When you purchase through links on our site, we may earn an affiliate commission. This doesn’t affect our editorial independence.
Researchers at Abnormal Security have uncovered a sophisticated new phishing-as-a-service platform called Starkiller, which is being sold on cybercrime forums. Unlike traditional phishing kits that rely on static web page clones, this tool represents a significant evolution in phishing tactics. It is marketed by a threat group known as Jinkusu, which distributes it with a monthly subscription model, complete with customer support and regular updates.
Traditional phishing kits are inherently fragile because they use static HTML copies of login pages. If a legitimate company, such as Google or Microsoft, updates its interface even slightly, the fake page becomes immediately outdated and suspicious. This makes them relatively easy for vigilant users and security software to identify. Starkiller, however, completely bypasses this vulnerability.
Instead of hosting a cloned page, Starkiller operates as a live reverse proxy. When a victim clicks a phishing link, the platform launches a headless Chrome browser inside a Docker container. This invisible browser fetches the real, live website of the impersonated brand and relays it to the victim. This means the user sees the actual, up-to-date login page, making the deception far more convincing.
The phishing page is unique for each session and perfectly mirrors the current version of the target site. This dynamic generation renders many traditional detection methods, such as domain blocklisting and reputation-based URL filtering, completely ineffective.
The Starkiller control panel provides a polished dashboard that requires almost no technical skill to operate. An attacker enters the URL of the brand they wish to impersonate, and the platform automatically handles the complex backend setup. This includes managing Docker containers, configuring the headless Chrome instance, and handling reverse proxy and SSL certificate management.
Using Advanced Data Interception and Cloning Technique
The platform’s architecture allows it to intercept all data flowing between the victim and the legitimate site. Every keystroke, submitted form, and session cookie is logged by the attacker’s infrastructure. Because the victim is authenticating with the real website, any one-time password or MFA token they enter is forwarded correctly, successfully logging them in.
This successful login is what makes the attack so dangerous. While the MFA prompt functions as intended and grants the user access, the proxy simultaneously captures the resulting session cookie. With this cookie, the attacker can bypass the need for a password or MFA entirely and directly take over the authenticated session, effectively neutralising the security benefit of multi-factor authentication.
Starkiller Enables Real-time Surveillance of Victims
The platform offers real-time session monitoring and data exfiltration tools. Attackers can watch victims interact with the page in real time, track their geolocation, and receive automated Telegram alerts the moment new credentials or session tokens are harvested. The criminal group Jinkusu fosters a community forum where users can share techniques, request features, and troubleshoot deployments.
The active forum and dedicated Telegram support indicate a growing, professionalised user base. This level of ongoing development and community support suggests that Starkiller will become more difficult to detect and defend against over time. It highlights a shift in cybercrime towards sophisticated, service-oriented business models.
How to Safeguard Yourself and Organisation from Starkiller
To defend against attacks facilitated by platforms like Starkiller, organisations need to move beyond traditional detection methods. Security strategies must focus on behavioural signals, such as anomalous login patterns and the reuse of session tokens from unexpected geographic locations. Improving identity-aware analysis is crucial to detecting a compromised session, even when the phishing page used to steal it looks absolutely perfect.
See Related Posts: ZeroDayRAT: A Dreaded Android and iOS Malware Now Used by Hackers
New Android Malware, Albiriox, Empties People’s Bank Accounts – Cybersecurity Experts Warn









