Attackers Abuse Amazon SES to Send Authenticated Phishing Emails That Bypass Security
Cybersecurity NewsArchived May 05, 2026✓ Full text saved
Threat actors are increasingly turning to Amazon’s own cloud email infrastructure to deliver phishing messages that look completely genuine, passing every standard security check along the way. Phishing has always been about deception. Attackers craft emails designed to look real, hoping recipients will trust what they see and hand over their credentials or money. For […] The post Attackers Abuse Amazon SES to Send Authenticated Phishing Emails That Bypass Security appeared first on Cyber Securi
Full text archived locally
✦ AI Summary· Claude Sonnet
HomeCyber Security News
Attackers Abuse Amazon SES to Send Authenticated Phishing Emails That Bypass Security
By Tushar Subhra Dutta
May 5, 2026
Threat actors are increasingly turning to Amazon’s own cloud email infrastructure to deliver phishing messages that look completely genuine, passing every standard security check along the way.
Phishing has always been about deception. Attackers craft emails designed to look real, hoping recipients will trust what they see and hand over their credentials or money.
For years, security tools have gotten better at spotting suspicious senders, unknown domains, and failed email authentication checks.
So attackers adapted. Instead of building fake infrastructure, they are now hijacking real, trusted services to do the dirty work.
The latest target of this strategy is Amazon Simple Email Service, widely known as Amazon SES, a cloud-based platform used by businesses around the world to send transactional and marketing emails reliably.
Amazon SES is deeply embedded in the AWS ecosystem, which makes it a trusted name for both users and security filters alike.
Emails sent through this service carry valid SPF, DKIM, and DMARC authentication headers, meaning they pass every technical check that most email security systems run.
The Message-ID headers in these messages almost always include “.amazonses.com,” further reinforcing the appearance of legitimacy.
From a purely technical standpoint, a phishing email sent through Amazon SES looks no different from a legitimate business communication. This is precisely what makes the abuse of this platform so dangerous.
Phishing email imitating a Docusign notification (Source – Securelist)
Securelist researchers identified a clear and growing uptick in phishing campaigns abusing Amazon SES in early 2026.
The team noted that attackers are exploiting this platform not because it is vulnerable in the traditional sense, but because it is legitimate.
By routing phishing emails through trusted infrastructure, threat actors effectively sidestep reputation-based blocklists.
Blocking the sender’s IP address is not a viable solution either, because doing so would cut off all legitimate emails sent through Amazon SES for any organization, generating an unmanageable volume of false positives.
Phishing email headers confirming Amazon SES origin (Source – Securelist)
The most common lure observed in early 2026 involved fake notifications from electronic signature services, such as emails impersonating Docusign.
Victims received messages asking them to click a link to review and sign a document. The link appeared to point to amazonaws.com, which most users would consider safe.
Clicking it redirected victims to a credential-harvesting form hosted on AWS infrastructure, making the deception even harder to detect.
Phishing sign-in form (Source – Securelist)
Beyond credential theft, attackers have also been using Amazon SES to conduct Business Email Compromise (BEC) campaigns, where they impersonate employees and send fabricated invoice threads to finance departments, requesting urgent wire transfers.
BEC email featuring a fake conversation between an employee and a vendor (Source – Securelist)
The PDF attachments in these BEC emails contained no malicious URLs or QR codes, only forged payment details and supporting documents designed to appear as a legitimate business exchange.
How Attackers Gain Access
The entry point for these campaigns is almost always leaked IAM (AWS Identity and Access Management) access keys.
Developers routinely expose these keys by leaving them in public GitHub repositories, ENV configuration files, Docker images, or unsecured S3 buckets.
Attackers use automated scanning tools, including bots built on the open-source utility TruffleHog, specifically designed to hunt for exposed secrets across public code repositories.
Forged financial documents attached to the BEC email (Source – Securelist)
Once a key is found, the attacker verifies its sending permissions and email limits, then begins blasting out phishing messages at scale.
The entire operation takes advantage of someone else’s legitimate account, meaning the sending IP carries a clean reputation and the emails arrive with full authentication stamps intact.
This makes detection at the gateway level extremely difficult, because the email is technically doing everything right.
Securelist researchers recommend that organizations treat IAM access key security as a top priority. Applying the principle of least privilege ensures that keys carry only the permissions required for specific tasks, reducing the damage potential if a key is exposed.
Transitioning from static IAM access keys to AWS IAM roles is a stronger approach, as roles provide scoped, temporary permissions.
Enabling multi-factor authentication, configuring IP-based access restrictions, setting up automated key rotation, and running regular security audits all help reduce exposure.
Using the AWS Key Management Service to manage encryption keys centrally also adds an important layer of control.
On the user side, emails should never be trusted based solely on the sender name or domain.
Unexpected documents should be verified through a separate communication channel before any action is taken, and every link in an email body should be inspected carefully before clicking.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
Tags
cyber security
cyber security news
Copy URL
Linkedin
Twitter
ReddIt
Telegram
Tushar Subhra Dutta
Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.
Trending News
WhatsApp Testing Own Cloud Backup Provider for Default End-to-End Encryption
New Attribution Framework Connects APT Campaigns Through Strategic, Operational, and Technical Layers
New Windows 0-Click Vulnerability Exploited to Bypass Defender SmartScreen
Critical Android Zero-Click Vulnerability Grants Remote Shell Access
FBI and CISA Released Zero Trust Principles Implementation Guide for OT Environments
Latest News
Cyber Security
WhatsApp Vulnerability Lets Attackers Leverage Instagram Reels to Execute Malicious URLs
Cyber Security News
Instagram’s to End Encrypted Chats for Direct Messages
Cyber Security News
Beware of Fake ‘Notepad++ for Mac’ Website, Possibly Could Harm your Machine
Android
Critical Android Zero-Click Vulnerability Grants Remote Shell Access
Cyber Security News
pnpm 11 Turns On Minimum Release Age by Default to Reduce npm Supply Chain Risk