Hi Benoît,

We routinely report abusive emails to AWS that our email hosting customers 
receive (although not in the past three weeks...) and have consistently 
received helpful responses at the outset in all but one case. We are a US 
company.

As we are an AWS customer ourselves, we typically open a new cases via a web 
form.

But, you can also send an email to trustandsaf...@support.aws.com to open a 
case when the form doesn't "fit" the abuse and allow us to share all of the 
relevant facts.

In the one case where we got off to a bad start, we just mentioned that our 
assets on AWS our attorney advised us comprised a "protected computer" system 
as defined by 18 USC § 1030(e)(2), and that AWS failing to take action (their 
initial response, similar to what you reported) could have AWS named as an 
accessory to a crime our attorney planned to report to the authorities.

We then very quickly got a more helpful response, from a different agent at AWS.

Hope that helps, 
Mark 

-- 
_________________________________________________________________ 
L. Mark Stone, Founder 
North America's Leading Zimbra VAR/BSP/Training Partner 
For Companies With Mission-Critical Email Needs 
Winner of the Zimbra Americas VAR Partner of the Year 2024 Award

----- Original Message -----
| From: "Benoit Panizzon via mailop" <mailop@mailop.org>
| To: "mailop" <mailop@mailop.org>
| Sent: Monday, April 7, 2025 6:15:30 AM
| Subject: [mailop] Amazon AWS a save haven for phisher?

| Hi
| 
| Maybe anyone from AWS is on this list who could explain the reaction of
| AWS to phishing incidents?
| 
| Two weeks ago, our customer started to receive phishing emails asking
| them to enter their email credentials on a website that copied our
| webmail login, company name and contact details, hosted @ AWS.
| 
| We opened a case with the AWS abuse desk and asked them to please
| disable the phishing site.
| 
| Thankfully, there was a footer line hinting tho the tool used to
| create the site and thus to the AWS reseller hosting that site. I
| also contacted that reseller. He acted quickly, the phishing site was
| gone within a couple of hours. Kudos!
| 
| But the (very later) reply from the AWS abuse team was very
| disconcerting!
| 
| It was explaining, that AWS has no access nor is responsible
| for the content hosted by their customer and asked us to contact their
| customer directly to address the issue.
| 
| I notified AWS that in this case we managed to contact their customer,
| but usually this is not the case when faced with phishing email
| displaying our own company name, logo and contact details. I asked if
| they could publish the abuse contact to their reseller in the
| corresponding IP registry in case they assigned the IP range in
| question to some other company.
| 
| I got the same reply again telling me, AWS is not responsible for
| content published by customers on their platform.
| 
| What went wrong? Or how can phishing be addressed with AWS? Or has AWS
| now become a safe haven for phisher?
| 
| Mit freundlichen Grüssen
| 
| -Benoît Panizzon-
| --
| I m p r o W a r e   A G    -    Leiter Commerce Kunden
| ______________________________________________________
| 
| Zurlindenstrasse 29             Tel  +41 61 826 93 00
| CH-4133 Pratteln                Fax  +41 61 826 93 01
| Schweiz                         Web  http://www.imp.ch
| ______________________________________________________
| _______________________________________________
| mailop mailing list
| mailop@mailop.org
| https://list.mailop.org/listinfo/mailop
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to