Security News > 2022 > August > How phishing attacks are exploiting Amazon Web Services
How phishing attacks are exploiting Amazon Web Services.
Cybercriminals prefer to use legitimate sites and services in their phishing scams, not just to trick unsuspecting victims but to sneak past security scanners that would otherwise block traffic from a suspicious site.
In a report released Thursday, email security provider Avanan describes a new phishing campaign that takes advantage of Amazon Web Services.
How attackers are using AWS. In the scheme analyzed by Avanan, cybercriminals have been building phishing pages on AWS. By sending a link to such a page through a phishing email, the scammers are able to bypass security tools and convince the recipient to share credentials for sensitive accounts.
Impersonating Microsoft, complete with a Microsoft logo, the phishing email claims that the user's password will expire today and prompts them to click on a button to keep the same password.
As a prominent website and service, Amazon Web Services will always be on the Allow list, letting the phishing email reach the user's inbox.
News URL
https://www.techrepublic.com/article/how-phishing-attacks-are-exploiting-amazon-web-services/
Related news
- Hackers steal Windows NTLM authentication hashes in phishing attacks (source)
- Flipper Zero WiFi phishing attack can unlock and steal Tesla cars (source)
- MiTM phishing attack can let attackers unlock and steal a Tesla (source)
- New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT (source)
- Hackers Exploiting Popular Document Publishing Sites for Phishing Attacks (source)
- New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S. (source)
- Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks (source)
- Alert: New Phishing Attack Delivers Keylogger Disguised as Bank Payment Notice (source)
- New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks (source)
- New HTTP/2 DoS attack can crash web servers with a single connection (source)