Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

February 21, 2026

Why 84% of Security Programs Are Falling Behind

February 21, 2026

Android Malware Hijacks Google Gemini to Stay Hidden

February 20, 2026
Facebook X (Twitter) Instagram
Saturday, February 21
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
News

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

Team-CWDBy Team-CWDFebruary 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly uncovered phishing kit allows cybercriminals to steal usernames and passwords with a toolkit which spoofs live login pages and bypasses multi-factor authentication (MFA) protections, cybersecurity analysts have warned.

Dubbed Starkiller, the phishing platform has been detailed by researchers at Abnormal, who have described it as “a commercial-grade cybercrime platform” and “a comprehensive toolkit for stealing identities at scale”.

The tool is distributed on the dark web like a software-as-a-service (SaaS) product, complete with a subscription model, updates and customer support.

Researchers noted that while the Starkiller name is shared with a legitimate red team penetration testing tool by BC Security, the two platforms are not related.

What makes Starkiller notable is how it differs from many other phishing kits.

Most rely on static HTML clones of the login page the attackers want to replicate. But with Starkiller, the phishing site is launched through a proxy operated by attacker-controlled infrastructure which is indistinguishable from the real login portal being used as template.

“Recipients are served genuine page content directly through the attacker’s infrastructure, ensuring the phishing page is never out of date. And because Starkiller proxies the real site live, there are no template files for security vendors to fingerprint or blocklist,” Abnormal researchers explained.

The proxy is launched in a headless Chrome instance and gives the user little to no reason for suspicion. However, the infrastructure means that the credentials entered are set directly to the attackers.

The Starkiller kit provides attackers with the ability to mimic Google, Microsoft, Facebook, Apple, Amazon, Netflix, PayPal, various banks and many more online services. The tool generates a deceptive URL that visually mimics the legitimate domain while routing traffic through the attacker’s infrastructure.

Starkiller also offers cybercriminals real-time session monitoring, allowing them to watch the target interact with the phishing page live, as well as the use of a keylogger to capture anything the victim enters.

How Starkiller Enables MFA Bypass

The way Starkiller has been built also enables it to bypass MFA. This is because the targeted user is authenticating with the real site through the proxy.

That means any one-time codes or authentication tokens they submit are forwarded to the legitimate service in real time, providing attackers with direct access to the account.

According to Abnormal, the most likely way which Starkiller attacks are distributed is by phishing emails which imitate legitimate alerts and notifications from the likes of Google and Microsoft.

The toolkit is sold as a subscription-based toolkit with a monthly fee, meaning users are provided with updates to the platform and helpdesk support via Telegram.

“The level of ongoing development means Starkiller is likely to become increasingly difficult to detect and defend against,” warned Abnormal researchers, who have also described the tool as “a significant escalation in phishing infrastructure.”

To defend against attacks deployed by Starkiller, it’s recommended that organizations watch for anomalous login patterns or session token reuse from unexpected locations.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAPT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Next Article First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
Team-CWD
  • Website

Related Posts

News

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

February 21, 2026
News

Why 84% of Security Programs Are Falling Behind

February 21, 2026
News

Android Malware Hijacks Google Gemini to Stay Hidden

February 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Find your weak spots before attackers do

November 21, 2025

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.