Skip to main content

AWS SES identities discovery via access key

ID:aws_ses_identities_discovery_via_access_key
Data type:AWS CloudTrail
Severity:
Medium
MITRE ATT&CK:TA0007:T1580

Description

AlphaSOC detected AWS Simple Email Service (SES) identities discovery via an access key, indicated by the use of both ListIdentities and GetIdentityVerificationAttributes actions. These API calls are typically used to enumerate existing AWS SES identities and check their verification status. This behavior may indicate that threat actors are gathering information about the organization's email infrastructure, potentially in preparation for an AWS SES-based mailing attack.

Impact

This activity could serve as an early indicator of a larger attack. After the discovery, adversaries may exploit AWS SES to send malicious emails, potentially leading to phishing campaigns, spam distribution, or brand impersonation. This could result in data breaches, financial losses, and reputational damage for the organization.

Severity

SeverityCondition
Medium
AWS SES identities discovery via access key

Investigation and Remediation

Review AWS CloudTrail logs to identify the specific AWS IAM user or role associated with these actions. Verify whether they were authorized. If unauthorized, rotate all potentially compromised credentials and review recent account activity for signs of compromise.