{"id":43787,"date":"2026-02-19T20:55:28","date_gmt":"2026-02-19T12:55:28","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/19\/starkiller-new-commercial-grade-phishing-kit-bypasses-mfa-infosecurity-magazine\/"},"modified":"2026-02-19T20:55:28","modified_gmt":"2026-02-19T12:55:28","slug":"starkiller-new-commercial-grade-phishing-kit-bypasses-mfa-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/19\/starkiller-new-commercial-grade-phishing-kit-bypasses-mfa-infosecurity-magazine\/","title":{"rendered":"Starkiller: New \u2018Commercial-Grade\u2019 Phishing Kit Bypasses MFA &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>A newly uncovered phishing kit allows cybercriminals to steal usernames and passwords with a toolkit which spoofs live login pages and bypasses multi-factor authentication (MFA) protections, cybersecurity analysts have warned.<\/p>\n<p>Dubbed Starkiller, the <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/tackle-evolving-email-based-attacks.html\">phishing<\/a> platform has been <a href=\"https:\/\/abnormal.ai\/blog\/starkiller-phishing-kit\">detailed by researchers at Abnormal<\/a>, who have described it as &ldquo;a commercial-grade cybercrime platform&rdquo; and &ldquo;a comprehensive toolkit for stealing identities at scale&rdquo;.<\/p>\n<p>The tool is distributed on <a href=\"https:\/\/www.infosecurity-magazine.com\/blogs\/have-your-users-credentials-been\/\">the dark web<\/a> like a software-as-a-service (SaaS) product, complete with a subscription model, updates and customer support.<\/p>\n<p>Researchers noted that while the Starkiller name is shared with a legitimate red team penetration testing tool by BC Security, the two platforms are not related.<\/p>\n<p>What makes Starkiller notable is how it differs from many other phishing kits.<\/p>\n<p>Most rely on static HTML clones of the login page the attackers want to replicate. But with Starkiller, the phishing site is launched through a proxy operated by attacker-controlled infrastructure which is indistinguishable from the real login portal being used as template.<\/p>\n<p> <img decoding=\"async\" src=\"https:\/\/assets.infosecurity-magazine.com\/content\/span\/2c0720b3-d7f8-4d32-872b-3cba74fbcd6a.jpg\" alt=\"Starkiller: New \u2018Commercial-Grade\u2019 Phishing Kit Bypasses MFA - Infosecurity Magazine\" \/><figcaption>An advert for Starkiller<\/figcaption><p>&ldquo;Recipients are served genuine page content directly through the attacker&#39;s infrastructure, ensuring the phishing page is never out of date. And because Starkiller proxies the real site live, there are no template files for security vendors to fingerprint or blocklist,&rdquo; Abnormal researchers explained.<\/p>\n<p>The proxy is launched in a headless Chrome instance and gives the user little to no reason for suspicion. However, the infrastructure means that the credentials entered are set directly to the attackers.<\/p>\n<p>The Starkiller kit provides attackers with the ability to mimic Google, Microsoft, Facebook, Apple, Amazon, Netflix, PayPal, various banks and many more online services. The tool generates a deceptive URL that visually mimics the legitimate domain while routing traffic through the attacker&#39;s infrastructure.<\/p>\n<p>Starkiller also offers cybercriminals real-time session monitoring, allowing them to watch the target interact with the phishing page live, as well as the use of a <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/guide-infostealer-malware.html\">keylogger<\/a> to capture anything the victim enters.<\/p>\n<h2><strong>How Starkiller Enables MFA Bypass<\/strong><\/h2>\n<p>The way Starkiller has been built also enables it to bypass <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/future-thinking\/phishing-resistant-mfa-explained.html\">MFA<\/a>. This is because the targeted user is authenticating with the real site through the proxy.<\/p>\n<p>That means any one-time codes or authentication tokens they submit are forwarded to the legitimate service in real time, providing attackers with direct access to the account.<\/p>\n<p>According to Abnormal, the most likely way which Starkiller attacks are distributed is by <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/94-firms-hit-phishing-attacks-2023\/\">phishing emails<\/a> which imitate legitimate alerts and notifications from the likes of Google and Microsoft.<\/p>\n<p>The toolkit is sold as a subscription-based toolkit with a monthly fee, meaning users are provided with updates to the platform and helpdesk support via Telegram.<\/p>\n<p>&ldquo;The level of ongoing development means Starkiller is likely to become increasingly difficult to detect and defend against,&rdquo; warned Abnormal researchers, who have also described the tool as &ldquo;a significant escalation in phishing infrastructure.&rdquo;<\/p>\n<p>To defend against attacks deployed by Starkiller, it&rsquo;s recommended that organizations watch for <a href=\"https:\/\/www.infosecurity-magazine.com\/blogs\/6-important-questions-anomaly\/\">anomalous login patterns<\/a> or session token reuse from unexpected locations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A newly uncovered phishing kit allows cybercriminals to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43787","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43787"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43787\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}