Kaspersky’s Stolen Amazon SES Token Used For Phishing

Share post:

Kaspersky recently confirmed that a legitimate Amazon Simple Email Service (SES) token, issued to a third-party vendor, was recently used by threat actors to target Office 365 users in a phishing attack.

The attackers used two phishing kits, including “Iamtheboss” and “MIRCBOOT.”

Although the attackers used an official Kaspersky email and sent the emails from the Amazon Web Services infrastructure, which provided them with the support they needed to reach their target mailboxes without being flagged, Kaspersky noted that “No server compromise, unauthorized database access or any other malicious activity was found at 2050.earth and associated services,”

The SES token was revoked immediately after the phishing attacks were discovered.

Going forward, Kaspersky urged users and phishing attackers to remain vigilant and not disclose their information or login credentials even if the message comes from a familiar or well-known brand.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways