Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Cloud-Native Phishing Infrastructure via Abused AWS WorkMail

Type
Campaign
Actors
❓Unknown
Pub. date
January 27, 2026
Initial access
Exposed secret
Impact
Resource hijackingData exfiltration
Observed techniques
Valid creds abuseCreate new cloud user
Observed tools
TruffleHog
Targeted technologies
AWS WorkMailAmazon SES
References
https://www.rapid7.com/blog/post/dr-threat-actors-aws-workmail-phishing-campaigns/
Status
Finalized
Last edited
Feb 1, 2026 1:48 PM

Threat actors abused native AWS email services to build phishing and spam infrastructure inside a compromised cloud environment. After obtaining exposed long-term AWS credentials, the attackers conducted IAM and service reconnaissance to assess email-sending capabilities. While Amazon SES sandbox restrictions initially limited large-scale abuse, the actors pivoted to AWS WorkMail—leveraging its lighter upfront controls—to immediately send externally facing phishing emails from victim-owned infrastructure, benefiting from Amazon’s strong sender reputation and low operational friction.

The investigation shows a staged approach: validating leaked credentials, escalating privileges, preparing persistence, and then operationalizing phishing via WorkMail while waiting for SES quota increases. This technique reduces attacker costs, obscures attribution, and creates monitoring blind spots, especially when SMTP is used for sending email, which generates little to no centralized telemetry. Any organization with leaked AWS credentials and permissive IAM policies—particularly those without explicit WorkMail guardrails—is at risk.

Made with 💙 by Wiz

Last Updated: April 3, 2025