New Phishing Framework Starkiller Proxies Real Login Pages to Bypass MFA

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A highly sophisticated phishing framework named Starkiller has recently emerged, offering attackers an advanced method to steal credentials and bypass multi-factor authentication.

Developed by a group known as Jinkusu, this malicious toolkit is sold as a commercial software-as-a-service product.

Unlike older toolkits relying on static copies of legitimate websites, this new platform loads real login pages dynamically.

This approach allows low-skill attackers to launch convincing enterprise-grade campaigns without managing complex server infrastructure.

The primary delivery channel for this threat is deceptive email messages containing malicious links. When a target clicks the link, the framework spins up a hidden web browser inside a secure container to load the actual brand website in real time.

The attacker’s server then acts as a middleman, forwarding the victim’s keystrokes, passwords, and multi-factor authentication codes directly to the legitimate service.

Because victims interact with the genuine website through a proxy, the impact is severe, leading to rapid account takeovers and widespread session hijacking.

This malicious infrastructure also includes specialized tools designed for financial fraud, capturing credit card details and cryptocurrency wallet recovery phrases.

Abnormal analysts/researchers noted or identified the malware framework’s ability to generate deceptive web addresses that visually mimic trusted domains.

Starkiller’s landing page, advertising a 99.7% success rate (Source – Abnormal)

By combining fake software update templates with advanced link obfuscation techniques, the platform tricks users and automated security scanners.

Attackers can monitor active sessions continuously from a polished control panel, capturing sensitive information without triggering immediate alarms.

Detection Evasion And Defense Strategies

Traditional security defenses struggle to stop this proxy-based approach because the framework eliminates the static files that defenders typically block.

Since the malicious server relays the exact content of the legitimate portal, page fingerprinting tools cannot distinguish fake sessions from real ones.

Platform control panel where operators paste a brand’s website URL and deploy (Source – Abnormal)

The platform integrates web address shorteners and visual masking tricks to hide the true destination of malicious links.

Starkiller’s capabilities, including MFA bypass and cookie stealing (Source – Abnormal)

To combat this threat, security teams must move away from relying solely on static page analysis and domain reputation scores.

The recommendation is to implement identity-aware security solutions that monitor for behavioral anomalies.

Defenders should actively track unusual login locations, unexpected device attributes, and instances of session token reuse.

By focusing on behavioral signals rather than static indicators, organizations can reliably detect and block these dynamic compromises.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.