radar

ONE Sentinel

securitySecurity/THREATS/HIGH

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

sourceKrebs on Security
calendar_todayFebruary 20, 2026
schedule2 min read
lightbulb

EXECUTIVE SUMMARY

Starkiller Phishing Service Bypasses MFA with Real-Time Proxies

Summary

A new phishing-as-a-service platform named 'Starkiller' is enabling cybercriminals to bypass traditional security measures by proxying real login pages and multi-factor authentication (MFA) processes. This service allows attackers to relay credentials and MFA codes to legitimate sites, making detection and prevention more challenging.

Key Points

  • Starkiller is a phishing-as-a-service offering that proxies real login pages.
  • It forwards victims' usernames, passwords, and MFA codes to legitimate sites.
  • The service uses cleverly disguised links to load the target brand's actual website.
  • This approach allows attackers to bypass static phishing page detection.
  • The service complicates efforts by anti-abuse activists and security firms to take down phishing sites.

Analysis

The emergence of Starkiller represents a significant evolution in phishing tactics, as it leverages real-time interactions with legitimate sites to bypass both static phishing page detection and MFA protections. This development underscores the need for enhanced security measures that can detect and mitigate such sophisticated phishing attacks. The use of real-time proxies makes it more difficult for traditional anti-phishing tools to identify and block these threats.

Conclusion

IT professionals should consider implementing advanced threat detection systems that can identify and block proxy-based phishing attacks. Continuous user education on recognizing phishing attempts and the importance of secure MFA practices is also crucial.