Experts warn Amazon's Simple Email Service is being abused to launch 'massive volume' of phishing attacks
There's been an 'uptick' in Amazon SES atatcks lately
- Attackers are hijacking exposed AWS credentials to send large‑scale phishing emails via Amazon SES
- Malicious messages bypass SPF, DKIM, and DMARC checks, landing directly in inboxes
- Researchers warn the trend is growing, urging stricter IAM practices and key management
The Amazon Simple Email Service (SES) is being abused to launch a “massive volume” of phishing attacks which easily bypass current defenses and expose victims to risks of credential and identity theft.
Security researchers Kaspersky sounded the alarm in a new report which noted, “Specifically, we’ve recently observed an uptick in phishing attacks leveraging Amazon SES."
The attackers start by stealing exposed AWS credentials. By using TruffleHog (or similar utilities), they scan GitHub repositories, .ENV files, Docker images, backups, and publicly accessible S3 buckets at scale, looking for login credentials for Amazon Web Services.
Article continues belowPassing all of the checks
Once found, they analyze permissions and email distribution capabilities: “After verifying the key’s permissions and email sending limits, attackers are equipped to spread a massive volume of phishing messages,” Kaspersky said.
The messages are carefully crafted, containing custom HTML templates that imitate legitimate services, and highly realistic login flows. The themes vary, from fake DocuSign documents, to Business Email Compromise (BEC) campaigns.
Being a legitimate service itself, Amazon SES allows the attackers’ emails to clear authentication checks such as SPF, DKIM, and DMARC protocols, landing the malicious messages directly into people’s inboxes. Furthermore, blocking by IP also doesn’t work, since it would ban all emails coming from Amazon SES.
“Phishing via Amazon SES is shifting from isolated incidents into a steady trend,” Kaspersky warned. “By weaponizing this service, attackers avoid the effort of building dubious domains and mail infrastructure from scratch. Instead, they hijack existing access keys to gain the ability to blast out thousands of phishing emails.”
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
To mitigate the risks, Kaspersky recommends users implement the principle of least privilege when configuring IAM access. They also recommend transitioning from IAM access keys to roles when configuring AWS, and enabling multi-factor authentication.
IP-based access restrictions should be configured, as well as automated key rotation. Finally, users should use the AWS KEy Management Service to encrypt data and manage keys from a centralized location.

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mobile:
McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.