{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiek3krhvq67azamwhcma5we6okxohz5vibsv4sxqb6rssaqdyucqy",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mg5wc4gqeyx2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiahpznzbu24cqm57jyt5zq2tyfb7pyzesqkc2hgjwflnpo4cspmni"
},
"mimeType": "image/jpeg",
"size": 172295
},
"path": "/2026/03/starkiller-phishing-suite-uses-aitm.html",
"publishedAt": "2026-03-03T11:10:00.000Z",
"site": "https://thehackernews.com",
"textContent": "Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections.\nIt's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand's real URL. It also lets",
"title": "Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication"
}