A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/

#phishing #MFA #starkiller

@briankrebs would hosting our own dns like pihole defend against this?
@gh0sti @briankrebs Pretty sure the defense would need to be in the browser. You could block whatever domain the hackers are using in your DNS but they could easily switch to a new one at any time.