Office 365 phishing campaign used stolen Kaspersky Amazon SES token to fool victims
Credentials stolen from users after legitimate-looking email arrives in inboxes


IT security firm Kaspersky has warned users that a new phishing campaign is using one of its stolen Amazon Simple Email Service (SES) tokens to make emails appear legitimate.
In an advisory issued on Monday, the firm said it saw a huge increase in spear-phishing emails designed to steal Office 365 credentials. The advisory added that this campaign relies on a phishing kit researchers named “Iamtheboss” used in conjunction with another phishing kit known as “MIRCBOOT.”
“The activity may be associated with multiple cybercriminals. The phishing e-mails are usually arriving in the form of “Fax notifications” and lure users to fake websites collecting credentials for Microsoft online services,” the advisory stated. “These emails have various sender addresses, including but not limited to noreply@sm.kaspersky.com. They are sent from multiple websites including Amazon Web Services infrastructure.”
In investigations, Kaspersky researchers determined some emails were sent using Amazon’s Simple Email Service (SES) and legitimate SES token. Amazon Simple Email Service (SES) is an email service that enables developers to send mail from within any application.
They said that this access token was issued to a third-party contractor during the testing of the website 2050.earth. The site is also hosted in Amazon infrastructure.
RELATED RESOURCE
Prevent fraud and phishing attacks with DMARC
How to use domain-based message authentication, reporting, and conformance for email security
“Upon discovery of these phishing attacks, the SES token was immediately revoked. No server compromise, unauthorized database access, or any other malicious activity was found at 2050.earth and associated services,” said the advisory.
The advisory encouraged users to execute caution and be vigilant even if the email seems to come from a familiar brand or email address.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
MIRCBOOT is a phishing kit recently discovered by researchers at Microsoft as part of a large-scale phishing-as-a-service operation known as BulletProofLink. This follows the software-as-a-service model, which requires attackers to pay an operator to wholly develop and deploy large portions or complete phishing campaigns from false sign-in page development, website hosting, and credential parsing and redistribution.
Earlier this month, a Russian cyber crime group was targeting the financial sector with malware delivered by Microsoft Office macros. The attack used phishing emails to mount the first phase of its attack, using an Excel document that uses a macro.
Last month, hackers spoofed Zix to steal Office 365, Google Workspace, and Microsoft Exchange data. Security researchers from Armorblox said the attack affected around 75,000 users, with small groups of cross-departmental employees targeted in each customer environment.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
The Race Is On for Higher Ed to Adapt: Equity in Hyflex Learning
By ITPro
-
Google faces 'first of its kind' class action for search ads overcharging in UK
News Google faces a "first of its kind" £5 billion lawsuit in the UK over accusations it has a monopoly in digital advertising that allows it to overcharge customers.
By Nicole Kobie
-
Almost half of US organizations still using Kaspersky, researchers claim
News A ban was introduced due to Kaspersky’s supposed links to the Russian government
By George Fitzmaurice
-
Enterprises are struggling to fill senior cybersecurity roles — and it's causing staff burnout to skyrocket
News Many senior roles take months to fill, creating cumbersome workloads for mid-level staff and increased burnout
By Emma Woollacott
-
Kaspersky to shut down US division ahead of sales ban
News The Russian security company will exit the US and cut staff ahead of a government-imposed sales ban
By Nicole Kobie
-
Botnets are being sold on the dark web for as little as $99
News More than 20 offers for botnets for hire or sale have been discovered on dark web forums and Telegram channels this year
By Emma Woollacott
-
Small businesses face continued security threats as trojan attacks surge
News Cyber attacks on small businesses are still growing at a steady pace
By Emma Woollacott
-
Most passwords take a matter of minutes to crack – here’s how you can create strong, hacker-resistant credentials
News Passwords are still criminally insecure and can be cracked or guessed by hackers with ease, but what precautions can you take to avoid getting breached?
By Solomon Klappholz
-
Kaspersky hits back at US software ban, citing political motivations and “theoretical concerns”
News Kaspersky said it has “repeatedly demonstrated" its independence from any government interference
By Ross Kelly
-
US poised to ban sales of Kaspersky software – reports
News Kaspersky has long denied any links to the Russian government
By Ross Kelly