Hackers Exploit AWS Misconfigurations to Launch Phishing Assaults through SES and WorkMail

0
10
Hackers Exploit AWS Misconfigurations to Launch Phishing Assaults through SES and WorkMail


Mar 03, 2025Ravie LakshmananCloud Safety / E mail Safety

Hackers Exploit AWS Misconfigurations to Launch Phishing Assaults through SES and WorkMail

Risk actors are focusing on Amazon Internet Providers (AWS) environments to push out phishing campaigns to unsuspecting targets, in keeping with findings from Palo Alto Networks Unit 42.

The cybersecurity firm is monitoring the exercise cluster beneath the title TGR-UNK-0011 (brief for a menace group with unknown motivation), which it stated overlaps with a bunch generally known as JavaGhost. TGR-UNK-0011 is thought to be lively since 2019.

“The group centered traditionally on defacing web sites,” safety researcher Margaret Kelley stated. “In 2022, they pivoted to sending out phishing emails for monetary achieve.”

Cybersecurity

It is value noting that these assaults don’t exploit any vulnerability in AWS. Relatively, the menace actors make the most of misconfigurations in victims’ environments that expose their AWS entry keys with a purpose to ship phishing messages by abusing Amazon Easy E mail Service (SES) and WorkMail companies.

In doing so, the modus operandi gives the advantage of not having to host or pay for their very own infrastructure to hold out the malicious exercise.

What’s extra, it permits the menace actor’s phishing messages to sidestep e mail protections because the digital missives originate from a identified entity from which the goal group has beforehand obtained emails.

“JavaGhost obtained uncovered long-term entry keys related to identification and entry administration (IAM) customers that allowed them to achieve preliminary entry to an AWS atmosphere through the command-line interface (CLI),” Kelley defined.

Hackers Exploit AWS Misconfigurations

“Between 2022-24, the group advanced their techniques to extra superior protection evasion strategies that try and obfuscate identities within the CloudTrail logs. This tactic has traditionally been exploited by Scattered Spider.”

As soon as entry to the group’s AWS account is confirmed, the attackers are identified to generate momentary credentials and a login URL to enable console entry. This, Unit 42 famous, grants them the flexibility to obfuscate their identification and achieve visibility into the sources throughout the AWS account.

Subsequently, the group has been noticed using SES and WorkMail to determine the phishing infrastructure, creating new SES and WorkMail customers, and establishing new SMTP credentials to ship e mail messages.

Cybersecurity

“All through the time-frame of the assaults, JavaGhost creates numerous IAM customers, some they use throughout their assaults and others that they by no means use,” Kelley stated. “The unused IAM customers appear to function long-term persistence mechanisms.”

One other notable side of the menace actor’s modus operandi considerations the creation of a brand new IAM position with a belief coverage hooked up, thereby letting them entry the group’s AWS account from one other AWS account beneath their management.

“The group continues to go away the identical calling card in the midst of their assault by creating new Amazon Elastic Cloud Compute (EC2) safety teams named Java_Ghost, with the group description ‘We Are There However Not Seen,'” Unit 42 concluded.

“These safety teams don’t include any safety guidelines and the group sometimes makes no try to connect these safety teams to any sources. The creation of the safety teams seem within the CloudTrail logs within the CreateSecurityGroup occasions.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



LEAVE A REPLY

Please enter your comment!
Please enter your name here