Amazon SES Phishing and BEC Attacks Leverage Leaked AWS IAM Keys

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Trusted platforms weaponized: Threat actors leverage Amazon SES to execute highly evasive phishing campaigns that bypass conventional filtering mechanisms.
  • Exposed credentials exploited: Scammers hijack leaked AWS IAM keys from public repositories to access the cloud-based email delivery service.
  • Advanced threat tactics: The compromised infrastructure facilitates sophisticated BEC attacks utilizing fabricated communication threads to execute financial fraud.

Cybersecurity analysts have identified a significant escalation in Amazon SES phishing operations. Threat actors increasingly weaponize the Amazon Simple Email Service (SES) to distribute malicious payloads and execute advanced social engineering schemes, exploiting the platform's inherent trustworthiness to circumvent enterprise email security perimeters.

Abuse of AWS IAM Keys, BEC Attacks, and Financial Fraud

Attackers initiate these campaigns by scanning public repositories, configuration backups, and Docker images for exposed AWS IAM (Identity and Access Management) keys, according to SecureList by Kaspersky. Once authenticated, cybercriminals utilize the legitimate Amazon SES infrastructure to deploy massive volumes of fraudulent emails, which pass standard SPF, DKIM, and DMARC validation checks. 

In early 2026, one of the most common themes in phishing emails sent with Amazon SES was fake notifications from electronic signature services,” the report said.

Phishing email imitating a DocuSign notification | Source: SecureList by Kaspersky
Phishing email imitating a DocuSign notification | Source: SecureList by Kaspersky

Beyond standard credential harvesting, adversaries utilize this compromised infrastructure to orchestrate highly sophisticated business email compromise (BEC) attacks. 

BEC email featuring a fake conversation between an employee and a vendor | Source: SecureList by Kaspersky
BEC email featuring a fake conversation between an employee and a vendor | Source: SecureList by Kaspersky

In documented incidents, threat actors fabricated complex, multi-message email threads between corporate employees and external vendors regarding invoices. The emails’ PDF attachments only contained payment details and supporting documentation, successfully deceiving finance departments into executing unauthorized wire transfers.

Risk Mitigation 

Amazon SES phishing attacks stem from compromised or leaked AWS credentials, so the first step is to prioritize the security of these accounts. To mitigate these risks, SecureList recommends following these guidelines:

In December 2025, Amazon EC2 and ECS were targeted in a cryptomining campaign using compromised IAM credentials.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: