🔓 Data Breaches

Starkiller: The Proxy That Turns Real Logins into Criminal Goldmines

What if the phishing page you're staring at is the real deal, proxied through a criminal server? Starkiller makes it happen, stealing credentials and MFA in real time.

Diagram of Starkiller phishing proxy relaying real login page traffic

⚡ Key Takeaways

  • Starkiller proxies genuine login pages, evading traditional detection like domain blocks.
  • It neuters MFA by relaying real auth flows and hijacking session tokens.
  • As a SaaS-like service, it lowers barriers, inviting mass adoption by low-skill attackers.

🧠 What's your take on this?

Cast your vote and see what Threat Digest readers think

Aisha Patel
Written by

Aisha Patel

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Krebs on Security

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.