Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Starkiller Phishing Suite Evades MFA with Reverse Proxy

Starkiller Phishing Suite Evades MFA with Reverse Proxy

Posted on March 3, 2026 By CWS

Cybersecurity experts have uncovered a new phishing suite named Starkiller, which employs a unique technique to circumvent multi-factor authentication (MFA). The suite, promoted by a threat group called Jinkusu, provides users with a platform to mimic legitimate brands by selecting a brand to impersonate or entering the brand’s actual URL. It further allows customization through keywords like “login” or “security” and utilizes URL shorteners to conceal the destination URL.

Advanced Phishing Techniques

Starkiller operates by launching a headless Chrome browser within a Docker container to load the authentic website of a brand. Functioning as a reverse proxy, it bridges the gap between the victim and the real website. This method ensures the phishing page remains up-to-date, as it replicates the live site, negating the need for attackers to frequently update templates, which complicates detection efforts by security vendors.

The container forwards user inputs captured on the fake page to the legitimate website and retrieves responses, making every interaction, including keystrokes and session tokens, vulnerable to interception and misuse. This centralized approach streamlines phishing operations by managing infrastructure, deploying phishing pages, and monitoring sessions within a single interface.

Evolution of Phishing Kits

Datadog’s recent revelations about the 1Phish kit highlight its transformation from a simple credential collection tool into a complex multi-stage phishing kit targeting 1Password users. This upgraded version includes pre-phishing fingerprinting and validation, along with capturing one-time passcodes and recovery codes, thereby enhancing its capability to filter out bots and improve attack success rates.

Security researcher Martin McCloskey noted that this evolution is marked by deliberate advancements rather than mere repetition of existing templates. Each update adds features aimed at increasing conversion rates and reducing automated analysis, solidifying phishing as a service-based model that simplifies execution for cybercriminals.

Phishing Tactics Targeting North America

Additionally, sophisticated phishing campaigns have been exploiting OAuth 2.0 device authorization to bypass MFA and compromise Microsoft 365 accounts. Attackers register on the Microsoft OAuth application, generate a unique device code, and send it to the target via phishing emails. The victim is then directed to enter the code on a legitimate Microsoft portal, inadvertently granting the attacker access to their account and data.

Recent attacks have also focused on U.S. financial institutions, utilizing fraudulent domains to mimic genuine banking websites. These operations unfold in multiple stages, beginning with domain registration and evolving into advanced evasion techniques that involve referrer validation and code obfuscation, effectively challenging automated and manual security analyses.

These findings underscore the increasing sophistication and accessibility of phishing operations, highlighting the necessity for enhanced cybersecurity measures to protect sensitive information from evolving threats.

The Hacker News Tags:1Phish, Cybersecurity, Docker container, Jinkusu, MFA, OAuth 2.0, Phishing, reverse proxy, Starkiller, URL shorteners

Post navigation

Previous Post: AuraStealer Malware Emerges with Expanding C2 Network
Next Post: Quantum Algorithm Advances May Threaten RSA Security

Related Posts

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers The Hacker News
TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China The Hacker News
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users The Hacker News
How to Address the Expanding Security Risk How to Address the Expanding Security Risk The Hacker News
ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics The Hacker News
CISO’s Guide To Web Privacy Validation And Why It’s Important CISO’s Guide To Web Privacy Validation And Why It’s Important The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News