BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Starkiller Phishing Service Proxies Real Login Pages to Bypass MFA

Starkiller Phishing Service Proxies Real Login Pages to Bypass MFA

February 20, 2026Malware & Threats2 min readhigh

Originally reported by Krebs on Security

#phishing-as-a-service#mfa-bypass#reverse-proxy#session-hijacking#real-time-phishing
Share

TL;DR

New Starkiller phishing service uses reverse proxy techniques to relay real login pages and intercept MFA tokens in real-time, bypassing traditional anti-phishing defenses.

Why high?

Active phishing-as-a-service platform enabling MFA bypass represents a significant escalation in phishing sophistication, with immediate threat to organizations relying on traditional MFA protections.

Reverse Proxy Architecture Enables Real-Time Credential Harvesting

Krebs on Security has identified a sophisticated phishing-as-a-service platform called "Starkiller" that fundamentally changes the phishing threat model. Unlike traditional static phishing pages that copy login interfaces, Starkiller operates as a reverse proxy between victims and legitimate websites.

The service loads actual target websites through cleverly disguised URLs, then intercepts and forwards all authentication data, including usernames, passwords, and multi-factor authentication codes, to the legitimate destination in real-time. This approach provides two critical advantages over conventional phishing operations:

  • Authentic user experience: Victims interact with genuine login pages, reducing suspicion
  • MFA token interception: Real-time relay enables capture and immediate use of time-sensitive authentication codes

Operational Sophistication

The Starkiller platform addresses traditional phishing operational challenges through technical innovation:

Evasion Mechanisms

  • Disguised URLs that appear legitimate to cursory inspection
  • Real-time proxy infrastructure that presents actual target websites
  • Reduced static content footprint limiting traditional detection methods

Service Model

As a phishing-as-a-service offering, Starkiller lowers the technical barrier for threat actors while providing:

  • Turnkey phishing infrastructure
  • Real-time credential harvesting capabilities
  • Built-in MFA bypass functionality

Impact on Current Defenses

This technique represents a significant escalation in phishing sophistication that challenges existing security assumptions:

Multi-Factor Authentication Bypass: Traditional MFA provides limited protection against real-time relay attacks, as tokens can be captured and immediately forwarded to legitimate services before expiration.

Detection Evasion: Static content analysis and URL reputation systems face reduced effectiveness when confronting proxy-based architectures that serve legitimate content through malicious infrastructure.

User Training Limitations: Standard phishing awareness training emphasizing suspicious URLs and fake login pages becomes less applicable when users interact with genuine website interfaces.

Defensive Considerations

Organizations should evaluate current phishing defenses against proxy-based attack vectors:

  • Implement advanced email security solutions capable of analyzing link destinations beyond surface URLs
  • Consider phishing-resistant authentication methods such as FIDO2/WebAuthn that bind authentication to specific domains
  • Deploy endpoint detection capabilities that can identify suspicious proxy traffic patterns
  • Update security awareness training to address sophisticated phishing techniques beyond static page recognition

Sources

https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/

Originally reported by Krebs on Security

Tags

#phishing-as-a-service#mfa-bypass#reverse-proxy#session-hijacking#real-time-phishing

Related Intelligence

  • Malware Roundup: Healthcare Breach Hits 3.4M, CISA Orders iOS Patches, Phishing Kit Takedown

    highMar 7, 2026
  • Predator Spyware Hooks iOS SpringBoard to Bypass Recording Indicators

    highFeb 22, 2026
  • Threat Roundup: Phobos Ransomware Arrest, X/Grok Investigation, IoT Security Mishap, and Android Backdoor Discovery

    highFeb 17, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Wiz Publishes FedRAMP Continuous Monitoring Playbook for Government Cloud Security

Next Article

Critical Infrastructure Under Siege: From Actively Exploited BeyondTrust RCE to Healthcare Ransomware Shutdowns →