Using Amazon SES to send spam

PLATFORM

SERVICE

ses

DATA BREACHES

known

LAST UPDATED

EXPLOITABILITY Exploitability of a vulnerability measures how easy it is for an attacker to discover and exploit the vulnerability, some might refer to this as likelihood.

IMPACT How impactful to your environment and organization a successful exploitation of this vulnerability is expected to be.

low

medium

About

Verified Amazon Simple Email Service (SES) identities are a valuable targets for attackers, who are often looking for ways to send spam or phishing emails.

Understanding Impact

Business Impact

Attackers can use verified email sending identities to send spam or phishing emails to a large number of recipients, potentially damaging the reputation of the organization.

Technical Impact

When an attacker gains access to an AWS account, they can use the Amazon SES service to send spam or phishing emails. Attackers often create new verified identities or turn on email sending in the account to send spam or phishing emails.

Detection

You can identify enumeration of SES configuration settings using the following CloudTrail events:

ses:GetAccountSendingEnabled
ses:GetSendQuota
ses:ListIdentities
ses:GetIdentityVerificationAttributes

Attackers frequently create new verified identities or turn on e-mail sending in the account, which you can detect using the CloudTrail events ses:VerifyEmailIdentity and ses:UpdateAccountSendingEnabled.

Reproduce the attack

You can easily reproduce this attack in a self-contained manner with Stratus Red Team using the following command:

stratus detonate aws.discovery.ses-enumerate

See also the related documentation.

How Datadog can help

Cloud SIEM

Datadog Cloud SIEM detects this attack using the following out-of-the-box rules:

References

Following attackers’ (Cloud)trail in AWS

securitylabs.datadoghq.com

The curious case of DangerDev

invictus-ir.com

Compromised AWS Lambda Credentials Led to Phishing Attack

unit42.paloaltonetworks.com

Did you find this article helpful?