Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished.

A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished.

Scheduled Pinned Locked Moved Uncategorized
phishingmfastarkiller
8 Posts 8 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • briankrebs@infosec.exchangeB This user is from outside of this forum
    briankrebs@infosec.exchangeB This user is from outside of this forum
    briankrebs@infosec.exchange
    wrote last edited by
    #1

    A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

    Link Preview Image
    ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

    favicon

    (krebsonsecurity.com)

    #phishing #MFA #starkiller

    Link Preview Image
    milagemayvary@mstdn.socialM suedioh@mastodon.socialS 3x10to8mps@mastodon.social3 ljrk@todon.euL gh0sti@mastodon.socialG 7 Replies Last reply
    3
    0
    • R relay@relay.infosec.exchange shared this topic
      R relay@relay.mycrowd.ca shared this topic
      R relay@relay.publicsquare.global shared this topic
    • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

      A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

      Link Preview Image
      ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

      favicon

      (krebsonsecurity.com)

      #phishing #MFA #starkiller

      Link Preview Image
      milagemayvary@mstdn.socialM This user is from outside of this forum
      milagemayvary@mstdn.socialM This user is from outside of this forum
      milagemayvary@mstdn.social
      wrote last edited by
      #2

      @briankrebs

      That's nasty.

      I don't like it.

      I used to ironically say the internet was a mistake, but some days lately my thoughts have shifted.

      I feel like my browser at a minimum needs a behavior shift: if any @ is in the address bar, maybe the browser gives a warning & gives you a chance to look over the address before continuing.

      Uhg, tummy ache activated.

      1 Reply Last reply
      0
      • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

        A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

        Link Preview Image
        ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

        favicon

        (krebsonsecurity.com)

        #phishing #MFA #starkiller

        Link Preview Image
        suedioh@mastodon.socialS This user is from outside of this forum
        suedioh@mastodon.socialS This user is from outside of this forum
        suedioh@mastodon.social
        wrote last edited by
        #3

        @briankrebs I think I just ran into this tactic: I clicked on an MSNow story on youtube and it took me to a third party site that flat-out said "you're giving us your info" so I backed out quickly. The company name was something like 'vesuvis' or similar.

        1 Reply Last reply
        0
        • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

          A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

          Link Preview Image
          ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

          favicon

          (krebsonsecurity.com)

          #phishing #MFA #starkiller

          Link Preview Image
          3x10to8mps@mastodon.social3 This user is from outside of this forum
          3x10to8mps@mastodon.social3 This user is from outside of this forum
          3x10to8mps@mastodon.social
          wrote last edited by
          #4

          @briankrebs We need the list of sites identified as already being compromised with this

          1 Reply Last reply
          0
          • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

            A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

            Link Preview Image
            ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

            favicon

            (krebsonsecurity.com)

            #phishing #MFA #starkiller

            Link Preview Image
            ljrk@todon.euL This user is from outside of this forum
            ljrk@todon.euL This user is from outside of this forum
            ljrk@todon.eu
            wrote last edited by
            #5

            @briankrebs The term "MFA" is just useless as a metric for the security of a system. Just like 3DES, putting multiple broken auth mechanisms behind each other may work as a stop-gap measure but doesn't address the problem at its core.

            1 Reply Last reply
            0
            • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

              A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

              Link Preview Image
              ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

              favicon

              (krebsonsecurity.com)

              #phishing #MFA #starkiller

              Link Preview Image
              gh0sti@mastodon.socialG This user is from outside of this forum
              gh0sti@mastodon.socialG This user is from outside of this forum
              gh0sti@mastodon.social
              wrote last edited by
              #6

              @briankrebs would hosting our own dns like pihole defend against this?

              1 Reply Last reply
              0
              • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

                Link Preview Image
                ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

                favicon

                (krebsonsecurity.com)

                #phishing #MFA #starkiller

                Link Preview Image
                eloy@hsnl.socialE This user is from outside of this forum
                eloy@hsnl.socialE This user is from outside of this forum
                eloy@hsnl.social
                wrote last edited by
                #7

                @briankrebs Huh, fascinating, I'm finding StackOverflow comments from 2014 that HTTP Basic Auth credentials in the URL will throw phising warnings in Safari... There was apparently some back and forth ongoing with the removal of this feature in multiple browsers

                Link Preview Image
                Can you pass user/pass for HTTP Basic Authentication in URL parameters?

                I believe this is not possible, but someone I know insisted that it works. I don't even know what parameters to try, and I haven't found this documented anywhere. I tried http://myserver.com/~user=

                favicon

                Server Fault (serverfault.com)

                I'm still a regular user of this feature, I hope it does not get removed.

                1 Reply Last reply
                0
                • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                  A slick new phishing-as-a-service offering demonstrates just how easily a username+password and a one-time token can be phished. Dubbed "Starkiller," the service uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the victim and the legitimate site -- forwarding the victim's username, password and multi-factor authentication code to the legitimate site and returning its responses.

                  Link Preview Image
                  ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

                  favicon

                  (krebsonsecurity.com)

                  #phishing #MFA #starkiller

                  Link Preview Image
                  aakl@infosec.exchangeA This user is from outside of this forum
                  aakl@infosec.exchangeA This user is from outside of this forum
                  aakl@infosec.exchange
                  wrote last edited by
                  #8

                  @briankrebs Running into a sever error on the site, FYI.

                  1 Reply Last reply
                  1
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups