From Compromised Keys to Phishing Campaigns: Inside a Cloud Email Service Takeover

Sept. 5, 2025, 8:47 a.m.

Description

An AWS access key compromise led to a sophisticated SES abuse campaign in May 2025. The attacker exploited the stolen key to bypass SES restrictions, verify new sender identities, and conduct a large-scale phishing operation. They used multi-regional PutAccountDetails requests to escape the SES sandbox, a novel technique in SES abuse. The campaign involved creating multiple email identities using attacker-owned and legitimate domains with weak DMARC protections. The subsequent phishing campaign targeted various organizations, using tax-related lures to steal credentials. This incident highlights the importance of monitoring cloud service usage, especially for services like SES that can be exploited for monetization.

Date

  • Created: Sept. 4, 2025, 11:40 p.m.
  • Published: Sept. 4, 2025, 11:40 p.m.
  • Modified: Sept. 5, 2025, 8:47 a.m.

Indicators

  • street7news.org
  • managed7.com
  • street7market.net
  • docfilessa.com

Attack Patterns