{"id":2867,"date":"2026-05-04T10:04:05","date_gmt":"2026-05-04T10:04:05","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/"},"modified":"2026-05-04T10:04:05","modified_gmt":"2026-05-04T10:04:05","slug":"legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/","title":{"rendered":"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<h2 id=\"introduction\">Introduction<\/h2>\n<p>The primary goal for attackers in a phishing campaign is to bypass email security and trick the potential victim into revealing their data. To achieve this, scammers employ a wide range of tactics, from redirect links to QR codes. Additionally, they heavily rely on <a href=\"https:\/\/securelist.com\/spam-and-phishing-report-2025\/118785\/#methods-of-distributing-email-threats\" target=\"_blank\" rel=\"noopener\">legitimate sources<\/a> for malicious email campaigns. Specifically, we\u2019ve recently observed an uptick in phishing attacks leveraging Amazon SES.<\/p>\n<h2 id=\"the-dangers-of-amazon-ses-abuse\">The dangers of Amazon SES abuse<\/h2>\n<p>Amazon Simple Email Service (Amazon SES) is a cloud-based email platform designed for highly reliable transactional and marketing message delivery. It integrates seamlessly with other products in Amazon\u2019s cloud ecosystem, AWS.<\/p>\n<p>At first glance, it might seem like just another delivery channel for email phishing, but that isn\u2019t the case. The insidious nature of Amazon SES attacks lies in the fact that attackers aren\u2019t using suspicious or dangerous domains; instead, they are leveraging infrastructure that both users and security systems have grown to trust. These emails utilize SPF, DKIM, and DMARC authentication protocols, passing all standard provider checks, and almost always contain <code>.amazonses.com<\/code> in the Message-ID headers. Consequently, from a technical standpoint, every email sent via Amazon SES\u00a0\u2013 even a phishing one\u00a0\u2013 looks completely legitimate.<\/p>\n<p>Phishing URLs can be masked with redirects: a user sees a link like <code>amazonaws.com<\/code> in the email and clicks it with confidence, only to be sent to a phishing site rather than a legitimate one. Amazon SES also allows for custom HTML templates, which attackers use to craft more convincing emails. Because this is legitimate infrastructure, the sender\u2019s IP address won\u2019t end up on reputation-based blocklists. Blocking it would restrict all incoming mail sent through Amazon SES. For major services, that kind of measure is ineffective, as it would significantly disrupt user workflows due to a massive number of false positives.<\/p>\n<h2 id=\"how-compromise-happens\">How compromise happens<\/h2>\n<p>In most cases, attackers gain access to Amazon SES through leaked IAM (AWS Identity and Access Management) access keys. Developers frequently leave these keys exposed in public GitHub repositories, ENV files, Docker images, configuration backups, or even in publicly accessible S3 buckets. To hunt for these IAM keys, phishers use various tools, such as automated bots based on the open-source utility TruffleHog, which is designed for detecting leaked secrets. After verifying the key\u2019s permissions and email sending limits, attackers are equipped to spread a massive volume of phishing messages.<\/p>\n<h2 id=\"examples-of-phishing-with-amazon-ses\">Examples of phishing with Amazon SES<\/h2>\n<p>In early 2026, one of the most common themes in phishing emails sent with Amazon SES was fake notifications from electronic signature services.<\/p>\n<div id=\"attachment_119641\" style=\"width: 814px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1.jpeg\" class=\"magnificImage\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-119641\" class=\"size-full wp-image-119641\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1.jpeg\" alt=\"Phishing email imitating a Docusign notification\" width=\"804\" height=\"588\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1.jpeg 804w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1-300x219.jpeg 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1-768x562.jpeg 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1-479x350.jpeg 479w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1-740x541.jpeg 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1-383x280.jpeg 383w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220329\/amazon-ses1-800x585.jpeg 800w\" sizes=\"(max-width: 804px) 100vw, 804px\"><\/a><\/p>\n<p id=\"caption-attachment-119641\" class=\"wp-caption-text\">Phishing email imitating a Docusign notification<\/p>\n<\/div>\n<p>The email\u2019s technical headers confirm that it was sent with Amazon SES. At first glance, it all looks legitimate enough.<\/p>\n<div id=\"attachment_119642\" style=\"width: 1441px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220413\/amazon-ses2.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119642\" class=\"size-full wp-image-119642\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220413\/amazon-ses2.png\" alt=\"Phishing email headers\" width=\"1431\" height=\"266\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220413\/amazon-ses2.png 1431w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220413\/amazon-ses2-300x56.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220413\/amazon-ses2-1024x190.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220413\/amazon-ses2-768x143.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220413\/amazon-ses2-740x138.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220413\/amazon-ses2-800x149.png 800w\" sizes=\"auto, (max-width: 1431px) 100vw, 1431px\"><\/a><\/p>\n<p id=\"caption-attachment-119642\" class=\"wp-caption-text\">Phishing email headers<\/p>\n<\/div>\n<p>In these emails, the victim is typically asked to click a link to review and sign a specific document.<\/p>\n<div id=\"attachment_119643\" style=\"width: 1380px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3.jpeg\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119643\" class=\"size-full wp-image-119643\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3.jpeg\" alt='Phishing email with a \"document\"' width=\"1370\" height=\"809\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3.jpeg 1370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3-300x177.jpeg 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3-1024x605.jpeg 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3-768x454.jpeg 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3-593x350.jpeg 593w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3-740x437.jpeg 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3-474x280.jpeg 474w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220456\/amazon-ses3-800x472.jpeg 800w\" sizes=\"auto, (max-width: 1370px) 100vw, 1370px\"><\/a><\/p>\n<p id=\"caption-attachment-119643\" class=\"wp-caption-text\">Phishing email with a \u201cdocument\u201d<\/p>\n<\/div>\n<p>Upon clicking the link, the user is directed to a sign-in form hosted on <code>amazonaws.com<\/code>. This can easily mislead the victim, convincing them that what they\u2019re doing is safe.<\/p>\n<div id=\"attachment_119644\" style=\"width: 757px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220542\/amazon-ses4.jpeg\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119644\" class=\"size-full wp-image-119644\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220542\/amazon-ses4.jpeg\" alt=\"Phishing sign-in form\" width=\"747\" height=\"540\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220542\/amazon-ses4.jpeg 747w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220542\/amazon-ses4-300x217.jpeg 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220542\/amazon-ses4-484x350.jpeg 484w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220542\/amazon-ses4-740x535.jpeg 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220542\/amazon-ses4-387x280.jpeg 387w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\"><\/a><\/p>\n<p id=\"caption-attachment-119644\" class=\"wp-caption-text\">Phishing sign-in form<\/p>\n<\/div>\n<p>The resulting form is, of course, a phishing page, and any data entered into it goes directly to the attackers.<\/p>\n<h2 id=\"amazon-ses-and-bec\">Amazon SES and BEC<\/h2>\n<p>However, Amazon SES is used for more than just standard phishing; it\u2019s also a vehicle for a very sophisticated type of BEC campaigns. In one case we investigated, a fraudulent email appeared to contain a series of messages exchanged between an employee of the target organization and a service provider about an outstanding invoice. The email was sent as if from that employee to the company\u2019s finance department, requesting urgent payment.<\/p>\n<div id=\"attachment_119645\" style=\"width: 1485px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119645\" class=\"size-full wp-image-119645\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5.png\" alt=\"BEC email featuring a fake conversation between an employee and a vendor\" width=\"1475\" height=\"1555\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5.png 1475w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5-285x300.png 285w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5-971x1024.png 971w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5-768x810.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5-1457x1536.png 1457w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5-332x350.png 332w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5-740x780.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5-266x280.png 266w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220636\/amazon-ses5-800x843.png 800w\" sizes=\"auto, (max-width: 1475px) 100vw, 1475px\"><\/a><\/p>\n<p id=\"caption-attachment-119645\" class=\"wp-caption-text\">BEC email featuring a fake conversation between an employee and a vendor<\/p>\n<\/div>\n<p>The PDF attachments didn\u2019t contain any malicious phishing URLs or QR codes, only payment details and supporting documentation.<\/p>\n<div id=\"attachment_119646\" style=\"width: 611px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220745\/amazon-ses6.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119646\" class=\"size-full wp-image-119646\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220745\/amazon-ses6.png\" alt=\"Forged financial documents\" width=\"601\" height=\"803\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220745\/amazon-ses6.png 601w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220745\/amazon-ses6-225x300.png 225w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220745\/amazon-ses6-262x350.png 262w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/03220745\/amazon-ses6-210x280.png 210w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\"><\/a><\/p>\n<p id=\"caption-attachment-119646\" class=\"wp-caption-text\">Forged financial documents<\/p>\n<\/div>\n<p>Naturally, the email didn\u2019t originate with the employee, but with an attacker impersonating them. The entire thread quoted within the email was actually fabricated, with the messages formatted to appear as a legitimate forwarded thread to a cursory glance. This type of attack aims to lower the user\u2019s guard and trick them into transferring funds to the scammers\u2019 account.<\/p>\n<h2 id=\"takeaways\">Takeaways<\/h2>\n<p>Phishing via Amazon SES is shifting from isolated incidents into a steady trend. By weaponizing this service, attackers avoid the effort of building dubious domains and mail infrastructure from scratch. Instead, they hijack existing access keys to gain the ability to blast out thousands of phishing emails. These messages pass email authentication, originate from IP addresses that are unlikely to be blocklisted, and contain links to phishing forms that look entirely legitimate.<\/p>\n<p>Since these Amazon SES phishing attacks stem from compromised or leaked AWS credentials, prioritizing the security of these accounts is critical. To mitigate these risks, we recommend following these guidelines:<\/p>\n<ul>\n<li>Implement the principle of least privilege when configuring IAM access keys, granting elevated permissions only to users who require them for specific tasks.<\/li>\n<li>Transition from IAM access keys to <a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/id_roles.html\" target=\"_blank\" rel=\"noopener\">roles<\/a> when configuring AWS; these are profiles with specific permissions that can be assigned to one or several users.<\/li>\n<li>Enable multi-factor authentication, an ever-relevant step.<\/li>\n<li>Configure IP-based access restrictions.<\/li>\n<li>Set up automated key rotation and run regular security audits.<\/li>\n<li>Use the AWS Key Management Service to encrypt data with unique cryptographic keys and manage them from a centralized location.<\/li>\n<\/ul>\n<p>We recommend that users remain vigilant when handling email. Do not determine whether an email is safe based solely on the From field. If you receive unexpected documents via email, a prudent precaution is to verify the request with the sender through a different communication channel. Always carefully inspect where links in the body of an email actually lead. Additionally, robust email security solutions can provide an essential layer of protection for both <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/mail-server-security?icid=gl_sl_post-ksms_sm-team_b83313bf3a2eac2c\" target=\"_blank\" rel=\"noopener\">corporate<\/a> and <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_sl_post-kprem_sm-team_713579ad9bcca9ff\" target=\"_blank\" rel=\"noopener\">personal<\/a> correspondence.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction The primary goal for attackers in a phishing campaign is to bypass email security and trick the potential victim into revealing their data. To achieve this, scammers employ a wide range of tactics, from redirect links to QR codes. Additionally, they heavily rely on legitimate sources for malicious email campaigns. Specifically, we\u2019ve recently observed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[108,1101,227,90,838,228,342,1099,226,94,1100,555,222,250,637],"tags":[91],"class_list":["post-2867","post","type-post","status-publish","format-standard","hentry","category-amazon","category-bec","category-credentials-theft","category-cybersecurity","category-data-protection","category-data-theft","category-fraud","category-html","category-money-theft","category-phishing","category-qr-codes","category-scam","category-spam-and-phishing","category-spear-phishing","category-web-threats","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Introduction The primary goal for attackers in a phishing campaign is to bypass email security and trick the potential victim into revealing their data. To achieve this, scammers employ a wide range of tactics, from redirect links to QR codes. Additionally, they heavily rely on legitimate sources for malicious email campaigns. Specifically, we\u2019ve recently observed [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-04T10:04:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security\",\"datePublished\":\"2026-05-04T10:04:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/\"},\"wordCount\":977,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Amazon\",\"BEC\",\"Credentials theft\",\"Cybersecurity\",\"data protection\",\"Data theft\",\"fraud\",\"HTML\",\"Money theft\",\"Phishing\",\"QR-codes\",\"Scam\",\"Spam and phishing\",\"Spear phishing\",\"Web threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/\",\"name\":\"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg\",\"datePublished\":\"2026-05-04T10:04:05+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/","og_locale":"en_US","og_type":"article","og_title":"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security - Imperative Business Ventures Limited","og_description":"Introduction The primary goal for attackers in a phishing campaign is to bypass email security and trick the potential victim into revealing their data. To achieve this, scammers employ a wide range of tactics, from redirect links to QR codes. Additionally, they heavily rely on legitimate sources for malicious email campaigns. Specifically, we\u2019ve recently observed [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-05-04T10:04:05+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security","datePublished":"2026-05-04T10:04:05+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/"},"wordCount":977,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["Amazon","BEC","Credentials theft","Cybersecurity","data protection","Data theft","fraud","HTML","Money theft","Phishing","QR-codes","Scam","Spam and phishing","Spear phishing","Web threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/","name":"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg","datePublished":"2026-05-04T10:04:05+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/04081024\/amazon-ses-phishing-featured-image-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/04\/legitimate-phishing-how-attackers-weaponize-amazon-ses-to-bypass-email-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"\u201cLegitimate\u201d phishing: how attackers weaponize Amazon SES to bypass email security"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2867"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2867\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}