The News
Security researchers and fraud prevention experts are raising concerns about a phishing-as-a-service platform known as “Starkiller,” which proxies legitimate login pages and multi-factor authentication (MFA) flows in real time to capture credentials and authentication codes. According to Mary Ann Miller, VP Evangelist and Fraud Executive Advisor at Prove, these attacks are increasingly enabling merchant and marketplace account takeovers (ATOs) that redirect payouts to fraud-controlled mule accounts.
Analysis
Phishing Platforms Evolve to Defeat Traditional MFA Defenses
Phishing attacks have previously relied on fake login pages designed to trick users into entering credentials. Modern phishing frameworks are evolving beyond static spoofed pages toward dynamic proxy-based systems that interact directly with legitimate services.
Platforms such as Starkiller operate as a live intermediary between a user and the real login system. When a victim enters credentials and MFA codes into what appears to be the legitimate interface, the proxy forwards those inputs to the actual service in real time. Once authenticated, attackers gain access to the session without the user realizing anything unusual occurred.
This approach allows attackers to bypass MFA protections that rely solely on one-time passcodes or SMS authentication. Because the attacker is relaying the authentication flow directly to the legitimate service, the platform effectively captures valid session tokens and authentication cookies. Authentication security is increasingly shifting toward identity assurance and behavioral validation rather than relying solely on login credentials or MFA factors.
Account Takeover Attacks Shift Toward Monetization Workflows
While past phishing attacks targeted consumer accounts or corporate email systems, new attack patterns increasingly focus on monetization pathways within digital platforms. Marketplaces, gig platforms, and fintech services often store payment routing details that determine where funds are sent.
Once attackers obtain authenticated session access, they may change payout destinations, redirect payments to mule accounts, or manipulate transaction flows. These actions occur after the authentication process has completed, meaning traditional login security controls may not detect the fraudulent activity.
Marketplace platforms are particularly vulnerable to this pattern. Merchants and sellers often rely on automated payment systems to distribute revenue across thousands of accounts. If attackers gain access to a merchant dashboard or payout configuration, funds can be redirected quickly before fraud detection systems intervene. As digital commerce ecosystems expand, the financial incentive for these attacks continues to grow.
Market Challenges and Insights
Identity and authentication security remain a persistent challenge for online platforms. While multi-factor authentication has become a widely adopted security control, attackers are developing techniques designed specifically to bypass or exploit these mechanisms. Proxy-based phishing platforms represent one example of this evolution. By intercepting the authentication process itself, attackers can obtain valid session access rather than simply stealing passwords.
At the same time, organizations often focus security efforts on the login stage of the user journey while paying less attention to post-authentication behavior. Fraud activity that occurs after login, such as payout changes, account settings modifications, or API access, may evade detection if monitoring systems focus primarily on authentication events.
According to data cited by Prove, 62% of buyers report MFA bypassing as an escalating threat, highlighting growing awareness that authentication alone may not be sufficient to secure digital accounts.
Implications for Developers and Platform Security Teams
For developers building authentication and identity systems, the emergence of proxy-based phishing attacks highlights the need for stronger session-level security controls. Authentication mechanisms must increasingly incorporate contextual and behavioral signals rather than relying solely on credential verification.
Platforms may implement additional monitoring for high-risk post-authentication actions such as payout changes, account ownership updates, or API key generation. Behavioral analytics and device fingerprinting technologies can help detect anomalies that occur after login even when authentication appears valid.
Developers may also explore stronger authentication mechanisms such as hardware security keys, passkeys, and phishing-resistant authentication protocols. These technologies reduce the effectiveness of proxy-based attacks by binding authentication events to trusted devices or cryptographic identities. Security architectures must also consider how session tokens and authentication cookies are protected within application workflows.
Looking Ahead
Phishing attacks continue to evolve as cybercriminals adapt to stronger authentication defenses. Proxy-based phishing platforms like Starkiller illustrate how attackers are shifting their focus from credential theft to session hijacking and monetization workflows.
For digital platforms operating marketplaces, financial services, or gig economies, protecting post-authentication workflows may become as important as securing the login process itself. Identity verification, behavioral monitoring, and transaction-level safeguards will likely play a growing role in defending against these emerging attack patterns.
As authentication technologies evolve, organizations may increasingly adopt phishing-resistant identity frameworks designed to prevent attackers from intercepting login flows in the first place.
