In recent weeks, a particularly worrying phenomenon has been observed: malicious actors are taking advantage of the legitimate service of Amazon Simple Email Service (SES) as infrastructure for high-quality phishing campaigns. The strategic value of SES for attackers is not accidental: by using a reliable and verified shipping platform, malicious emails can remove regular controls and reach entry trays with headers and signatures that seem legitimate.
The root of the problem is the presentation of credentials in a flat text.. Public repositories, .env files, Docker images and poorly protected backup continue to filter AWS access keys, and criminals have automated their search with tools that scan large volumes of public data. This same process, once automated, allows you to check permissions, validate shipping limits and use the compromised account to spread thousands of messages in a short time.

The technical result is clear: when the sender is Amazon SES, protocols such as SPF, DKIM or DMARC are no longer a practical obstacle to the scam distributor, and the option of blocking IP addresses becomes ineffective because it would involve blocking part of the legitimate mail that passes through the same infrastructure in the cloud. In addition, attackers are hosting phishing pages in AWS services, adding an extra layer of credibility and making it difficult to detect by traditional black lists.
The observed attacks have already transcended the generic phishing: criminals manufacture full mail threads, HTML templates that replicate real login flows and false documents to fool financial departments with fraudulent bills. This evolution towards BEC (commitment to business mail) and cloud-hosted supplanting pages requires rethinking the defense, which cannot rely only on reputation-based filters.
What technical equipment should do immediately: remove long-use access keys, rotate them frequently and replace them with temporary roles where possible; apply the principle of minor privilege for each identity; force multi-factor authentication (MFA) in all accounts with administrative permits; and restrict access by IP address or specific ranges for sensitive operations. In parallel, activate records and alerts in CloudTrail and CloudWatch to detect abnormal patterns of use of ES, and set operational limits that require human review before abrupt increases in the volume of shipment.
At the development cycle level, it is essential to incorporate secret scanning into the pipelines and prevent accidental publication of keys. Detection tools in the repository itself - such as the public solution that inspires many of these campaigns - help both to avoid leaks and to react quickly when they happen. For more context about that detection tool you can review your official repository in https: / / github.com / trufflesecurity / truffleHog and for recommendations of identity management in AWS it is appropriate to consult the good practices of AMI in https: / / docs.aws.amazon.com / IAM / latest / UserGuide / best-practices.html.

There are also organizational measures that reduce the impact: to establish secondary verification processes for payments and orders (telephone confirmation or out-of-mail channels), to train financial and customer service teams in the detection of social engineering signals, and to deploy mail security solutions that perform dynamic link and content analysis by clicking (click-time URL scanning) rather than relying only on static signatures.
Shared responsibility and pressure on suppliers are two key parts: companies must tighten their internal practices, but cloud providers can also mitigate abuse by improving the detection of anomalies in the use of services such as ES and by applying automatic controls when a set of credentials shows atypical behavior. A recent technical report documents this pattern of abuse and provides traces that illustrate the current sophistication; in order to further this research, the analysis published by Kaspersky can be consulted on https: / / securelist.com / amazon-ses-physical-and-bec-attacks / 119623 /.
In short, the ease with which a legitimate service can be recycled for malicious campaigns requires the combination of technical controls (key rotation, MFA, least privilege, monitoring), safe development practices (secret scanning, device review) and operational policies (payment verification, training). Ignoring any of these layers leaves organizations and users exposed to fraud that today rely on the credibility of cloud infrastructure.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...