Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers Open AWS False Configurations to Launch Phisching Through SES and Workmail
Global Security

Hackers Open AWS False Configurations to Launch Phisching Through SES and Workmail

AdminBy AdminMarch 3, 2025No Comments3 Mins Read
Hackers Exploit AWS Misconfigurations
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


03 March 2025Red LakshmananCloud security / email security

Hackers operate the wrong configurations

Actors threats focus on Amazon’s web service (O) The environment for displacement of phishing companies to non -suspicious targets, according to the Block 42 networks Palo Alto Networks.

Cybersecurity Company Track Activities called TGR-UNK-0011 (Short for Group threats with unknown motivation), about which, in her words, they intersect with a group known as Javaghost. As you know, TGR-NUNK-0011 has been working since 2019.

“The Group Historically focused on the cancellation of sites,” Margaret Kelly’s security researcher – noted. “In 2022, they sent to send phishing sheets for financial benefits.”

Cybersecurity

It should be noted that these attacks do not use any vulnerability in AWS. Most likely, threatening subjects will take advantage of incorrect settings in the victims that expose their AWS Access keys to send phishing messages by abusing Amazon Simple Email Service (SES) and Workmail services.

Doing this, Modus Operandi offers the benefit of not accepting the need or pay for your own infrastructure for harmful activity.

Moreover, it allows the phishing reports to act as a threat to protected e -mail, since digital missions come from a famous subject from which the target organization had previously received letters.

“Javaghost is obtained by users who are exposed to the long-term access related to identity and access management (IAM) that allowed them to gain initial AWS access through the command line interface (CLI),” Kelly explained.

Hackers operate the wrong configurations

“Between 2022-24 Cloudtrail logs. This tactic has historically been operated by a scattered spider“

Once confirmed access to the AWS account, attackers are known to create Temporary powers and URL to login Allow access to the console. In this, the marked units 42, they allow them to bend their identity and get visibility into resources in AWS account.

Later, the group is observed using SES and Workmail to create a phishing infrastructure, creating new SES and Workmail users, and creating new SMTP credentials to send emails.

Cybersecurity

“Throughout the Javaghost attacks, they create different IAM users, some they use during their attacks and others they never use,” Kelly said. “Unused Iam users seem to serve as a mechanism for long -term stability.”

Another noticeable aspect of the actor of the Operandi actor concerns the creation of a new role Iam of Trust policy attachedIn doing so, allowing them to access the AWS account from another AWS account under their control.

“The group continues to leave the same congratulatory card in the middle of its attack, creating new Amazon Elastic Cloud Compute (EC2) security groups (EC2), called Java_Ghost, description of the group” We are there but not visible, “the block 42 concluded.

“These security groups do not contain any security rules, and the group usually does not try to attach these security groups to any resources. Creating security groups appears in CloudTrail magazines in Createsecurity events.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.