Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
Indian Cyber Security Solutions (GreenFellow IT Security Solutions Pvt Ltd)
"Securing your world Digitally"
Introduction
A new wave of phishing campaigns is leveraging misconfigured AWS environments to send malicious emails using Amazon Simple Email Service (SES) and WorkMail. According to Palo Alto Networks Unit 42, threat actors—tracked as TGR-UNK-0011 (also linked to the group known as JavaGhost)—are exploiting exposed AWS access keys to gain unauthorized access and launch phishing attacks.
How the Attack Works
Step 1: Exploiting Misconfigurations
The attackers do not exploit vulnerabilities within AWS itself. Instead, they take advantage of poor AWS configurations, such as exposed IAM access keys left in code repositories or publicly accessible environments. These exposed keys allow attackers to authenticate into AWS environments using the AWS CLI.
Step 2: Establishing Phishing Infrastructure
Once inside the compromised AWS account, attackers create new SES and WorkMail users and generate SMTP credentials to send phishing emails directly from the organization’s trusted domain. This allows the phishing messages to bypass traditional email security filters since they come from legitimate AWS infrastructure.
Step 3: Persistence & Evasion
Attackers set up unused IAM users and new IAM roles with trust policies, allowing them to retain long-term access and hide their true identities. They also create EC2 security groups named "Java_Ghost" with the message "We Are There But Not Visible", leaving a signature calling card in CloudTrail logs.
How to Stay Safe
About Indian Cyber Security Solutions (ICSS)
Indian Cyber Security Solutions (ICSS) helps businesses protect their digital transactions through security audits, VAPT, and cybersecurity training. Backed by a proven client portfolio and successful case studies, ICSS empowers businesses to defend against modern threats.
Learn more: Indian Cyber Security Solutions
Conclusion
AWS misconfigurations can turn trusted cloud infrastructure into a phishing tool for attackers. Organizations must implement robust cloud security policies, continuously monitor their environments, and partner with Indian Cyber Security Solutions to ensure their AWS deployments remain secure from exploitation.