Sunday, April 6, 2025
HomeAmazonJavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Published on

SIEM as a Service

Follow Us on Google News

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in Amazon Web Services (AWS) environments to conduct sophisticated phishing campaigns.

Active for over five years, JavaGhost has pivoted from website defacement to leveraging compromised cloud infrastructure for financial gain.

The group’s attacks stem from exposed long-term AWS access keys, which they use to gain initial access to victim environments.

- Advertisement - Google News

JavaGhost has demonstrated increasing sophistication, employing advanced evasion techniques typically associated with more notorious threat actors like Scattered Spider.

Phishing Attacks
Websites defaced by JavaGhost

Phishing Infrastructure Setup

Upon gaining access, JavaGhost establishes phishing infrastructure using Amazon Simple Email Service (SES) and WorkMail.

The attackers create multiple email identities, configure DKIM settings, and modify Mail-from attributes.

They also set up WorkMail organizations and users, generating various SES and AWS Directory Service events in CloudTrail logs.

Phishing Attacks
Creating a new WorkMail user.

To send phishing emails, JavaGhost creates new SMTP credentials, resulting in the generation of new IAM users with specific permissions.

When preexisting SES infrastructure is available, the group leverages it, leaving minimal traces in CloudTrail logs unless dataplane logging is enabled.

Identity and Access Management Exploitation

JavaGhost creates various IAM users, some actively used in attacks and others seemingly for long-term persistence.

According to Unit 42 Report, these users are typically granted AdministratorAccess policy and console access.

In recent attacks, the group has evolved to using IAM roles with trust policies, allowing access from attacker-controlled AWS accounts.

The attackers also attempt to leave AWS Organizations and enable all AWS regions not enabled by default, potentially to evade security controls.

These actions generate detectable events in CloudTrail logs, providing opportunities for threat detection and response.

As JavaGhost continues to refine its tactics, organizations must remain vigilant.

Implementing least privilege access, rotating IAM credentials regularly, using short-term access tokens, enabling multi-factor authentication, and leveraging cloud security posture management tools are crucial mitigations against such threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...