Threat Actors Using AWS WorkMail in Phishing Campaigns #253
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title / context
Rapid7 MDR investigated a real-world AWS account takeover / cloud service hijacking case where threat actors used exposed long-term AWS access keys to build phishing/spam infrastructure inside the victim’s AWS account. Their objective was to leverage Amazon’s sender reputation and offload operational costs (email infrastructure + potential large bills) onto the victim, while also benefiting from monitoring and attribution gaps in AWS-native ...
🔧 Technical Details
Permission probing via “safe error” forcing in AWS APIs: attempt actions that reliably fail in a controlled way (e.g.,
iam:CreateUserfor an existing username to triggerEntityAlreadyExistsException;iam:CreateLoginProfilewith a password that violates policy to triggerPasswordPolicyViolationException) to confirm permissions while minimizing persistent changes and noisy artifacts.SES sandbox evasion for phishing/spam: when
ses:GetAccountshows the account is in the SES sandbox andses:ListIdentitiesshows no verified identities (sandbox constraints: verified-only recipients, 200/24h, 1 msg/s), attackers may request removal and quota raises (e.g.,servicequotas:RequestServiceQuotaIncreaseto 100,000/day) but simultaneously pivot to AWS WorkMail. WorkMail abuse consists of creating organizations (workmail:CreateOrganization), verifying attacker-controlled domains using SES v...🤖 Agent Actions
Updated HackTricks with AWS WorkMail phishing abuse and stealth IAM permission probing:
Files changed:
src/pentesting-cloud/aws-security/aws-post-exploitation/aws-workmail-post-exploitation/README.mdsrc/pentesting-cloud/aws-security/aws-services/aws-iam-enum.mdsrc/pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation/README.mdThis PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.