Phishing Kits & PhaaS
What Is Starkiller?
Starkiller is a commercial-grade, SaaS-distributed phishing kit that uses headless browsers and reverse proxies to proxy real login pages in real-time, bypassing MFA protections.
Starkiller is a commercial-grade, SaaS-distributed phishing kit that uses headless browsers and reverse proxies to proxy real login pages in real-time, bypassing MFA protections. Operated by threat group Jinkusu and released in February 2026, Starkiller represents next-generation phishing technology that streams authentic login pages directly to victims while capturing all credentials and session data.
How Does Starkiller Work?
Reverse Proxy Architecture
Starkiller employs a sophisticated headless browser approach. The attacker inputs the target brand's URL into the Starkiller platform, which spins up a Docker container with a headless Chrome instance that loads the real login page and acts as a man-in-the-middle proxy according to Abnormal AI and Krebs on Security.
Real-time authentication relay means the end user authenticates with the real site through the proxy. All inputs including keystrokes, 2FA codes, and session tokens pass through attacker infrastructure. Session token capture occurs automatically, with resulting session cookies and tokens captured to provide the attacker with authenticated account access.
The MFA bypass mechanism works because authentication happens against the legitimate service in real-time. MFA codes are relayed before the user realizes compromise. Live monitoring enables attackers to watch the victim screen in real-time as they interact with the phishing page, providing livestream capability for adaptive attacks.
Technical Infrastructure
The headless Chrome plus reverse proxy combination ensures victims see the actual legitimate login page, not a clone. MFA handling occurs through real-time relay of authentication codes. Session validity is authentic because credentials come from real authentication flows. Attacker visibility includes real-time livestream of victim activity. Infrastructure complexity is high, requiring Docker and containerization.
URL Obfuscation Techniques
Starkiller employs URL obfuscation methods to make phishing links appear legitimate according to Krebs on Security (2026). One technique exploits the "@" symbol in URLs, where everything before the "@" is treated by browsers as username data and effectively ignored. For example, a URL like "login.microsoft.com@[malicious-domain]" appears to point to Microsoft but actually directs victims to the attacker's infrastructure. This technique preys on users who check only the beginning of a URL rather than the actual domain, adding a social engineering layer to the technical proxy attack.
Credential Harvesting Pipeline
The Starkiller platform captures data through multiple channels simultaneously according to Abnormal AI (2026). A keylogger records every keystroke the victim enters, capturing not just credentials but also any personal information typed during the session. Cookie and session token theft provides direct account takeover capability without requiring the attacker to re-authenticate. Geo-tracking logs the victim's geographic location for targeting analytics. Automated Telegram alerts notify operators instantly when new credentials are captured, enabling rapid exploitation before session tokens expire. An analytics dashboard tracks conversion metrics across campaigns, treating victim compromise rates with the same metrics-driven approach used by legitimate SaaS platforms.
Supported Target Services
Unlike phishing kits limited to specific industries, Starkiller can target virtually any HTTPS website by proxying the real login page according to Infosecurity Magazine (2026). Documented targets include Microsoft 365, Google Workspace, Apple ID, Facebook, Amazon, Netflix, PayPal, and various banking platforms. Because the platform loads the actual target site rather than using templates, it requires no per-target customization and automatically adapts when target sites update their login interfaces.
How Does Starkiller Differ From Other Tools?
Aspect | Starkiller | Traditional Phishing Kit | Browser-Based AiTM |
|---|---|---|---|
Technical Approach | Headless Chrome + reverse proxy | HTML form clone | Direct session interception |
MFA Handling | Real-time relay | Requires separate capture | Man-in-the-middle |
Session Validity | Authentic (from real auth) | Not applicable | Authentic (relayed) |
Attacker Visibility | Real-time livestream | Limited | Real-time access |
Infrastructure Complexity | High (Docker, containers) | Low | Medium |
Ideal for | Advanced targeted attacks | Basic phishing | Session hijacking |
Why Does Starkiller Matter?
Market Position
Starkiller is distributed openly as a cybercrime SaaS platform with subscription model according to February 2026 reporting from Infosecurity Magazine and Krebs on Security. Active user community discussions on Jinkusu forum focus on techniques and feature requests. Monthly framework updates and customer support via Telegram demonstrate ongoing development. Targets include major brands specifically Microsoft, Google, and Apple logins. Mobile support is being requested by the criminal community, indicating growth trajectory.
Commoditization of Advanced Phishing
Starkiller represents a significant escalation in the commoditization of enterprise-grade phishing infrastructure according to Abnormal AI (2026). The platform packages attack capabilities that were previously available only to skilled threat actors into a subscription service accessible to low-skill cybercriminals. This democratization of advanced phishing technology means organizations now face these sophisticated attacks at significantly greater scale. The SaaS distribution model, complete with documentation, customer support, and regular updates, mirrors legitimate software businesses and reflects a broader trend toward professionalized cybercrime tooling.
Template-Free Architecture
A critical distinction of Starkiller is its template-free design according to Infosecurity Magazine (2026). Because the platform proxies real websites rather than serving cloned HTML pages, there are no template files for security vendors to fingerprint or blocklist. Traditional phishing detection relies heavily on identifying known phishing page templates through signature matching, but Starkiller renders this approach ineffective. The phishing page is always current, matching whatever the legitimate site displays at that moment, and all security features of the real page function normally, defeating many detection mechanisms.
Jinkusu Threat Group Operations
The Jinkusu group operates Starkiller as a structured criminal enterprise according to Krebs on Security (2026). The group maintains a dedicated community forum where cybercriminals discuss attack techniques, request new features, and troubleshoot deployment issues. Operators receive dedicated support via Telegram messaging, monthly framework updates that add new capabilities and address detection evasion, and comprehensive documentation for platform deployment. This level of organized support infrastructure distinguishes Starkiller from ad hoc phishing tools and positions it as a professional criminal service.
What Are the Limitations of Starkiller?
Detection risk includes real-time reverse proxy creating distinct network patterns that may be detected by advanced proxy and WAF rules according to technical analysis. Infrastructure requirements need Docker deployment and headless Chrome instances for each target, making it resource-intensive compared to simple HTML clones. Subscription cost requires ongoing payment through the commercial model, limiting accessibility compared to free or open-source alternatives. Service dependency means platform availability depends on attackers maintaining Jinkusu infrastructure. SSL certificate handling must manage HTTPS termination and presentation, with potential for certificate validation failures that alert targets.
Scalability Constraints
Running individual Docker containers with headless Chrome instances for each phishing target consumes significant server resources according to technical analysis. Each active phishing session requires dedicated compute resources for the containerized browser, limiting the number of concurrent victims an operator can handle compared to lightweight HTML-clone kits that can serve thousands of simultaneous sessions with minimal overhead. This resource intensity creates a trade-off between attack sophistication and campaign scale.
How Can Organizations Defend Against Starkiller?
Authentication Hardening
Advanced MFA should include risk-based authentication and step-up challenges on unusual activity. Hardware keys as primary MFA cannot be relayed according to security research. Proxy detection should monitor for unusual reverse-proxy patterns in network traffic and real-time keystroke inconsistencies. Behavioral analytics detect logins from new geolocations with normal user patterns because livestream attackers often don't replicate exact behavior.
HTTPS certificate pinning for mobile and desktop apps pins legitimate certificates to prevent proxy interception. Email security prevents initial phishing emails reaching users through spam filters and advanced threat protection. Zero Trust architecture assumes all authentications potentially compromised and implements continuous re-authentication and session anomaly detection. Incident response includes automated session revocation upon suspicious activity patterns.
Phishing-Resistant Authentication
The most effective defense against Starkiller is deploying phishing-resistant authentication methods according to Abnormal AI (2026). WebAuthn and FIDO2-based passkeys bind authentication to the legitimate domain cryptographically, preventing the proxy from completing the authentication handshake. Even though the victim sees the real login page, the passkey will not authenticate to the attacker's domain. Organizations should prioritize migrating high-value accounts to passkey-based authentication and disable fallback to phishable authentication methods where possible to prevent MFA downgrade attacks.
Network-Level Detection
Organizations can implement network-level controls to detect Starkiller infrastructure according to security research. Monitoring for anomalous reverse proxy patterns, particularly login traffic that appears to originate from data center IP ranges rather than residential networks, can flag suspicious sessions. Deep packet inspection tools can identify the characteristic traffic patterns of headless browser proxying, where the timing and structure of requests differ from legitimate browser interactions. Session anomaly detection that flags token reuse from unexpected locations or devices provides a post-compromise detection layer.
FAQs
How does Starkiller bypass MFA if the real authentication service validates the password?
Because the attacker relays the authentication flow in real-time through their proxy, the legitimate service never knows the request originated from an attacker according to Abnormal AI. The user submits their password and 2FA code directly to the real service through the proxy. The service authenticates them and the attacker captures the resulting session cookies before the user sees the legitimate site.
What makes Starkiller different from traditional phishing kits?
Traditional kits clone HTML login forms and harvest credentials entered by users according to Dark Reading. Starkiller never clones anything. It proxies the actual real login page loaded in a headless browser, guaranteeing that page is always current, that all security features work defeating detection, and that the attacker can capture session tokens valid for authenticated access.
Can users detect they're being phished with Starkiller?
Difficult without technical inspection according to IT Pro and Cybernews. The page is the real page, the SSL certificate is valid belonging to the real company, and all security indicators are legitimate. Detection requires examining the URL and proxy patterns in network logs, behavioral analysis of post-login activity, or luck spotting small differences in real-time rendering.
How does Starkiller's subscription model work?
Starkiller is sold as a subscription-based SaaS service through the Jinkusu group according to Krebs on Security (2026). Subscribers receive access to the phishing platform, monthly framework updates, Telegram-based customer support, and documentation. The commercial model mirrors legitimate software distribution, with the Jinkusu community forum serving as both a support channel and a marketplace for sharing techniques.



