Image for Article: Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Article Details

Title
Article: Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Impact Score
6 / 10
AI Summary (Processed Content)

A new phishing suite called Starkiller uses a reverse proxy to serve live, legitimate login pages, effectively bypassing multi-factor authentication (MFA) and avoiding detection. Separately, the 1Phish kit has evolved into a multi-stage tool targeting password manager users with advanced fingerprinting and OTP capture. Additionally, a sophisticated campaign abuses the Microsoft OAuth device flow to compromise accounts and steal tokens. These developments show phishing tools are becoming more automated and accessible, lowering the skill barrier for large-scale attacks. The main topics covered are the Starkiller phishing platform, the evolution of the 1Phish kit, and advanced MFA-bypass techniques targeting Microsoft and financial institutions.

Original URL
https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html
Source Feed
The Hacker News
Published Date
2026-03-03 11:10
Fetched Date
2026-03-04 13:39
Processed Date
2026-03-04 14:00
Embedding Status
Present
Cluster ID
Not Clustered
Raw Extracted Content