A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

krebsonsecurity.com/2026/02/st

A screenshot of what the victim sees in a browser URL when visiting one of these Starrkiller domains. In this image from Abnormal AI, the actual malicious landing page is blurred out but we can see it ends in .ru. The service also offers the ability to insert links from different URL-shortening services.
0
7
0

If you have a fediverse account, you can quote this note from your own instance. Search https://infosec.exchange/users/briankrebs/statuses/116120107511369344 on your instance and quote it. (Note that quoting is not supported in Mastodon.)