New TruffleNet BEC Operation Uses Compromised AWS SES Keys Over 800 Hosts Impacted
Security researchers have uncovered a campaign dubbed TruffleNet that leverages the popular open-source tool TruffleHog to test compromised access keys and conduct systematic automated reconnaissance.
The operation’s hallmark is high-scale abuse of Amazon Simple Email Service (SES), which facilitates Business Email Compromise (BEC) campaigns using AWS’s trusted infrastructure.
Over 800 unique hosts spanning 57 Class C networks were involved, highlighting how attackers now deploy dedicated, cloud-native infrastructure to evade conventional detection mechanisms.
TruffleNet’s attack playbook begins with credential validation, typically through AWS’s GetCallerIdentity API.
Once keys are confirmed, hosts quickly move to query the SES GetSendQuota endpoint, a precursor to large-scale email abuse. Unlike many cloud threats, most TruffleNet-origin IPs lacked reputation flags or antivirus detections, indicating bespoke infrastructure.
Host-level analysis revealed prevalent use of open ports 5432 and 3389 (commonly PostgreSQL and RDP,) though neither was exploited for standard purposes.
Instead, attackers configured Portainer as a Docker and Kubernetes management UI to coordinate fleets of nodes, essentially running malicious campaigns as “infrastructure-as-a-service” operations.
Key hosting providers for TruffleNet included WS Telecom Inc. and Hivelocity LLC in the United States.
The attack topology was methodically structured: some systems focused solely on reconnaissance (testing identities and quotas), while others likely acted as staging grounds for more invasive follow-on operations.
Security teams should monitor for unusual automation activities, such as repeated GetCallerIdentity and GetSendQuota calls, which may indicate credential theft attempts or SES reconnaissance.
After reconnaissance, the threat actors exploited AWS SES to set up new email-sending identities the prime enabler of BEC scams.
Attackers used APIs including ListIdentities, GetAccount, CreateUser, and CreateEmailIdentity to enumerate, escalate privileges, and establish persistent access.
Notably, one campaign used DomainKeys Identified Mail (DKIM) on compromised WordPress domains, allowing adversaries to authenticate fraudulent emails as originating from trusted brands.
Six compromised domains, including cfp-impactaction[.]com and restaurantalhes[.]com, were linked to active scams and known malware.
The group’s modus operandi included “BEC vendor onboarding W-9 scams,” where forged invoices and stolen EINs targeted oil and gas companies, demanding payments to typosquatted domains such as zoominfopay[.]com.
API patterns such as rapid sequence calls to PutAccountVdmAttributes and PutAccountDedicatedIpWarmupAttributes provided strong behavioral indicators of SES abuse, enabling attackers to fine-tune deliverability and bypass security checks.
To mitigate these evolving threats, organizations must implement least-privilege IAM policies, monitor for abnormal SES activity, and deploy behavioral analytics.
Fortinet’s FortiCNAPP suite, along with real-time alerting and composite anomaly detection, is vital for early detection and response to credential-driven cloud attacks, especially in environments where traditional security controls may fall short.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post New TruffleNet BEC Operation Uses Compromised AWS SES Keys Over 800 Hosts Impacted appeared first on Cyber Security News.
After President Donald Trump launched a war on Iran over the weekend without congressional authorization,…
Are you a huge fan of LEGO sets and yet consistently sticker-shocked by their exorbitant…
U.S. House Speaker Mike Johnson, R-La., speaks to reporters at the U.S. Capitol on March…
A package of child safety bills is headed to the House floor following an hours-long…
US Defense Secretary Pete Hegseth speaks during a press conference on US military action in…
The National Videogame Museum (NVM) has announced the acquisition of a wildly rare and strange…
This website uses cookies.