Javaghost’s persistent phishing attacks from the cloud

Intel Name: Javaghost’s persistent phishing attacks from the cloud

Date of Scan: March 3, 2025

Impact: High

Summary:
The attack exploited overly permissive IAM permissions to abuse the victim’s Amazon SES and WorkMail services for sending phishing messages. JavaGhost gains an advantage by using other organizations’ AWS environments, avoiding costs for created resources. By leveraging preexisting SES infrastructure, the threat actor can send phishing emails that bypass security protections, as they appear to come from a legitimate source that the target organization has previously interacted with.

More Details