Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsStarkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
Cybersecurity

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

•February 19, 2026
0
Infosecurity Magazine
Infosecurity Magazine•Feb 19, 2026

Companies Mentioned

Abnormal

Abnormal

Facebook

Facebook

PayPal

PayPal

PYPL

Apple

Apple

AAPL

Google

Google

GOOG

Amazon

Amazon

Microsoft

Microsoft

MSFT

Netflix

Netflix

NFLX

Why It Matters

Starkiller raises the bar for phishing attacks, making MFA‑protected accounts vulnerable at scale, which forces enterprises to rethink authentication and detection strategies.

Key Takeaways

  • •Starkiller sells phishing-as-a-service with subscription model.
  • •Uses live proxy to clone login pages, evading static detection.
  • •Bypasses MFA by forwarding one‑time codes to real service.
  • •Supports major brands, includes real‑time session monitoring and keylogging.
  • •Ongoing updates make detection increasingly difficult.

Pulse Analysis

Phishing operations have evolved from simple HTML clones to sophisticated service models, and Starkiller epitomizes this shift. Offered as a SaaS product on dark‑web marketplaces, the kit provides continuous updates, a help‑desk via Telegram, and a subscription fee that lowers the barrier to entry for cybercriminals. By delivering a live proxy of legitimate login portals, attackers ensure the phishing page mirrors the current site layout, rendering traditional signature‑based defenses obsolete and expanding the pool of potential victims.

The technical core of Starkiller lies in its headless Chrome proxy, which streams the authentic site to the victim while silently capturing every keystroke. Because the user interacts with the real backend, one‑time passwords and push‑based MFA tokens are relayed unchanged, effectively nullifying the extra security layer. Real‑time session monitoring lets operators watch the victim’s actions live, and built‑in keyloggers harvest additional credentials, enabling credential‑stuffing attacks across services like Google, Microsoft, and major financial institutions.

Defending against such dynamic threats requires a move beyond static URL blocklists toward behavioral analytics. Organizations should monitor anomalous login patterns, token reuse from unexpected geographies, and sudden spikes in session initiation. Coupled with hardware‑based or phishing‑resistant MFA methods, continuous user education, and threat‑intelligence feeds that flag emerging SaaS phishing kits, enterprises can mitigate the heightened risk Starkiller introduces. As the platform matures, the security community must anticipate further obfuscation techniques and invest in adaptive, AI‑driven detection frameworks.

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...