https://starkiller.su/
172.94.9.232 · Secure Internet LLC
City of London, United Kingdom
—
200 · 16.3s
Valid· E8, Let's Encrypt, US
COMPLETED
Linked Phishing Report
This scan is attached to a vendor submission report
Brand
STARKILLER
Vendors
30/30
Status
completed
No KB/IOK detections were recorded for this scan.
technology | finance | ecommerce | other · 4/5/2026
The page at starkiller.su presents a brand-nicking interface claiming to be STARKILLER SYSTEM ACCESS with a credential harvesting flow. Visuals mimic a professional service and load assets (logo.png, fonts) to resemble a branding style, but the domain starkiller.su is not the legitimate Starkiller service. Endpoints such as /api/order/request and /api/payment/status appear to be designed to capture input or exfiltrate data, indicating credential collection activity. The SSL cert is recently issued by Let's Encrypt, which is common for phishing domains, and the site uses a conspicuously styled landing page to deceive visitors into entering data.
Capture
Stages: 3
Canonical: Late Render (+3s)
Changed: No
Credential Signals
Forms: 1
Password fields: 0
Late-stage login UI: No
Resource Signals
Resources: 9
Hosts: 3
Domains: 3
Suspicious Endpoints
hxxps://starkiller[.]su/
hxxps://starkiller[.]su/api/order/request
hxxps://starkiller[.]su/api/payment/status/$%7BorderId%7D
This site is actively impersonating a named brand (Starkiller) and hosts a suspicious credential/payment capture flow at the domain starkiller.su. The page title and visuals present a legitimate system access portal, while network endpoints indicate data exfiltration from user inputs. The domain is new and not associated with the known Starkiller service, and the SSL certificate is recently issued, which is common for phishing operations attempting to appear legitimate. Immediate action is warranted: suspend_domain and block_url to prevent credential collection, and monitor for similar clones from the same actor.
Monitor