octo malware, also known as ExobotCompact or Coper, is a sophisticated Android banking trojan that has evolved from earlier malware family Exobot. It poses a significant threat to financial institutions, mobile users, and enterprise networks.
Read More
Fog Ransomware screenshot
Fog is a ransomware strain that locks and steals sensitive information both on Windows and Linux endpoints. The medial ransom demand is $220,000. The medial payment is $100,000. First spotted in the spring of 2024, it was used to attack educational organizations in the USA, later expanding on other sectors and countries. Main distribution method — compromised VPN credentials.
Read More
Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More