Glowing text reads STARKILLER in bright blue and CREDENTIAL_HARVESTER in red against a dark, digital background with vertical red lines, resembling a tech or cyber theme.

New Phishing Framework Starkiller Proxies Real Login Pages to Bypass MFA

By Published On: February 24, 2026

 

Starkiller: The Phishing Framework That Proxies Real Login Pages to Bypass MFA

The digital threat landscape constantly evolves, and with it, the sophistication of attacker tools. A new and particularly insidious phishing framework, dubbed Starkiller, has recently emerged, dramatically raising the bar for credential theft and multi-factor authentication (MFA) bypass techniques. Developed by a group known as Jinkusu, this framework isn’t just another phishing kit; it represents a significant leap forward in adversary capabilities, designed to defeat security measures that many organizations rely upon.

What is Starkiller and How Does it Work?

Starkiller distinguishes itself from traditional phishing toolkits by employing a highly advanced method of operation: real-time proxying of legitimate login pages. Unlike older frameworks that simply created static, copied versions of target websites, Starkiller acts as an intermediary, sitting between the victim and the legitimate service.

  • When a victim clicks on a Starkiller-crafted phishing link, they are redirected through the framework.
  • Starkiller then loads the actual, live login page of the targeted service (e.g., Microsoft 365, Google, banking portals).
  • As the victim types their credentials into this seemingly authentic page, Starkiller intercepts the input in real-time.
  • Crucially, because it’s proxying the live page, Starkiller can capture not only usernames and passwords but also MFA tokens or session cookies generated during the legitimate authentication process.
  • This real-time interaction makes detection incredibly difficult for users, as the page looks and behaves exactly like the real thing. It’s not a static replica; it’s a dynamic, live session hijack.

This “man-in-the-middle” (MitM) approach effectively neutralizes many common MFA solutions that rely on a user’s browser directly interacting with the legitimate service. By proxying the session, Starkiller allows attackers to steal session cookies post-MFA, rendering the MFA useless for preventing subsequent unauthorized access.

The Business of Cybercrime: Starkiller as a Commercial SaaS

Adding another layer of concern, Starkiller is not a freely distributed tool. It’s offered as a commercial Software-as-a-Service (SaaS) product. This commercialization lowers the barrier to entry for less technically skilled attackers, making sophisticated phishing capabilities accessible to a wider range of threat actors. Jinkusu’s offering includes ongoing development, support, and infrastructure, allowing subscribers to launch highly effective phishing campaigns with relative ease. This trend of “phishing-as-a-service” underscores the growing professionalization of cybercrime.

Impact and Risks to Organizations

The emergence of Starkiller poses significant risks to organizations of all sizes:

  • Increased Credential Theft: The ability to bypass MFA makes successful credential theft campaigns far more likely.
  • Data Breaches: Stolen credentials can lead to unauthorized access to sensitive data, intellectual property, and financial systems.
  • Business Email Compromise (BEC): Attackers gain access to employee email accounts, enabling them to launch further internal phishing attacks or financial fraud.
  • Supply Chain Attacks: Access to one organization’s systems can be leveraged to attack its partners and customers.
  • Reputational Damage: Data breaches and security incidents severely undermine customer trust and brand reputation.

Remediation Actions and Mitigations

Combating a sophisticated framework like Starkiller requires a multi-layered defense strategy. While no single solution offers complete immunity, a combination of technical controls and user education significantly reduces risk.

  • Implement FIDO2/Hardware-Based MFA: Unlike traditional MFA (e.g., SMS, TOTP, push notifications), FIDO2-compliant security keys (like YubiKey or Google Titan) are significantly more resistant to phishing. They cryptographically verify the origin of the login page, making MitM attacks like Starkiller ineffective.
  • Educate Users on URL Verification: Train employees to meticulously check URLs, not just for spelling errors, but for subtle subdomain misdirection or unexpected redirect chains. While Starkiller proxies the real site, the initial phishing link will originate from the attacker’s domain.
  • Deploy Advanced Email Security Gateways (SEG): Invest in SEGs that utilize AI/ML to detect sophisticated phishing attempts, including those using newly registered domains or unusual sender patterns.
  • Enable Conditional Access Policies: Implement policies that restrict access based on device health, location, IP address reputation, and other contextual factors. This can flag anomalous login attempts even with stolen credentials.
  • Utilize Security Awareness Training (SAT) Platforms: Regularly conduct simulated phishing exercises to test user resilience and reinforce best practices for identifying social engineering attempts.
  • Implement Endpoint Detection and Response (EDR)/Extended Detection and Response (XDR): These solutions can help detect post-compromise activities even if initial credential theft was successful, by monitoring for unusual user behavior or lateral movement.
  • Regularly Monitor for Suspicious Activity: Proactive monitoring of login attempts, failed authentications, and unusual data access patterns in SIEM/SOAR platforms is crucial. Detecting anomalies early can prevent significant damage.

Relevant Tools and Technologies for Detection & Mitigation

Tool Name Purpose Link
YubiKey Hardware-based FIDO2 MFA Security Key https://www.yubico.com/products/yubikey-5-series/
Microsoft Defender for Office 365 Advanced Email Security and Anti-Phishing https://www.microsoft.com/en-us/security/business/microsoft-defender-for-office/
Proofpoint Email Security and Protection Comprehensive Email Protection and Threat Intelligence https://www.proofpoint.com/us/products/email-protection
Okta Adaptive MFA Context-aware Multi-Factor Authentication https://www.okta.com/products/adaptive-mfa/
CrowdStrike Falcon Platform Endpoint Detection & Response (EDR), XDR capabilities https://www.crowdstrike.com/platform/endpoint-security/falcon-insight-edr/
KnowBe4 Security Awareness Training User Security Awareness and Phishing Simulations https://www.knowbe4.com/security-awareness-training/

Conclusion

The emergence of Starkiller underscores a critical shift in the phishing landscape. Attackers are no longer content with simple static copies; they are leveraging sophisticated proxying techniques to bypass even robust MFA solutions. Organizations must recognize this evolving threat and proactively strengthen their defenses. Prioritizing FIDO2-compliant MFA, coupled with rigorous user education, advanced email security, and robust endpoint monitoring, is no longer optional—it’s essential for maintaining a strong security posture against the next generation of phishing attacks.

 

Share this article

Leave A Comment