{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiek3krhvq67azamwhcma5we6okxohz5vibsv4sxqb6rssaqdyucqy",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mg5wc4gqeyx2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiahpznzbu24cqm57jyt5zq2tyfb7pyzesqkc2hgjwflnpo4cspmni"
    },
    "mimeType": "image/jpeg",
    "size": 172295
  },
  "path": "/2026/03/starkiller-phishing-suite-uses-aitm.html",
  "publishedAt": "2026-03-03T11:10:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections.\nIt's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand's real URL. It also lets",
  "title": "Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication"
}