Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户的要求很明确,不需要特定的开头,直接写文章描述即可。首先,我得通读整篇文章,抓住主要信息。 文章主要讲的是网络安全研究人员披露了一个新的钓鱼套件Starkiller。这个套件通过代理合法登录页面来绕过多因素认证(MFA)保护。它由威胁组织Jinkusu推广,允许用户选择品牌或输入真实URL,并使用URL短链接隐藏目标地址。Starkiller使用无头Chrome在Docker容器中运行,实时代理真实网站内容,确保钓鱼页面不会过时,并且没有模板文件供安全厂商检测或黑名单。 此外,文章还提到另一个钓鱼工具1Phish的升级版,以及针对OAuth 2.0的钓鱼攻击。这些工具使得低技能的网络犯罪分子也能进行复杂的攻击。 总结时需要涵盖Starkiller的功能、其技术手段、以及对网络安全的影响。同时要简洁明了,控制在100字左右。避免使用复杂的术语,让读者一目了然。 现在开始组织语言:首先点明Starkiller是一个新的钓鱼套件,由Jinkusu推广。然后说明它如何代理合法登录页面绕过MFA,并使用无头浏览器和实时代理技术。最后提到它降低了攻击门槛,并结合其他工具如1Phish和针对OAuth的攻击。 检查字数是否在限制内,并确保信息准确全面。 </think> 文章介绍了新的网络钓鱼套件Starkiller及其技术细节,该工具通过代理合法登录页面绕过多因素认证,允许攻击者实时获取用户输入并捕获会话令牌,进一步降低了网络犯罪的技术门槛。 2026-3-3 11:10:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections.

It's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand's real URL. It also lets users choose custom keywords like "login," "verify," "security," or "account," and integrates URL shorteners such as TinyURL to obscure the destination URL.

"It launches a headless Chrome instance – a browser that operates without a visible window – inside a Docker container, loads the brand's real website, and acts as a reverse proxy between the target and the legitimate site," Abnormal researchers Callie Baron and Piotr Wojtyla said.

"Recipients are served genuine page content directly through the attacker's infrastructure, ensuring the phishing page is never out of date. And because Starkiller proxies the real site live, there are no template files for security vendors to fingerprint or blocklist."

This login page proxying technique obviates the need for attackers to update their phishing page templates periodically as the real pages they're impersonating get updated.

Put differently, the container acts as an AitM reverse proxy, forwarding the end user's inputs entered on the spoofed live page to the legitimate site and returning the site's responses. Under the hood, every keystroke, form submission, and session token is routed through attacker-controlled infrastructure and is captured for account takeover.

"The platform streamlines phishing operations by centralizing infrastructure management, phishing page deployment, and session monitoring within a single control panel," Abnormal said. "Combined with URL masking, session hijacking, and MFA bypass, it gives low-skill cybercriminals access to attack capabilities that were previously out of reach."

The development comes as Datadog revealed that the 1Phish kit had evolved from a basic credential harvester in September 2025 into a multi-stage phishing kit targeting 1Password users.

The updated version of the kit incorporates a pre-phishing fingerprint and validation layer, support for capturing one-time passcodes (OTPs) and recovery codes, and browser fingerprinting logic to filter out bots.

"This progression reflects deliberate iteration rather than simple template reuse," security researcher Martin McCloskey said. "Each version builds upon the previous one, introducing controls designed to increase conversion rates, reduce automated analysis, and support secondary authentication harvesting."

The findings show that turkey solutions like Starkiller and 1Phish are increasingly turning phishing into SaaS-style workflows, further lowering the skill barrier necessary to pull off such attacks at scale.

They also coincide with a sophisticated phishing campaign targeting North American businesses and professionals by abusing the OAuth 2.0 device authorization grant flow to sidestep multi-factor authentication (MFA) and compromise Microsoft 365 accounts.

To achieve this, the attacker registers on the Microsoft OAuth application and generates a unique device code, which is then delivered to the victim via a targeted phishing email.

"The victim is directed to the legitimate Microsoft domain (microsoft.com/devicelogin) portal to enter an attacker-supplied device code," researchers Jeewan Singh Jalal, Prabhakaran Ravichandhiran, and Anand Bodke said. "This action authenticates the victim and issues a valid OAuth access token to the attacker's application. The real-time theft of these tokens grants the attacker persistent access to the victim's Microsoft 365 accounts and corporate data."

In recent months, phishing campaigns have also targeted financial institutions, specifically U.S.-based banks and credit unions, to harvest credentials. The campaign is said to have taken place over two distinct phases, an initial wave beginning in late June 2025 and a more sophisticated set of attacks beginning in mid-November 2025.

"The actors began registering [.]co[.]com domains spoofing financial institution websites, presenting credible impersonations of real financial institutions," BlueVoyant researchers Shira Reuveny and Joshua Green said. "These [.]co[.]com domains serve as the initial entry point in a refined multi-stage chain."

The domain, when visited from a clickable link in a phishing email, is designed to load a fraudulent Cloudflare CAPTCHA page that mimics the targeted institution. The CAPTCHA is non-functional and creates a deliberate delay before a Base64-encoded script redirects users to the credential harvesting page.

In an effort to evade detection and prevent automated scanners from flagging the malicious content, directly accessing the [.]co[.]com domains trigger a redirect to a malformed "www[.]www" URL.

"The adversary's deployment of a more advanced multi-layered evasion chain – incorporating referrer validation, cookie-based access controls, intentional delays, and code obfuscation – effectively creates a more resilient infrastructure that presents barriers for automated security tools and manual analysis," BlueVoyant said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html
如有侵权请联系:admin#unsafe.sh