Sharing this one because it landed in a client's inbox this morning and I think it's a great teaching example — it bypasses pretty much every traditional email security control without ever spoofing a sender, faking a domain, or using a malicious link.
A typical-looking refund scam:
"Congratulations, your Amazon Audible Gold has been renewed for $490. To manage billing or cancel, call 828-316-2115..."
What made it weird is that the email was actually from no-reply@sns.amazonaws.com. Real Amazon infrastructure. Signed, DKIM-aligned, all the auth headers green. The subject line was the giveaway: "AWS Notification - Subscription Confirmation."
AWS Simple Notification Service (SNS) is a pub/sub messaging service. When you create a topic and add an email address as a subscriber, AWS sends that address a confirmation email containing the topic's ARN (Amazon Resource Name) and a "Confirm subscription" link.
The attacker abuses two facts:
So they create a topic named something like:
Congratulations-Amazon-Audible-Gold-extended-2-more-years-490-USD-renewal-processed-member-only-deals-...-call-828-316-2115
Then they subscribe the victim's email to it. AWS does what AWS is supposed to do and sends a perfectly legitimate confirmation email. The "scam" lives entirely inside the topic name. The phone number is the real payload.
sns.us-east-2.amazonaws.com.Traditional email security is looking for bad senders, bad links, suspicious attachments. None of those exist here. It's a callback phishing attack wearing AWS's clothes.
abuse@amazonaws.com (limited impact, but it's the right channel)no-reply@sns.amazonaws.com is reasonable. If they do, a content rule looking for marketing/urgency language inside SNS topic ARNs is more surgicalHas anyone else run into this lately? Curious whether others are seeing it scale up, and what you're doing for users who legitimately need AWS notifications in their inbox. The dual-use nature of sns.amazonaws.com makes this a harder problem than the usual "just block the sender."