You are currently viewing Starkiller Phishing Suite: The Phishing Kit That Bypasses MFA

Starkiller Phishing Suite: The Phishing Kit That Bypasses MFA

When you hear Starkiller, you might think of the Sith apprentice from Star Wars. But this Starkiller is far more real, and far more dangerous. Starkiller is a new phishing suite designed to bypass Multi-Factor Authentication (MFA). Yes, you read that right.

It is reportedly operated by a threat group called Jinkusu and is sold as a subscription-based cybercrime platform. Criminals can simply subscribe, log into a dashboard, choose a brand to impersonate, and launch attacks — no deep technical skills required.

But Wait… Don’t We Have MFA?

Normally, MFA protects accounts by requiring:

  • A password
  • An OTP (One-Time Password)
  • Authenticator approval

That extra step is supposed to stop attackers. So how does Starkiller bypass it?

How Starkiller Phishing Suite Bypasses MFA

Starkiller uses something called an Adversary-in-the-Middle (AitM) reverse proxy. Here’s what that means in simple terms:

  1. The attacker sends you a phishing link.
  2. You click it.
  3. The page looks 100% real — because it is the real website.

But what happens is

  • Your login details
  • Your OTP
  • Your session token

are intercepted and captured. Instead of cloning a fake website, Starkiller:

  • Launches a headless Chrome browser inside Docker
  • Loads the real website
  • Acts as a hidden middleman between you and the real site

You log in successfully. But the attacker now has:

  • Your password
  • Your OTP
  • Your session token (this is the key)

With the session token, they don’t need MFA again. They’re already inside.

Why Should We Be Concerned about Starkiller Phishing Suite?

Starkiller doesn’t rely on traditional fake templates. That means:

  • Security tools can’t easily fingerprint it
  • It stays updated automatically (because it proxies the live site)
  • It uses URL shorteners like TinyURL
  • Everything is managed from a central dashboard

This makes phishing:

  • More scalable
  • More professional
  • More accessible to low-skill criminals

How to Defend Against AitM-Based MFA Bypass Attacks

1️⃣ Phishing-Resistant MFA

Normal MFA (OTP, SMS, push notification) can be intercepted in AitM attacks.

Phishing-resistant MFA means:

  • Hardware security keys
  • FIDO2 authentication
  • Device-based login keys

These methods cannot be replayed by attackers, even if they proxy the login. Use stronger MFA that cannot be stolen through a middleman.

2️⃣ Token Binding / Device Binding

In AitM attacks, the attacker steals a session cookie.

Token binding means:

  • The session works only on the original device
  • If copied to another browser or system, it won’t work

Even if a hacker steals the session, they cannot use it on their own computer.

3️⃣ Conditional Access Policies

This is about adding smart login rules.

For example:

  • Block login from suspicious countries
  • Block unknown devices
  • Detect “impossible travel” (login from India and US within minutes)
  • Flag risky IP addresses

Even if someone logs in successfully, the system checks if the behavior looks normal.

4️⃣ Continuous Session Monitoring

Most systems only check security during login. Continuous monitoring means:

  • Keep checking the session after login
  • If something suspicious happens, log the user out

5️⃣ User Awareness: URL Inspection

In AitM attacks:

  • The page looks real
  • The login works
  • MFA works

Only the URL shows the truth. So users must:

  • Check spelling of the domain
  • Avoid clicking unknown email links
  • Verify login links carefully

Emerging Phishing Variants You Should Know About

a. 1Phish Phishing Kit: An MFA-Focused Threat

Another phishing kit, 1Phish, has evolved to:

  • Target users of 1Password
  • Capture OTPs
  • Capture recovery codes
  • Use browser fingerprinting to block bots
  • Add anti-analysis protections

Attackers are now iterating their tools like real software companies.

b. Microsoft OAuth Device Login Abuse

In another sophisticated technique, attackers are exploiting the OAuth device login flow used by Microsoft for Microsoft 365 accounts.

Here’s how it works:

  1. The attacker generates a device code.
  2. The victim receives a phishing email.
  3. The victim is told to visit: microsoft.com/devicelogin (a real Microsoft domain).
  4. The victim enters the attacker-provided code.
  5. Microsoft issues a legitimate access token.

The attacker now has persistent access. This attack is especially dangerous because:

  • The victim logs into a real Microsoft website
  • No fake page is used
  • MFA does not stop it

Conclusion:

With increasing AitM-based phishing attacks, continuous session monitoring is no longer optional for regulated institutions. Prime Infoserv delivers:

• 24/7 SOC Monitoring
• SIEM/SOAR-driven threat detection
• EDR/XDR deployment
• Identity risk and access control strategy

Let’s strengthen your cyber resilience before attackers exploit the gap. Connect with us.

Leave a Reply