Researchers Warn About New Methods That Bypass MFA Security
Cybersecurity researchers discovered a new phishing tool called Starkiller that can trick people into giving their login details even if multi-factor authentication (MFA) is enabled.
The tool is offered by a cybercrime group called Jinkusu. It allows attackers to create fake login links that look like real websites. Starkiller loads the real website and secretly acts as a middleman, capturing usernames, passwords, and security codes entered by victims.
It can also hide malicious links using services like TinyURL, making phishing messages harder to recognize.
Another phishing kit called 1Phish now targets users of 1Password and can steal one-time passcodes and recovery codes. Researchers also found attacks targeting Microsoft 365 accounts by tricking victims into entering a device code on a real Microsoft login page.
Safety Tips:
- Avoid clicking suspicious links in emails or messages.
- Check the website address carefully before entering your login details.
- Type the website URL manually instead of clicking links.
- Avoid entering codes or passwords if you did not request the login.
- Use trusted password managers and keep your security settings updated.
Experts warn that these new tools make phishing easier for cybercriminals, so users should stay alert and practice safe online habits.
Source: https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html