Starkiller phishing-as-a-service MFA bypass targets major global brands

Starkiller phishing-as-a-service MFA bypass targets major global brands

Starkiller phishing-as-a-service MFA bypass: The next evolution in credential theft

Phishing has evolved from simple static pages to sophisticated real-time relays. A new platform called Starkiller is changing the landscape by loading actual websites through a reverse proxy instead of using outdated copies. It functions as a man-in-the-middle, passing data directly between the victim and legitimate services like Microsoft or Google. This technique allows attackers to capture more than just passwords; they can intercept multi-factor authentication codes and session cookies as they are entered. The Starkiller phishing-as-a-service MFA bypass effectively renders traditional protections useless by authenticating the criminal into the real account in real-time.

The service is managed by a threat group known as Jinkusu and operates with the efficiency of a legitimate software business. It provides its customers with a professional dashboard, performance analytics, conversion rates, and automated alerts delivered via Telegram. One of its most effective features is a URL masker that utilizes the @ symbol trick to hide malicious links behind trusted domain names. By significantly lowering the technical requirements for hackers, Starkiller enables even individuals with limited skills to launch advanced attacks that bypass standard domain blocklisting and static analysis tools.

Прокрутить вверх