LIVE NEWS
  • Calls for Global Digital Estate Standard as Fraud Risk Grows
  • An ode to craftsmanship in software development
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
  • Elevance stock tumbles as CMS may halt Medicare enrollment
  • Wild spaces for butterflies to be created in Glasgow
  • You can now adjust how your caller card looks for calls on Android phones
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
Cybersecurity

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

primereportsBy primereportsFebruary 22, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
Share
Facebook Twitter LinkedIn Pinterest Email


A newly uncovered phishing kit allows cybercriminals to steal usernames and passwords with a toolkit which spoofs live login pages and bypasses multi-factor authentication (MFA) protections, cybersecurity analysts have warned.

Dubbed Starkiller, the phishing platform has been detailed by researchers at Abnormal, who have described it as “a commercial-grade cybercrime platform” and “a comprehensive toolkit for stealing identities at scale”.

The tool is distributed on the dark web like a software-as-a-service (SaaS) product, complete with a subscription model, updates and customer support.

Researchers noted that while the Starkiller name is shared with a legitimate red team penetration testing tool by BC Security, the two platforms are not related.

What makes Starkiller notable is how it differs from many other phishing kits.

Most rely on static HTML clones of the login page the attackers want to replicate. But with Starkiller, the phishing site is launched through a proxy operated by attacker-controlled infrastructure which is indistinguishable from the real login portal being used as template.

“Recipients are served genuine page content directly through the attacker’s infrastructure, ensuring the phishing page is never out of date. And because Starkiller proxies the real site live, there are no template files for security vendors to fingerprint or blocklist,” Abnormal researchers explained.

The proxy is launched in a headless Chrome instance and gives the user little to no reason for suspicion. However, the infrastructure means that the credentials entered are set directly to the attackers.

The Starkiller kit provides attackers with the ability to mimic Google, Microsoft, Facebook, Apple, Amazon, Netflix, PayPal, various banks and many more online services. The tool generates a deceptive URL that visually mimics the legitimate domain while routing traffic through the attacker’s infrastructure.

Starkiller also offers cybercriminals real-time session monitoring, allowing them to watch the target interact with the phishing page live, as well as the use of a keylogger to capture anything the victim enters.

How Starkiller Enables MFA Bypass

The way Starkiller has been built also enables it to bypass MFA. This is because the targeted user is authenticating with the real site through the proxy.

That means any one-time codes or authentication tokens they submit are forwarded to the legitimate service in real time, providing attackers with direct access to the account.

According to Abnormal, the most likely way which Starkiller attacks are distributed is by phishing emails which imitate legitimate alerts and notifications from the likes of Google and Microsoft.

The toolkit is sold as a subscription-based toolkit with a monthly fee, meaning users are provided with updates to the platform and helpdesk support via Telegram.

“The level of ongoing development means Starkiller is likely to become increasingly difficult to detect and defend against,” warned Abnormal researchers, who have also described the tool as “a significant escalation in phishing infrastructure.”

To defend against attacks deployed by Starkiller, it’s recommended that organizations watch for anomalous login patterns or session token reuse from unexpected locations.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCloudflare’s Markdown for Agents automatically make websites agent-ready
Next Article Winter Olympics live updates: The closing ceremony gets underway – AP News
primereports
  • Website

Related Posts

Cybersecurity

Calls for Global Digital Estate Standard as Fraud Risk Grows

March 4, 2026
Cybersecurity

Samsung Unpacked 2026 live blog: Updates on Galaxy S26 Ultra, preorder deals, and pricing

February 25, 2026
Cybersecurity

Marquis sues SonicWall over backup breach that led to ransomware attack

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Artificial Intelligence
  • Popular Now
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Calls for Global Digital Estate Standard as Fraud Risk Grows
  • An ode to craftsmanship in software development
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.