HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Phishing Campaigns Leverage Amazon SES and Leaked AWS Keys to Evade Email Defenses

Kaspersky reports a rise in phishing attacks that abuse Amazon Simple Email Service (SES) by using exposed AWS IAM access keys. The technique lets attackers send authenticated, high‑fidelity phishing emails that slip past SPF/DKIM/DMARC checks, increasing risk for organizations that trust AWS‑hosted email services.

LiveThreat™ Intelligence · 📅 May 06, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

Phishing Campaigns Leverage Amazon SES and Leaked AWS Keys to Evade Email Defenses

What Happened — Researchers at Kaspersky observed a sharp increase in phishing attacks that use Amazon Simple Email Service (SES) to send malicious messages. The attackers obtain exposed AWS IAM access keys from public repositories and use them to send authenticated, high‑fidelity phishing emails that bypass SPF/DKIM/DMARC checks.

Why It Matters for TPRM

  • Legitimate cloud‑email services can be weaponized, rendering reputation‑based blocks ineffective.
  • Compromised third‑party email infrastructure can be used to launch BEC and credential‑harvesting campaigns against your organization’s partners and employees.
  • Exposure of AWS credentials in supply‑chain assets (GitHub, Docker images, S3 buckets) highlights a systemic risk in vendor credential management.

Who Is Affected — SaaS providers, financial services, professional services, and any organization that relies on AWS‑hosted email or integrates with third‑party email senders.

Recommended Actions

  • Enforce least‑privilege IAM policies for all AWS keys and rotate them regularly.
  • Enable MFA on all IAM users and service accounts.
  • Apply IP‑allowlist restrictions on SES sending permissions.
  • Deploy email security solutions that inspect content and URLs, not just sender reputation.

Technical Notes — Attack vector: stolen AWS IAM access keys scanned via automated tools (e.g., TruffleHog). Abuse leverages Amazon SES’s built‑in authentication (SPF, DKIM, DMARC) to make phishing emails appear legitimate. No new CVE; the issue is credential exposure and misuse of a trusted service. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/researchers-report-amazon-ses-abused-in-phishing-to-evade-detection/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.