A recent phishing campaign leveraged compromised AWS keys to weaponize Amazon Simple Email Service (SES), demonstrating novel techniques to bypass default restrictions and achieve industrial-scale email delivery. * Attackers abused the `PutAccountDetails` API across all AWS regions to push SES accounts into production mode, escalating sending limits from 200 to 50,000 emails daily. * The campaign utilized programmatic API calls (e.g., `CreateCase`) and attempted privilege escalation, indicating sophisticated, automated tradecraft. * Phishing emails, themed around 2024 tax forms, used verified domains and concealed credential theft sites behind redirect services for evasion. * SES abuse signals pre-existing AWS credential compromise, posing risks of deeper cloud compromise, brand damage, and operational disruption for victims.