Starkiller Phishing Suite Targets MFA
Starkiller Phishing Suite is a new tool that bypasses multi-factor authentication. Researchers recently revealed its advanced capabilities. However, this phishing platform does more than steal passwords. It uses a reverse proxy method to intercept live login sessions.
A threat group calling itself Jinkusu promotes the platform online. The group markets it as a complete cybercrime service. Therefore, even low-skill attackers can launch complex phishing attacks. This trend shows how phishing tools are evolving rapidly.
How the Reverse Proxy Attack Works
Starkiller uses an Adversary-in-the-Middle technique. Specifically, it launches a hidden Chrome browser inside a container. Then, it loads the real website of a chosen brand. As a result, victims see a genuine login page.
Researchers explained the process, the tool acts as a reverse proxy between the user and the real site. Therefore, it captures every keystroke and session token. Meanwhile, the victim interacts with what appears to be a trusted page.
Because the content loads directly from the real website, attackers avoid outdated templates. In addition, security vendors struggle to block these pages. There are no static phishing files to detect. This design makes the attack highly effective.
Built-In Features for Cybercriminals
Starkiller offers a dashboard for managing campaigns. For example, users can select a brand to impersonate. They can also enter custom keywords like “login” or “verify.” Moreover, the tool supports URL shorteners such as TinyURL to hide malicious links.
The platform combines session hijacking with MFA bypass. Therefore, attackers gain access even when extra verification exists. It centralizes phishing deployment and monitoring in one place. As a result, criminals can scale operations quickly.
1Phish Kit Shows Rapid Evolution
Another toolkit, 1Phish, has also advanced. Researchers observed its growth. Initially, it harvested basic credentials. However, it now targets users of 1Password.
Security expert noted deliberate improvements. The kit now captures one-time passcodes and recovery codes. In addition, it uses browser fingerprinting to block bots. Therefore, attackers increase success rates while avoiding detection.
OAuth Device Code Abuse
Phishing actors also abuse OAuth flows. In recent campaigns, they targeted accounts on Microsoft 365. Attackers registered fake apps through Microsoft OAuth systems. Then, they generated unique device codes.
Victims received phishing emails with these codes. They were directed to a real login page to enter them. As a result, the attackers received valid access tokens. Therefore, they gained persistent access to corporate data.
Financial Sector Under Attack
Phishing campaigns also targeted U.S. banks and credit unions. Researchers tracked two major waves. The attackers registered deceptive domains ending in “.co.com.” These domains mimicked trusted institutions.
When victims clicked phishing links, they saw fake CAPTCHA pages. However, the CAPTCHA did not function. Instead, it delayed users before redirecting them to credential harvesting pages. Moreover, the attackers used obfuscation and redirect tricks to evade scanners.
How to Prevent MFA Bypass Attacks
Organizations must strengthen email security controls. For example, advanced threat detection can block reverse proxy phishing attempts. In addition, continuous security monitoring can detect unusual login behavior. Therefore, companies can stop session hijacking early.
Businesses should also deploy managed detection and response services. These services monitor network traffic in real time. Furthermore, vulnerability assessments can uncover weak authentication flows. By combining proactive monitoring and strong access controls, organizations can reduce phishing risks significantly.
Sleep well, we got you covered.

