{"id":236494,"date":"2026-05-05T02:26:23","date_gmt":"2026-05-05T07:26:23","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2026\/05\/amazon-ses-increasingly-abused-in-phishing-to-evade-detection"},"modified":"2026-05-05T02:26:23","modified_gmt":"2026-05-05T07:26:23","slug":"amazon-ses-increasingly-abused-in-phishing-to-evade-detection","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2026\/05\/amazon-ses-increasingly-abused-in-phishing-to-evade-detection","title":{"rendered":"Amazon SES increasingly abused in phishing to evade detection"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/amazon-ses-increasingly-abused-in-phishing-to-evade-detection.jpg\"><\/a><\/p>\n<p>The Amazon Simple Email Service (SES) is being increasingly abused to send convincing phishing emails that can bypass standard security filters and render reputation-based blocks ineffective.<\/p>\n<p>Although the resource has been <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/kasperskys-stolen-amazon-ses-token-used-in-office-365-phishing\/\" rel=\"nofollow noopener\">leveraged for malicious activity<\/a> in the past, the current spike may be due to a large number of AWS Identity and Access Management access keys exposed in public assets.<\/p>\n<p>Because it is a legitimate, trusted resource, phishing operations can leverage Amazon SES to send out malicious emails that pass authentication checks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Amazon Simple Email Service (SES) is being increasingly abused to send convincing phishing emails that can bypass standard security filters and render reputation-based blocks ineffective. Although the resource has been leveraged for malicious activity in the past, the current spike may be due to a large number of AWS Identity and Access Management access [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-236494","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/236494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=236494"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/236494\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=236494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=236494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=236494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}