Enumerate SES
idempotent
Platform: AWS
Mappings
- MITRE ATT&CK
- Discovery
Description
Simulates an attacker enumerating SES. Attackers frequently use this enumeration technique after having compromised an access key, to use it to launch phishing campaigns or further resell stolen credentials.
Warm-up: None.
Detonation:
- Perform
ses:GetAccountSendingEnabledto check if SES sending is enabled. - Perform
ses:GetSendQuotato discover the current email sending quotas. - Perform
ses:ListIdentitiesto discover the list of identities in the account. - If identities are found, use
ses:GetIdentityVerificationAttributes(only once) to discover verification status of each identity.
References:
- https://securitylabs.datadoghq.com/articles/following-attackers-trail-in-aws-methodology-findings-in-the-wild/#most-common-enumeration-techniques
- https://www.invictus-ir.com/news/ransomware-in-the-cloud
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/#post-125981-_kdq0vw6banab
- https://permiso.io/blog/s/aws-ses-pionage-detecting-ses-abuse/
- https://www.invictus-ir.com/news/the-curious-case-of-dangerdev-protonmail-me
Instructions
Detection
Through CloudTrail's GetAccountSendingEnabled, GetSendQuota and ListIdentities events.
These can be considered suspicious especially when performed by a long-lived access key, or when the calls span across multiple regions.