Back to Blog

Starkiller Phishing Kit: Why MFA Alone Is No Longer Enough for Irish Businesses

Security Awareness & Human Factors
6 min read
Starkiller Phishing Kit: Why MFA Alone Is No Longer Enough for Irish Businesses

For many Irish SMEs, implementing Multi-Factor Authentication (MFA) has been a significant step forward in cybersecurity. It’s a control that the NCSC Ireland consistently recommends, and rightly so, as it dramatically reduces the risk of account takeover. You’ve likely invested time and resources into getting your team set up with MFA, and that was absolutely the right decision. MFA remains one of the most effective security controls available to protect your business from common cyber threats. However, the threat landscape is constantly evolving, and new tools are emerging that challenge even the best practices.

Recently, a sophisticated new threat has come to light: the 'Starkiller' Phishing-as-a-Service (PhaaS) toolkit. This isn't your typical phishing email with a dodgy link; Starkiller represents a significant leap in attacker capabilities, designed specifically to bypass the very MFA protections you've put in place. For Irish businesses, this means that while MFA is still vital, relying on it as your sole defence against credential theft is no longer sufficient. We need to understand this new problem to effectively counter it.

The Problem: Starkiller's Advanced Phishing Tactics

Starkiller is a commercial toolkit, readily available to cybercriminals, that makes advanced phishing attacks accessible to a much wider pool of malicious actors. Unlike older phishing methods that tried to trick users with fake login pages, Starkiller operates as a reverse proxy. This means that when a victim clicks a phishing link, they are actually served the real Microsoft or Google login page, in real-time, through the attacker's system. The phishing page is always up-to-date and visually identical to the legitimate one, making it virtually impossible for even a vigilant user to spot any discrepancies.

This sophisticated technique allows the Starkiller kit to do more than just capture your username and password. Crucially, it also captures the session token generated after a successful login. A session token is like a temporary digital key that proves you've already authenticated. With this token, an attacker can hijack your authenticated session, gaining full access to your accounts without needing to re-enter credentials or bypass MFA themselves. This effectively renders traditional MFA methods, such as SMS codes or authenticator app one-time passwords, vulnerable and ineffective against such an attack.

The Consequence: Democratised Cybercrime and Increased Risk

What makes Starkiller particularly concerning for Irish SMEs is how it democratises advanced cybercrime. Previously, launching such sophisticated, MFA-bypassing attacks required significant technical skill and resources. Now, low-skilled criminals can simply subscribe to a service like Starkiller and launch highly effective attacks. This means that Irish businesses are now targets for a much wider and more diverse pool of criminals, increasing the overall risk of a successful breach.

For many SMEs, the adoption of MFA was a major security milestone, providing a strong sense of protection. The revelation that tools like Starkiller can bypass these controls can be disheartening. It underscores the reality that cybersecurity is a continuous race against evolving threats. A successful Starkiller attack can lead to data breaches, financial fraud, and significant operational disruption, impacting your business's reputation and bottom line. It's a stark reminder that while MFA is a critical foundation, it must be part of a broader, adaptive security strategy. For more on how attackers exploit human psychology, see our article on the psychology of cyber attacks: why smart people click bad links.


Free Resource: Download The Irish SME Cyber Survival Guide — 10 controls based on NCSC Ireland & ENISA guidance. Plain English, no jargon.


The Solution: Upgrading to Phishing-Resistant MFA and Enhanced Defences

The good news is that not all MFA is created equal, and there are solutions available that are resistant to these proxy-based phishing attacks. The most effective countermeasure is to upgrade to FIDO2 phishing-resistant MFA, typically implemented through hardware security keys like YubiKeys. These devices use cryptographic protocols that bind the authentication to the specific website, making it impossible for an attacker using a reverse proxy to intercept and reuse the credentials or session token. FIDO2 security keys are designed to be inherently resistant to phishing, offering a much higher level of protection.

Beyond upgrading your MFA, a multi-layered approach is essential. Consider implementing the following:

  • Enhanced Staff Training: Educate your employees not just on what MFA is, but also on the concept of MFA fatigue attacks, where attackers repeatedly send MFA prompts hoping a user will eventually approve one by mistake. Reinforce the importance of never approving an MFA request they didn't initiate. This is crucial for security awareness and human factors.
  • Anomalous Login Monitoring: Implement systems that monitor for unusual login attempts or access patterns. If an account logs in from a new location or at an odd hour, it should trigger an alert for investigation. This proactive monitoring can help detect breaches early.
  • Browser Isolation for High-Risk Users: For employees who handle sensitive data or have elevated privileges, consider browser isolation technologies. These solutions execute web browsing sessions in a remote, secure environment, preventing malicious code from reaching the user's device, even if they click a phishing link.
  • Robust Email Security: While Starkiller bypasses MFA, initial access often comes via email. Ensure your email security is robust, utilising controls like SPF, DKIM, and DMARC to prevent spoofing and phishing emails from reaching inboxes. Learn more in our guide to email security for Irish businesses.

Action: Securing Your Business Against Evolving Threats

Taking action now is paramount. Start by assessing your current MFA implementation. If you are still relying solely on SMS or app-based one-time passwords, begin exploring the transition to FIDO2-compliant hardware security keys. The NCSC Ireland's guidance consistently points towards stronger authentication methods, and phishing-resistant MFA aligns perfectly with these recommendations. This isn't about replacing your existing MFA; it's about enhancing it to meet the new generation of threats.

Furthermore, review your security awareness training programmes. Ensure they cover advanced phishing techniques and the importance of reporting suspicious activity. Consider a structured approach to incident response planning, so your team knows exactly what to do if a breach occurs, even with these new threats. A well-defined incident response plan can significantly mitigate the damage of an attack. Finally, if you're unsure where to start or need expert guidance, engaging with a vCISO service can provide the strategic oversight and practical advice needed to navigate these complex challenges. Understanding what a vCISO is and if your Irish SME needs one can be a valuable first step.


Ready to Strengthen Your Security?

If this is a concern for your business, a structured review will give you a clear picture and a prioritised action plan.

Book a free 20-minute strategy call with our vCISO team. We work with small and medium businesses across Ireland — no jargon, no scare tactics, just clear actionable advice.

Book Your Free Strategy Call

Sources

Share this article

Ready to strengthen your security?

Get expert vCISO guidance tailored to your business needs.