Starkiller Phishing Kit Bypasses MFA via Proxy-Based Attacks
Summary
Hide ▲
Show ▼
A new phishing kit called Starkiller has emerged, allowing attackers to bypass multi-factor authentication (MFA) by proxying legitimate login pages. The kit is distributed as a subscription-based service on the dark web, offering real-time session monitoring and keylogging capabilities. It mimics login pages of major services like Google, Microsoft, and banks, routing traffic through attacker-controlled infrastructure to steal credentials and authentication tokens. Starkiller uses Docker containers running headless Chrome instances to serve genuine page content, making it difficult for security vendors to detect or block. The toolkit is sold with updates and customer support, posing a significant escalation in phishing infrastructure. The service is part of a broader cybercrime offering by a threat group called Jinkusu, which provides additional features such as email harvesting and campaign analytics.
Timeline
-
19.02.2026 14:00 2 articles · 2d ago
Starkiller Phishing Kit Bypasses MFA via Proxy-Based Attacks
A new phishing kit called Starkiller has emerged, allowing attackers to bypass multi-factor authentication (MFA) by proxying legitimate login pages. The kit is distributed as a subscription-based service on the dark web, offering real-time session monitoring and keylogging capabilities. It mimics login pages of major services like Google, Microsoft, and banks, routing traffic through attacker-controlled infrastructure to steal credentials and authentication tokens. Starkiller uses Docker containers running headless Chrome instances to serve genuine page content, making it difficult for security vendors to detect or block. The toolkit is sold with updates and customer support, posing a significant escalation in phishing infrastructure. The service is part of a broader cybercrime offering by a threat group called Jinkusu, which provides additional features such as email harvesting and campaign analytics.
Show sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
Information Snippets
-
Starkiller is a commercial-grade phishing kit distributed as a SaaS product on the dark web with a subscription model.
First reported: 19.02.2026 14:002 sources, 2 articlesShow sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
The kit proxies legitimate login pages through attacker-controlled infrastructure, serving genuine content to bypass detection.
First reported: 19.02.2026 14:002 sources, 2 articlesShow sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller can mimic login pages of major services like Google, Microsoft, Facebook, Apple, Amazon, Netflix, PayPal, and various banks.
First reported: 19.02.2026 14:002 sources, 2 articlesShow sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
The kit includes real-time session monitoring and keylogging capabilities to capture victim interactions.
First reported: 19.02.2026 14:002 sources, 2 articlesShow sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller bypasses MFA by forwarding one-time codes and authentication tokens to the legitimate service in real time.
First reported: 19.02.2026 14:002 sources, 2 articlesShow sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
The toolkit is distributed via phishing emails imitating alerts from major services like Google and Microsoft.
First reported: 19.02.2026 14:001 source, 1 articleShow sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
-
Starkiller is sold with ongoing updates and helpdesk support via Telegram.
First reported: 19.02.2026 14:002 sources, 2 articlesShow sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Organizations are advised to monitor for anomalous login patterns or session token reuse from unexpected locations to defend against Starkiller attacks.
First reported: 19.02.2026 14:002 sources, 2 articlesShow sources
- Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA — www.infosecurity-magazine.com — 19.02.2026 14:00
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller uses Docker containers running headless Chrome instances to proxy real login pages.
First reported: 20.02.2026 22:001 source, 1 articleShow sources
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller employs URL masking with an '@' symbol to deceive victims into visiting malicious links.
First reported: 20.02.2026 22:001 source, 1 articleShow sources
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller offers real-time session monitoring, allowing attackers to live-stream the target’s screen.
First reported: 20.02.2026 22:001 source, 1 articleShow sources
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller includes features such as keylogger capture, cookie and session token theft, geo-tracking, and automated Telegram alerts.
First reported: 20.02.2026 22:001 source, 1 articleShow sources
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller is part of a broader cybercrime service offered by a threat group called Jinkusu.
First reported: 20.02.2026 22:001 source, 1 articleShow sources
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller provides campaign analytics with visit counts, conversion rates, and performance graphs.
First reported: 20.02.2026 22:001 source, 1 articleShow sources
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
-
Starkiller's service is likely to be copied by other cybercriminals due to its effectiveness and ease of use.
First reported: 20.02.2026 22:001 source, 1 articleShow sources
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — krebsonsecurity.com — 20.02.2026 22:00
Similar Happenings
Multi-Stage AitM Phishing and BEC Campaigns Target Energy Sector
Microsoft has identified a multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) campaign targeting organizations in the energy sector. The attackers abused SharePoint file-sharing services to deliver phishing payloads and created inbox rules to maintain persistence and evade detection. The campaign involved leveraging compromised internal identities to conduct large-scale phishing attacks within and outside the victim organizations. Additionally, the AgreeTo Outlook add-in was hijacked and turned into a phishing kit, stealing over 4,000 Microsoft account credentials. The threat actor deployed a fake Microsoft sign-in page, password collection page, exfiltration script, and redirect, exploiting the add-in's ReadWriteItem permissions. This is the first known instance of malware found on the official Microsoft Marketplace. The add-in was abandoned by its developer and the attacker exploited the abandoned domain to serve the phishing kit. The incident highlights the need for better monitoring of add-ins and their associated URLs.
VoidProxy phishing service targets Microsoft 365, Google accounts
A new phishing-as-a-service (PhaaS) platform, VoidProxy, targets Microsoft 365 and Google accounts, including those protected by third-party single sign-on (SSO) providers like Okta. The platform uses adversary-in-the-middle (AitM) tactics to steal credentials, multi-factor authentication (MFA) codes, and session cookies in real time. The attack begins with emails from compromised accounts at email service providers, which include shortened links redirecting recipients to phishing sites. The phishing sites are hosted on disposable low-cost domains and protected by Cloudflare to hide their real IPs. Additionally, a new phishing automation platform named Quantum Route Redirect (QRR) is targeting Microsoft 365 users worldwide. QRR uses around 1,000 domains hosted on parked or compromised domains to steal credentials. The attacks start with malicious emails impersonating various services, redirecting users to credential harvesting pages. QRR employs a built-in filtering mechanism to distinguish between bots and human visitors, redirecting humans to phishing pages while sending bots to benign sites. QRR has been observed targeting Microsoft 365 accounts across 90 countries, with 76% of attacks directed at U.S. users. The platform offers advanced features such as a configuration panel, monitoring dashboards, intelligent traffic routing, and an analytics dashboard, making it easier for less technically minded cybercriminals to launch sophisticated phishing campaigns. QRR has been observed in the wild since August 2025 and uses a URL pattern of "/([\w\d-]+\.){2}[\w]{,3}\/quantum.php/" for its phishing campaigns. QRR can bypass Microsoft 365 email protections, including Microsoft Exchange Online Protection (EOP), secure email gateways (SEG), and integrated cloud email security (ICES) products. QRR's intelligent redirect system can differentiate between security tools and human visitors, redirecting security tools to legitimate websites and human visitors to phishing pages. QRR has been observed deceiving web application firewall products, enabling attacks to bypass multiple layers of security.
Axios and Direct Send Abuse in Microsoft 365 Phishing Campaigns
Threat actors are exploiting HTTP client tools like Axios and Microsoft's Direct Send feature to create highly efficient phishing campaigns targeting Microsoft 365 environments. These attacks, which began in July 2025, initially targeted executives and managers in finance, healthcare, and manufacturing sectors, but have since expanded to all users. The campaigns use compensation-themed lures to trick recipients into revealing credentials and bypassing multi-factor authentication (MFA). The abuse of Axios has surged, accounting for 24.44% of all flagged user agent activity from June to August 2025. The attacks leverage Axios to intercept, modify, and replay HTTP requests, capturing session tokens or MFA codes in real-time. This method allows attackers to bypass traditional security defenses and conduct phishing operations at an unprecedented scale. Additionally, a phishing-as-a-service (PhaaS) offering called Salty 2FA has been discovered, which steals Microsoft login credentials and sidesteps MFA by simulating various authentication methods. Salty 2FA uses advanced features such as subdomain rotation, dynamic corporate branding, and sophisticated evasion tactics to enhance its phishing campaigns. It also abuses legitimate platforms to stage initial attacks and uses Cloudflare Turnstile for secure CAPTCHA replacement. Salty2FA campaigns have been active since late July 2025 and continue to this day, generating dozens of fresh analysis sessions daily. The campaigns target industries including finance, healthcare, government, logistics, energy, IT consulting, education, construction, telecom, chemicals, industrial manufacturing, real estate, and consulting. The Sneaky 2FA phishing kit has incorporated Browser-in-the-Browser (BitB) functionality to mimic browser address bars and pop-up login forms. This kit uses Cloudflare Turnstile checks to prevent security tools from accessing phishing pages and employs conditional loading techniques to ensure only intended targets can access them. The phishing domains are quickly rotated to minimize detection, and the kit uses obfuscation and disables browser developer tools to resist analysis. Sneaky2FA is a widely used PhaaS platform alongside Tycoon2FA and Mamba2FA, all targeting primarily Microsoft 365 accounts. The kit uses SVG-based attacks and attacker-in-the-middle (AitM) tactics, where the authentication process is proxied to the legitimate service through a phishing page that relays valid session tokens to the attackers. Sneaky2FA has added a BitB pop-up that mimics a legitimate Microsoft login window, adjusting dynamically to the victim’s OS and browser. An attacker stealing credentials and active session tokens can authenticate to the victim’s account, even when the two-factor authentication (2FA) protection is active.
GPUGate Malware Campaign Targets IT Firms in Western Europe
The **GPUGate malware campaign** continues to evolve, now leveraging **Claude AI artifacts and Google Ads** to distribute **MacSync and AMOS infostealers** via **ClickFix attacks**. Over **15,600 users** have accessed malicious Claude-generated guides, which instruct victims to execute Terminal commands fetching malware payloads. This follows earlier waves abusing **ChatGPT/Grok chats, fake GitHub repositories, and malvertising** to deploy stealers targeting credentials, crypto wallets, and system data. The campaign, active since **April 2023**, has expanded from traditional phishing to **abusing AI ecosystems, supply-chain weaknesses, and trusted platforms** (e.g., Homebrew, LogMeIn, AI assistants). Russian-speaking actors operate **AMOS as a Malware-as-a-Service (MaaS)**, with stolen logs sold in underground markets to fuel fraud, ransomware, and account takeovers. The latest **Claude artifact abuse** underscores the shift toward **high-impact, scalable distribution channels**, exploiting weak platform vetting and user trust in AI-generated content. Organizations should monitor for **suspicious Terminal activity, C2 traffic to domains like `a2abotnet[.]com`, and unauthorized data egress** while educating users on **ClickFix-style lures** and unverified AI tool instructions.
UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
Microsoft and Malwarebytes have disclosed a **DNS-based ClickFix variant** that marks the first documented use of the `nslookup` command to stage and deliver malicious payloads. This technique abuses DNS queries to retrieve a PowerShell script embedded in the `NAME:` field of a DNS response from an attacker-controlled server (**84[.]21.189[.]20**), which then deploys **ModeloRAT** via a Python runtime and VBScript persistence mechanism. The attack chain begins with fake CAPTCHA lures, followed by social engineering tactics (e.g., fake system alerts, browser crashes, or instructional videos) to coerce victims into executing the `nslookup` command, which downloads a ZIP archive containing the final payload. This evolution builds on earlier ClickFix tactics, including **ConsentFix** (Azure CLI OAuth abuse), **CrashFix** (malicious Chrome extensions triggering browser crashes), and **SyncAppvPublishingServer.vbs** (Google Calendar dead drops). The latest DNS-based approach demonstrates the campaign’s adaptability, leveraging **trusted native tools** (`nslookup`), **DNS as a C2 channel**, and **psychological manipulation** (urgency tactics) to bypass security controls. Concurrently, ClickFix campaigns continue to expand with **cross-platform targeting** (Windows/Linux/macOS), **AI platform abuse** (ChatGPT, Grok, Claude), and **weaponized SaaS infrastructure** (Google Groups, Pastebin) to distribute payloads like **Lumma Stealer** and **Odyssey Stealer**. The integration of **DNS staging**, **browser-native execution**, and **multi-stage loaders** underscores the campaign’s resilience despite 2025 law enforcement disruptions, with actors refining tradecraft to maximize evasion via **social engineering**, **steganography**, and **legitimate service abuse**.