Another great article posted today.
@expel wrote an interesting blog about identifying threat actor activity and stolen access keys in AWS. This blog covers how one of the threat actors goals was to compromise and abuse the email service within AWS (SES).
https://expel.com/blog/incident-report-stolen-aws-access-keys/. I have first hand performed incident response with a similar story to the ones our friends at Expel have wrote about. Along with crypto mining attacks, threat actors will attempt to exploit the SES service to send out malspam to thousands of people in result of furthering the scope of compromise.
#aws #incidentresponse #cloud #threathunting