Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers Open AWS False Configurations to Launch Phisching Through SES and Workmail
Global Security

Hackers Open AWS False Configurations to Launch Phisching Through SES and Workmail

AdminBy AdminMarch 3, 2025No Comments3 Mins Read
Hackers Exploit AWS Misconfigurations
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


03 March 2025Red LakshmananCloud security / email security

Hackers operate the wrong configurations

Actors threats focus on Amazon’s web service (O) The environment for displacement of phishing companies to non -suspicious targets, according to the Block 42 networks Palo Alto Networks.

Cybersecurity Company Track Activities called TGR-UNK-0011 (Short for Group threats with unknown motivation), about which, in her words, they intersect with a group known as Javaghost. As you know, TGR-NUNK-0011 has been working since 2019.

“The Group Historically focused on the cancellation of sites,” Margaret Kelly’s security researcher – noted. “In 2022, they sent to send phishing sheets for financial benefits.”

Cybersecurity

It should be noted that these attacks do not use any vulnerability in AWS. Most likely, threatening subjects will take advantage of incorrect settings in the victims that expose their AWS Access keys to send phishing messages by abusing Amazon Simple Email Service (SES) and Workmail services.

Doing this, Modus Operandi offers the benefit of not accepting the need or pay for your own infrastructure for harmful activity.

Moreover, it allows the phishing reports to act as a threat to protected e -mail, since digital missions come from a famous subject from which the target organization had previously received letters.

“Javaghost is obtained by users who are exposed to the long-term access related to identity and access management (IAM) that allowed them to gain initial AWS access through the command line interface (CLI),” Kelly explained.

Hackers operate the wrong configurations

“Between 2022-24 Cloudtrail logs. This tactic has historically been operated by a scattered spider“

Once confirmed access to the AWS account, attackers are known to create Temporary powers and URL to login Allow access to the console. In this, the marked units 42, they allow them to bend their identity and get visibility into resources in AWS account.

Later, the group is observed using SES and Workmail to create a phishing infrastructure, creating new SES and Workmail users, and creating new SMTP credentials to send emails.

Cybersecurity

“Throughout the Javaghost attacks, they create different IAM users, some they use during their attacks and others they never use,” Kelly said. “Unused Iam users seem to serve as a mechanism for long -term stability.”

Another noticeable aspect of the actor of the Operandi actor concerns the creation of a new role Iam of Trust policy attachedIn doing so, allowing them to access the AWS account from another AWS account under their control.

“The group continues to leave the same congratulatory card in the middle of its attack, creating new Amazon Elastic Cloud Compute (EC2) security groups (EC2), called Java_Ghost, description of the group” We are there but not visible, “the block 42 concluded.

“These security groups do not contain any security rules, and the group usually does not try to attach these security groups to any resources. Creating security groups appears in CloudTrail magazines in Createsecurity events.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.