Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponizee Amazon Simple Email Service to Send 50,000+ Malicious Emails Per Day

Posted on September 8, 2025September 8, 2025 By CWS

A complicated cybercriminal marketing campaign has emerged, exploiting Amazon’s Easy E-mail Service (SES) to orchestrate large-scale phishing operations able to delivering over 50,000 malicious emails day by day.

The assault represents a big evolution in cloud service abuse, reworking AWS’s reputable bulk electronic mail platform right into a weapon for credential theft and monetary fraud.

The marketing campaign begins with compromised AWS entry keys, obtained by frequent assault vectors together with unintended public publicity in code repositories, misconfigured cloud property, or theft from developer workstations.

As soon as adversaries safe these credentials, they instantly probe the surroundings utilizing GetCallerIdentity requests to evaluate accessible permissions, particularly concentrating on accounts with SES-related naming conventions that point out electronic mail service entry.

Wiz.io researchers recognized this Might 2025 marketing campaign after detecting uncommon patterns in AWS API exercise throughout a number of areas.

The attackers demonstrated exceptional sophistication by implementing a multi-regional strategy, concurrently issuing PutAccountDetails requests throughout all AWS areas inside seconds to flee SES’s default “sandbox” restrictions.

This method, beforehand undocumented in safety literature, permits menace actors to bypass the usual 200-email day by day restrict and unlock manufacturing mode capabilities.

The phishing infrastructure targets victims with convincing tax-related content material, using topic traces similar to “Your 2024 Tax Kind(s) Are Now Able to View and Print” to maximise engagement charges.

Assault chain (Supply – Wiz.io)

These messages redirect customers to credential harvesting websites hosted at domains like irss.securesusa.com, using industrial site visitors evaluation providers to obfuscate malicious infrastructure and evade conventional safety scanners.

Technical Infrastructure and Evasion Mechanisms

The attackers set up their electronic mail infrastructure by systematic area verification utilizing the CreateEmailIdentity API.

They register each attacker-controlled domains together with managed7.com, street7news.org, and docfilessa.com, alongside reputable domains with weak DMARC configurations that facilitate electronic mail spoofing.

Every verified area helps a number of electronic mail addresses utilizing customary prefixes like admin@, billing@, and noreply@ to look reputable in recipient inboxes.

The marketing campaign’s technical sophistication extends to automated privilege escalation makes an attempt.

When customary manufacturing quotas proved inadequate, attackers programmatically created help tickets by the CreateCase API and tried to determine IAM insurance policies named “ses-support-policy” to realize enhanced permissions.

Though these elevation makes an attempt failed resulting from inadequate privileges, the 50,000-email day by day quota remained ample for his or her operational necessities.

This SES abuse marketing campaign demonstrates how cloud providers designed for reputable enterprise functions will be weaponized at scale, highlighting the vital want for enhanced monitoring of dormant entry keys and strange cross-regional API exercise patterns in cloud environments.

Enhance your SOC and assist your group shield your small business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Amazon, Day, Email, Emails, Hackers, Malicious, Send, Service, Simple, Weaponizee

Post navigation

Previous Post: Qualys Confirms Data Breach – Hackers Accessed Salesforce Data in Supply Chain Attack
Next Post: GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets

Related Posts

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction Cyber Security News
Threat Actors Hijacking MS-SQL Server to Deploy XiebroC2 Framework Cyber Security News
Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations Cyber Security News
Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Cyber Security News
Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts Cyber Security News
APT Hackers Attacking Maritime and Shipping Industry to Launch Ransomware Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark