Phishing Through Trusted Channels: A Deep Dive into Amazon SES Abuse and Defense

Overview

Attackers constantly seek ways to bypass email security filters. One increasingly effective method involves abusing legitimate cloud services that organizations already trust. Amazon Simple Email Service (Amazon SES) – a cloud-based platform for sending transactional and marketing emails – has become a prime target. By leveraging SES, attackers send phishing emails that pass SPF, DKIM, and DMARC checks, include legitimate-looking amazonses.com headers, and originate from trusted IP addresses. This tutorial breaks down how these attacks work, from credential theft to final delivery, and offers practical steps to defend your organization.

Phishing Through Trusted Channels: A Deep Dive into Amazon SES Abuse and Defense
Source: securelist.com

Prerequisites

To get the most from this guide, you should be familiar with:

No advanced programming skills required, but examples include command-line snippets for validation.

Step-by-Step Anatomy of an Amazon SES Phishing Attack

1. Reconnaissance and Key Harvesting

Attackers start by searching for leaked IAM access keys. These keys are often accidentally exposed in:

To automate discovery, phishers use tools like TruffleHog, an open-source scanner that detects secrets in Git repositories. Once a candidate key pair is found, they test it against AWS APIs.

# Example: Testing credentials with AWS CLI (attacker's perspective)
aws sts get-caller-identity --profile stolen_profile
# If successful, they see the account ID and user ARN.

Next, they verify that the key has ses:SendEmail or ses:SendRawEmail permissions, ideally with sending limits sufficient for bulk phishing.

2. Key Verification and Setup

After confirming the key works, attackers check SES sending limits and verify the sending domain (if already configured). They may also use the key to request a sending quota increase from AWS – often automated if the stolen account has billing history.

If the victim’s AWS account already has SES verified domains, the attacker can immediately send emails that appear to come from that domain. Otherwise, they might attempt to verify a new domain – but this is riskier because it triggers notifications to the account owner.

3. Crafting the Phishing Email

Using the IAM key, attackers call the SES API to send emails with custom HTML templates. Typical phishing themes include:

The HTML is carefully designed to match legitimate services. A critical element is the phishing URL, which is masked using AWS infrastructure itself – for example, a link pointing to https://amazonaws.com/something that actually redirects to a malicious site. Because the domain amazonaws.com is legitimate, users and many security filters trust it.

Example: Sending via AWS CLI (attacker)

aws ses send-email \
    --from 'noreply@docusign.com' \
    --destination 'ToAddresses=target@victim.com' \
    --message 'Subject={Data=DocuSign Document Ready,Charset=utf8},Body={Html={Data=...View Document...}}'

4. Bypassing Email Security

Amazon SES automatically signs outgoing emails with DKIM and configures SPF records. The Message-ID header contains .amazonses.com, which pass all standard authentication checks. The sending IP addresses are from AWS’s large pool, so they are not blocklisted. Email security gateways that rely on reputation alone will likely allow these messages through. The attacker’s email appears technically legitimate from an infrastructure standpoint.

Phishing Through Trusted Channels: A Deep Dive into Amazon SES Abuse and Defense
Source: securelist.com

Additionally, attackers can use AWS’s rate limits to send thousands of emails before being throttled, maximizing their reach before any anomaly detection kicks in.

5. The Attack in Action

Once the email lands in the target’s inbox, the victim sees a convincing brand interface. Clicking the link (e.g., https://amazonaws.com/...?redirect=malicious.com) leads to a phishing page that steals credentials or sensitive data. Because the initial domain is Amazon’s, the user may not suspect anything until it’s too late.

Real-world example: In early 2026, attackers sent fake DocuSign notifications via SES. Email headers showed amazonses.com, and the links pointed to Amazon’s domain with a redirect. The attack bypassed many standard filters.

Common Mistakes (and How to Avoid Them)

For Organizations:

For Security Teams:

Summary

Amazon SES abuse represents a sophisticated phishing vector that exploits trust in legitimate cloud infrastructure. Attackers steal IAM keys, send authenticated emails that bypass security, and use redirects to fool victims. Defending requires proactive key hygiene, least-privilege IAM policies, monitoring SES usage, and supplementing email authentication with content analysis. By understanding the attack lifecycle, organizations can better protect their users and data.

Tags:

Recommended

Discover More

GCC 16.1 Delivers Major C++20 Defaults and Pioneering C++26 FeaturesNavigating Oracle’s Monthly Patch Cycle: A Guide for Administrators in the Age of AI-Driven Threats10 Key Facts About Apple's Plan to Use Samsung and Intel as Chip AlternativesEnhancing Man Pages with Practical Examples: A Look at tcpdump and dig10 Amazing Hacks That Turn the Discontinued Humane Ai Pin Into a Full Android Device