top of page

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

  • Mar 3
  • 3 min read

Key Findings:


  • Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections.

  • Starkiller is advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard to impersonate brands or enter a brand's real URL.

  • The platform lets users choose custom keywords and integrates URL shorteners to obscure the destination URL.

  • Starkiller launches a headless Chrome instance within a Docker container, loads the brand's real website, and acts as a reverse proxy between the target and the legitimate site.

  • This login page proxying technique obviates the need for attackers to update their phishing page templates periodically, as the real pages they're impersonating get updated.

  • The platform streamlines phishing operations by centralizing infrastructure management, phishing page deployment, and session monitoring within a single control panel.

  • Combined with URL masking, session hijacking, and MFA bypass, it gives low-skill cybercriminals access to attack capabilities that were previously out of reach.


Background


Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. The platform is advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand's real URL. It also lets users choose custom keywords like "login," "verify," "security," or "account," and integrates URL shorteners such as TinyURL to obscure the destination URL.


Reverse Proxy and Headless Chrome


Starkiller launches a headless Chrome instance – a browser that operates without a visible window – inside a Docker container, loads the brand's real website, and acts as a reverse proxy between the target and the legitimate site. Recipients are served genuine page content directly through the attacker's infrastructure, ensuring the phishing page is never out of date. Because Starkiller proxies the real site live, there are no template files for security vendors to fingerprint or blocklist.


Streamlining Phishing Operations


The platform streamlines phishing operations by centralizing infrastructure management, phishing page deployment, and session monitoring within a single control panel. Combined with URL masking, session hijacking, and MFA bypass, it gives low-skill cybercriminals access to attack capabilities that were previously out of reach.


Evolving Phishing Kits


The findings show that phishing kits like Starkiller and 1Phish are increasingly turning phishing into SaaS-style workflows, further lowering the skill barrier necessary to pull off such attacks at scale. This progression reflects deliberate iteration rather than simple template reuse, with each version building upon the previous one to increase conversion rates, reduce automated analysis, and support secondary authentication harvesting.


Targeting Financial Institutions


In recent months, phishing campaigns have also targeted financial institutions, specifically U.S.-based banks and credit unions, to harvest credentials. The campaign is said to have taken place over two distinct phases, an initial wave beginning in late June 2025 and a more sophisticated set of attacks beginning in mid-November 2025. The actors registered [.]co[.]com domains spoofing financial institution websites, presenting credible impersonations of real financial institutions.


Bypassing MFA with OAuth 2.0


The findings also coincide with a sophisticated phishing campaign targeting North American businesses and professionals by abusing the OAuth 2.0 device authorization grant flow to sidestep multi-factor authentication (MFA) and compromise Microsoft 365 accounts. The attacker registers on the Microsoft OAuth application and generates a unique device code, which is then delivered to the victim via a targeted phishing email.


Sources


  • https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html

  • https://news.backbox.org/2026/03/03/starkiller-phishing-suite-uses-aitm-reverse-proxy-to-bypass-multi-factor-authentication/

  • https://www.reddit.com/r/SecOpsDaily/comments/1rjoraa/starkiller_phishing_suite_uses_aitm_reverse_proxy/

  • https://www.linkedin.com/posts/dlross_starkiller-phishing-suite-uses-aitm-reverse-activity-7434723038446817280-8c8G

  • https://x.com/Dinosn/status/2028812623085519113

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page