TruffleNet BEC Attack: Over 800 Hosts Compromised Using Stolen AWS Credentials
Security researchers have uncovered a large and sophisticated campaign, dubbed “TruffleNet,” in which attackers are abusing stolen Amazon Web Services (AWS) credentials to hijack AWS’s Simple Email Service (SES) and launch Business Email Compromise (BEC) attacks. Rather than relying on malware or phishing alone, the adversaries are weaponizing legitimate cloud infrastructure, making their emails look far more trustworthy. The scale is massive: over 800 unique hosts across 57 different networks are participating in the operation.
What Happened
The TruffleNet campaign begins with attackers using TruffleHog, an open-source secret-scanning tool, to validate AWS credentials they’ve compromised. Once they confirm valid AWS access keys, they execute reconnaissance: the compromised hosts make a GetCallerIdentity API call to check who owns the credentials.
If the credentials pass that test, the next step is to call GetSendQuota from the AWS SES API, which helps the attackers determine how many emails they can send using SES. Many of the IP addresses used for this activity have never been flagged by reputation or antivirus systems, suggesting that the attackers built their infrastructure specifically for this campaign.
After reconnaissance, the adversaries abuse SES: they create verified sending identities using compromised domains and stolen DKIM (DomainKeys Identified Mail) cryptographic keys from previously compromised WordPress sites. With these identities in place, they execute BEC attacks, sending highly convincing phishing or invoice emails that appear to come from legitimate companies.
In one documented case, attackers targeted companies in the oil and gas sector, sending fake vendor onboarding invoices claiming to be from ZoomInfo, and requesting payments of $50,000 via ACH. To make the scam even more convincing, they included W-9 forms with real Employer Identification Numbers (EINs), and used typosquatted domains to handle responses.
How It Happened

- Credential Validation & Reconnaissance – Attackers start with a large trove of stolen AWS keys. Using TruffleHog, they test each key to find the ones that still work.
- SES Capability Check – Once valid keys are found, the campaign sends GetCallerIdentity and GetSendQuota API calls to assess the identity and email-sending capabilities associated with those credentials.
- Containerized Attack Infrastructure – The operation relies on more than 800 hosts, many of which run Portainer, a Docker/Kubernetes management tool. This gives attackers a centralized way to manage and coordinate their malicious nodes.
- Email Identity Fabrication – With SES access, the attackers import DKIM signing keys stolen from compromised WordPress websites. They then use those keys to register email identities in SES, making their malicious emails appear legitimate.
- BEC Execution – Finally, TruffleNet sends business email compromise messages under trusted-looking domains. These messages are sophisticated, complete with W-9 forms and legitimate-looking invoices, designed to trick financial teams.
Possible Impact
- Highly Convincing Phishing & Fraud – Using real SES infrastructure and verified DKIM domains makes the BEC scams extremely hard to distinguish from legitimate emails.
- Financial Loss – Victims could be tricked into sending large payments (e.g., $50,000 ACH transfers) to attackers.
- Mass Credential Abuse – The campaign’s size (800+ hosts) shows how many stolen AWS credentials are being tested and abused in parallel.
- Long-Term Cloud Risk – Any AWS account with compromised SES credentials could be repurposed for ongoing fraud, phishing, or further infrastructure abuse.
- Reputation Damage – Organizations whose SES accounts are abused may find their domains blacklisted or flagged as sources of phishing.
Recommendations
To defend against TruffleNet-style attacks, security teams should consider the following actions:
- Audit and Rotate Credentials Frequently – Regularly scan for exposed keys (in code repositories, logs, etc.) and rotate them.
- Restrict SES Permissions – Apply the principle of least privilege: only give SES access to identities that truly need it.
- Enable Cloud Logging & Monitoring – Use AWS CloudTrail to monitor calls like GetCallerIdentity and SES API usage for unusual patterns.
- Alert on Anomalous SES Behavior – Set up behavioral alerts for sudden spikes in sending quotas, new verified identities, or new DKIM configurations.
- Secure Your Domains – Protect your WordPress or other web assets from compromise, especially if they sign DKIM keys for SES domains.
- Train Financial Teams – Teach accounts payable and finance teams to verify vendor payment requests out-of-band (phone calls, known contacts), even when the email looks “official.”
- Use Secret-Scanning Tools – Integrate tools like TruffleHog or similar secret scanners in your CI/CD pipeline to catch exposed AWS keys before they’re exploited.
How NHI Mgmt Group Can Help
Incidents like this underscore a critical truth, Non-Human Identities (NHIs) are now at the center of modern cyber risk. OAuth tokens, AWS credentials, service accounts, and AI-driven integrations act as trusted entities inside your environment, yet they’re often the weakest link when it comes to visibility and control.
At NHI Mgmt Group, we specialize in helping organizations understand, secure, and govern their non-human identities across cloud, SaaS, and hybrid environments. Our advisory services are grounded in a risk-based methodology that drives measurable improvements in security, operational alignment, and long-term program sustainability.
We also offer the NHI Foundation Level Training Course, the world’s first structured course dedicated to Non-Human Identity Security. This course gives you the knowledge to detect, prevent, and mitigate NHI risks.
If your organization uses third-party integrations, AI agents, or machine credentials, this training isn’t optional; it’s essential.
Conclusion
The TruffleNet campaign is a powerful reminder that identity compromise is now a core threat vector for cloud systems. By weaponizing stolen AWS credentials, attackers are turning trusted services like SES into tools for large-scale fraud and BEC.
This operation isn’t just about phishing, it’s a sophisticated, automated cloud abuse campaign built on legitimacy, scale, and stealth. As cloud adoption continues to grow, organizations must treat credential security and API access with the same rigor they apply to traditional perimeter defenses.

