Home OSINT News Signals
CYBER2026-03-03

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Cybersecurity researchers have detailed a new phishing suite called Starkiller that poses a significant threat to organizational defenses. This platform, advertised by the Jinkusu threat group, uses an adversary-in-the-middle reverse proxy to bypass multi-factor authentication. The tool allows criminals to select a legitimate brand's URL and serve a live, proxied version of its real login page to victims.

The technique is highly effective. Starkiller launches a headless browser inside a Docker container to load the authentic website. It then acts as a reverse proxy, ensuring the phishing page displays genuine, up-to-date content. Because the page is served live from the real site, there are no static templates for security tools to fingerprint and blocklist.

This live proxying captures every user interaction. All keystrokes, passwords, session tokens, and even one-time codes are routed through attacker infrastructure. This data breach method directly enables full account takeover, negating the security of MFA. The platform centralizes these sophisticated phishing operations into a single dashboard.

The service lowers the barrier for cybercrime. It grants low-skill actors access to advanced exploit capabilities like session hijacking and MFA bypass. Users can also employ URL shorteners to mask malicious links, making phishing emails more convincing. This represents a dangerous commoditization of high-level attack techniques.

This development coincides with the evolution of other malware kits. A separate phishing kit targeting password managers has recently added sophisticated features. These include pre-phishing fingerprinting, logic to filter out bots, and enhanced support for stealing one-time passcodes and recovery codes.

The rise of such tools underscores a critical vulnerability in common security postures. While blockchain security advances for crypto assets, traditional credential protection is under assault. The Starkiller suite exemplifies how attackers continuously innovate to find gaps, leveraging zero-day style techniques in phishing infrastructure.

Organizations must reinforce human defenses. Continuous training to recognize sophisticated phishing attempts is now crucial. The threat landscape is shifting from easily spotted fake pages to perfect replicas that steal credentials in real time. Vigilance and layered security controls remain the best defense against these evolving ransomware and data breach campaigns.

Back to News