Starkiller: Cyber experts issue warning over new phishing kit that proxies real login pages
The Starkiller package offers monthly framework updates and documentation, meaning no technical ability is needed
Researchers at Abnormal Security have uncovered a new phishing kit that proxies live login pages, bypasses MFA, and includes a full credential-harvesting platform for a monthly fee.
While most phishing kits rely on static HTML clones of login pages, these are inherently fragile, as even minor interface updates from the impersonated brand can reveal the deception immediately.
However, a new framework called Starkiller – not to be confused with the legitimate BC-Security red team tool of the same name – does things differently.
"Sold openly as a commercial-grade cybercrime platform by a threat group calling itself Jinkusu, Starkiller is distributed like a SaaS product," said Abnormal.
"It launches a headless Chrome instance — a browser that operates without a visible window — inside a Docker container, loads the brand’s real website, and acts as a reverse proxy between the target and the legitimate site."
How Starkiller works
Cyber criminals select a brand to impersonate; for example, Google, Microsoft, Facebook, Apple, Amazon, Netflix, PayPal, and various banks.
Because the recipients are served genuine page content directly through the attacker's infrastructure, the phishing page never goes out of date. Similarly, as Starkiller proxies the real site live, there are no template files for security vendors to fingerprint or blocklist.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Researchers found that Starkiller's control panel gives cyber criminals a polished dashboard for deploying phishing campaigns, and the core workflow requires almost no technical skill.
Docker engine status, image builds, and active containers are managed from the same panel, meaning threat actors don't need to understand reverse proxies or certificate management to launch an attack.
An attacker enters a brand’s real URL, and the platform spins up a Docker container running a headless Chrome instance that loads the real login page.
The container then acts as a man-in-the-middle reverse proxy, forwarding the end user’s inputs to the legitimate site and returning the site's responses.
"Every keystroke, form submission, and session token passes through attacker-controlled infrastructure and is logged along the way," the researchers said.
Keeping tabs on victims
Notably, the package offers real-time session monitoring, allowing attackers to watch the target interact with the phishing page live.
Along with keylogger capture for every keystroke, it includes cookie and session token theft for direct account takeover, geo-tracking of targets, and automated Telegram alerts when new credentials come in.
Because the end user is actually authenticating with the real site through the proxy, any one-time codes or authentication tokens they submit are forwarded to the legitimate service in real time.
Capturing the resulting session cookies and tokens gives the attacker authenticated access to the account. This means that MFA protections can effectively be neutralized, despite functioning exactly as designed.
Jinkusu maintains a community forum where cyber criminals discuss techniques, request features, and troubleshoot deployments.
"The forum shows an active user base sharing operational tips and asking about mobile support, indicating a growing pool of operators using the framework in the wild," the researchers said.
"Operators also receive dedicated support via Telegram, monthly framework updates, and documentation. The level of ongoing development means Starkiller is likely to become increasingly difficult to detect and defend against."
How to avoid falling prey
Traditional detection approaches such as static page analysis, domain blocklisting, and reputation-based URL filtering don't work, as Starkiller dynamically generates phishing pages for each session.
Instead, Abnormal said detection needs to shift toward behavioral signals such as anomalous login patterns and session token reuse from unexpected locations.
Elsewhere, identity-aware analysis needs to be improved to catch a compromised session - even when the phishing page itself looks perfect.
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
What businesses need to know about the update to Cyber EssentialsIn-depth Cyber Essentials was updated this April – what are the key changes?
-
Two US nationals sentenced for role in prolific fake worker laptop farmsNews The Americans were raising money for the North Korean regime by allowing fake IT workers to appear as legitimate US-based employees
-
Beware of emails threatening a code of conduct reviewNews A widespread phishing campaign has targeted tens of thousands of employees
-
‘The inbox is no longer the only frontline’: Phishing attacks are evolving as cyber criminals ramp up ‘multi-channel’ campaigns over email and Microsoft TeamsNews New research shows threat actors are ramping up “multi-channel” phishing attacks by combining lures via email and Microsoft Teams
-
Tycoon 2FA is down, but not out – researchers warn the phishing as a service operation is still a huge threat to businessesNews Millions of Tycoon 2FA attacks are still hitting businesses, according to research from Barracuda
-
Zephyr Energy hackers swiped £700,000 after redirecting a contractor paymentNews Payment to a Zephyr Energy contractor was siphoned off, but the incident has been contained and new security measures implemented
-
'AI-generated phishing became the baseline' for hackers last year – Kaseya warns it's going to get worse in 2026News Forget looking for typos and bad grammar, phishing campaigns are using AI to boost their attack success
-
Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdownNews Operation Synergia III saw 94 arrests - and counting - with malicious IP addresses used in phishing and fraud schemes seized
-
Is your new hire an AI clone? Microsoft says North Korean hackers are using AI to impersonate job seekers and steal company secretsNews The groups are increasingly using face-changing or voice-changing software to make their fake identities more plausible
-
LastPass issues alert as customers face second major phishing campaign of 2026News The campaign is the third to hit LastPass users in six months
