Practical AWS Threat Hunting: Exposing C2s, Phishing Kits, and Open Directories with Hunt.io

Practical AWS Threat Hunting: Exposing C2s, Phishing Kits, and Open Directories with Hunt.io

Published on

Published on

Published on

Sep 25, 2025

Sep 25, 2025

Sep 25, 2025

Practical AWS Threat Hunting: Exposing C2s, Phishing Kits, and Open Directories with Hunt.io
Practical AWS Threat Hunting: Exposing C2s, Phishing Kits, and Open Directories with Hunt.io
Practical AWS Threat Hunting: Exposing C2s, Phishing Kits, and Open Directories with Hunt.io

eBook

Modern Threat Hunting

Modern Threat Hunting

10 Practical Steps to Outsmart Adversaries

10 Practical Steps to Outsmart Adversaries

A Hands-On Guide Using Hunt.io’s Threat Intelligence Platform

Get the Free eBook

Get the Free eBook

Amazon Web Services (AWS) powers much of the modern internet. Enterprises host critical workloads on AWS, startups build rapidly there, and governments trust it with sensitive systems. That same trust draws attackers.

Recently, researchers uncovered a campaign using AWS Lambda URLs as command-and-control infrastructure against government agencies, and another campaign where compromised AWS access keys were used to abuse Amazon SES for large-scale phishing. These cases highlight that AWS security is not just about protecting your own AWS account but also about understanding how adversaries exploit AWS services.

Attackers routinely spin up short-lived servers for C2, stage malware payloads in open buckets, and host phishing pages that imitate major brands.

To defend effectively, teams need visibility into more than just their own AWS environment. They need insights from external threat intelligence that expose malicious use of cloud environments. That is where Hunt.io's Host Radar comes in.

To understand how this works in practice, let's take a closer look at Host Radar itself.

What is Host Radar?

Host Radar is a Hunt.io feature that continuously scans the internet to identify malicious infrastructure at scale. It helps threat hunting teams track abused hosting providers, map adversary use of AWS services, and connect single indicators to larger campaigns.

For threat hunters, this means every suspicious IP, domain, or IOC from logs becomes the start of a pivot. By tying AWS activity to related infrastructure, Host Radar supports both threat detection and proactive response.

figure 1 Practical AWS Threat Hunting

That foundation becomes more tangible when we look at the latest AWS-specific data Hunt.io has uncovered.

Host Radar Data: AWS in Focus

The latest dataset shows AWS is a hotspot for adversary operations. In just the last 30 days, we recorded:

  • 1.3k active C2 servers hosted on AWS

  • 9 malicious open directories staging attacker tools and payloads

  • 14 fresh IOCs connected to AWS threat campaigns

  • 993 phishing sites abusing AWS services

figure 2 Practical AWS Threat Hunting

Every one of these findings can be pivoted on. For example, an IP from VPC Flow Logs can be expanded into related domains, certificates, and ports. A phishing site can be pivoted into a cluster of similar AWS-based domains. This workflow provides hunters with a real-world view of how adversaries utilize cloud infrastructure.

Numbers alone aren't enough, the value comes from turning this data into actionable workflows.

Actionable AWS Threat Hunting Workflows with Hunt.io

Enriching VPC Flow Logs for Threat Detection

When attackers spin up short-lived EC2 instances inside AWS, they often blend in with legitimate traffic. SOC analysts relying only on raw logs can miss the early signs of command and control communication.

VPC Flow Logs are one of the most valuable data sources for AWS threat hunting, but on their own, they don't provide enough context to separate benign traffic from adversary infrastructure.

Example Workflow Scenario:

  • AWS Signal: A SOC analyst sees suspicious outbound traffic in VPC Flow Logs.

  • Hunt.io Pivot: The IP is enriched in Hunt.io and linked to one of the 1.3k C2 servers hosted in AWS: pivoting surfaces related domains, malware families, and even attacker TTPs.

  • Outcome: The team turns one event into a campaign map, enhancing threat detection rules within their SIEM.

figure 3 Practical AWS Threat Hunting

Flow Logs are just one angle. Another common entry point for attackers is malicious open directories hosted in AWS.

Investigating Malicious Open Directories

Attackers frequently use open directories hosted on AWS services to distribute malware or share stolen data. These directories can look like ordinary web servers until you inspect the files inside. Detecting them early is critical, since they often serve as staging points for larger campaigns.

Hunt.io's AttackCapture™ continuously scans for these exposed resources, making it easier to spot malicious payloads before they spread.

Example Workflow Scenario:

  • AWS Signal: GuardDuty generates an alert for repeated file downloads.

  • Hunt.io Pivot: AttackCapture™ reveals the host is an AWS-based open directory staging Redline Stealer. Analysts pivot to file hashes, malware families, and attacker tools.

  • Outcome: Instead of handling one file, the SOC responds to the entire campaign using AWS services for distribution.

figure 4 Practical AWS Threat Hunting

Phishing kits are the next frontier, and AWS's credibility makes it a prime target for these operations.
Hunting AWS-Based Phishing Kits

Phishing campaigns increasingly rely on AWS hosting because it lends credibility and scale. A phishing page served from AWS can trick even cautious users, since the infrastructure appears legitimate. Identifying these kits quickly (and mapping out their related infrastructure) is essential for defending both employees and customers.

Example Workflow Scenario:

  • AWS Signal: A fake AWS login page is reported by users.

  • Hunt.io Pivot: The domain is enriched in Hunt.io and reveals dozens of related phishing sites hosted across AWS cloud environments.

  • Outcome: The SOC blocks not just one URL but the entire phishing cluster.

figure 5 Practical AWS Threat Hunting

All of these examples point to the same reality: hunting in AWS isn't just about spotting single signals, it's about pivoting to reveal the bigger picture.

Why Pivoting is the Key to AWS Threat Hunting

Adversary infrastructure is rarely isolated. A single IP address might be tied to multiple domains, SSL certificates, or phishing kits, and each of those can reveal further connections. Without pivoting, defenders only see fragments of an operation.

figure 6 Practical AWS Threat Hunting

With Hunt.io, pivoting becomes the default workflow:

  • From IPs to Domains: An AWS-hosted IP can quickly expand into related domains or subdomains through SSL certificate fingerprints or reverse DNS records.

  • From Certificates to Infrastructure: A single SHA256 certificate hash might link multiple phishing sites, showing clusters that would otherwise go unnoticed.

  • From IOCs to Campaigns: One IOC in a GuardDuty alert can be enriched and expanded into attacker toolkits, open directories, or entire C2 networks.

  • From Associations to Actor Profiles: Tying domains, hashes, and certificates together builds the larger campaign picture, who is behind it, what tools they use, and how they move infrastructure across cloud providers.

The screenshot above shows this in action: starting from one AWS IP, pivots expose linked domains (gophish.dev.watch.tv.br, sm-prod.io, www.iprocessi.com) and certificate hashes that surface wider attacker campaigns.

This is the core of Hunt.io: giving threat hunters a way to start from any signal (an IP, domain, hash, or certificate subject) and pivot into a campaign view that reveals the adversary's infrastructure.

This is what makes AWS threat hunting effective. Instead of relying only on AWS services for monitoring, teams combine native data sources with Hunt.io to uncover the full scope of adversary campaigns.

Conclusion

AWS is one of the most trusted cloud environments, yet attackers consistently exploit it. From thousands of active C2 servers to phishing campaigns and malicious directories, AWS threats are on the rise.

Hunt.io bridges this gap by turning any signal into an entry point. Whether the starting point is an IP, domain, or file hash, Host Radar and AttackCapture™ expose the wider AWS infrastructure adversaries rely on. This pivot-driven approach gives security teams the visibility they need to move from isolated alerts to full campaign awareness.

See how Host Radar powers practical AWS threat hunting. Book a demo today.

Amazon Web Services (AWS) powers much of the modern internet. Enterprises host critical workloads on AWS, startups build rapidly there, and governments trust it with sensitive systems. That same trust draws attackers.

Recently, researchers uncovered a campaign using AWS Lambda URLs as command-and-control infrastructure against government agencies, and another campaign where compromised AWS access keys were used to abuse Amazon SES for large-scale phishing. These cases highlight that AWS security is not just about protecting your own AWS account but also about understanding how adversaries exploit AWS services.

Attackers routinely spin up short-lived servers for C2, stage malware payloads in open buckets, and host phishing pages that imitate major brands.

To defend effectively, teams need visibility into more than just their own AWS environment. They need insights from external threat intelligence that expose malicious use of cloud environments. That is where Hunt.io's Host Radar comes in.

To understand how this works in practice, let's take a closer look at Host Radar itself.

What is Host Radar?

Host Radar is a Hunt.io feature that continuously scans the internet to identify malicious infrastructure at scale. It helps threat hunting teams track abused hosting providers, map adversary use of AWS services, and connect single indicators to larger campaigns.

For threat hunters, this means every suspicious IP, domain, or IOC from logs becomes the start of a pivot. By tying AWS activity to related infrastructure, Host Radar supports both threat detection and proactive response.

figure 1 Practical AWS Threat Hunting

That foundation becomes more tangible when we look at the latest AWS-specific data Hunt.io has uncovered.

Host Radar Data: AWS in Focus

The latest dataset shows AWS is a hotspot for adversary operations. In just the last 30 days, we recorded:

  • 1.3k active C2 servers hosted on AWS

  • 9 malicious open directories staging attacker tools and payloads

  • 14 fresh IOCs connected to AWS threat campaigns

  • 993 phishing sites abusing AWS services

figure 2 Practical AWS Threat Hunting

Every one of these findings can be pivoted on. For example, an IP from VPC Flow Logs can be expanded into related domains, certificates, and ports. A phishing site can be pivoted into a cluster of similar AWS-based domains. This workflow provides hunters with a real-world view of how adversaries utilize cloud infrastructure.

Numbers alone aren't enough, the value comes from turning this data into actionable workflows.

Actionable AWS Threat Hunting Workflows with Hunt.io

Enriching VPC Flow Logs for Threat Detection

When attackers spin up short-lived EC2 instances inside AWS, they often blend in with legitimate traffic. SOC analysts relying only on raw logs can miss the early signs of command and control communication.

VPC Flow Logs are one of the most valuable data sources for AWS threat hunting, but on their own, they don't provide enough context to separate benign traffic from adversary infrastructure.

Example Workflow Scenario:

  • AWS Signal: A SOC analyst sees suspicious outbound traffic in VPC Flow Logs.

  • Hunt.io Pivot: The IP is enriched in Hunt.io and linked to one of the 1.3k C2 servers hosted in AWS: pivoting surfaces related domains, malware families, and even attacker TTPs.

  • Outcome: The team turns one event into a campaign map, enhancing threat detection rules within their SIEM.

figure 3 Practical AWS Threat Hunting

Flow Logs are just one angle. Another common entry point for attackers is malicious open directories hosted in AWS.

Investigating Malicious Open Directories

Attackers frequently use open directories hosted on AWS services to distribute malware or share stolen data. These directories can look like ordinary web servers until you inspect the files inside. Detecting them early is critical, since they often serve as staging points for larger campaigns.

Hunt.io's AttackCapture™ continuously scans for these exposed resources, making it easier to spot malicious payloads before they spread.

Example Workflow Scenario:

  • AWS Signal: GuardDuty generates an alert for repeated file downloads.

  • Hunt.io Pivot: AttackCapture™ reveals the host is an AWS-based open directory staging Redline Stealer. Analysts pivot to file hashes, malware families, and attacker tools.

  • Outcome: Instead of handling one file, the SOC responds to the entire campaign using AWS services for distribution.

figure 4 Practical AWS Threat Hunting

Phishing kits are the next frontier, and AWS's credibility makes it a prime target for these operations.
Hunting AWS-Based Phishing Kits

Phishing campaigns increasingly rely on AWS hosting because it lends credibility and scale. A phishing page served from AWS can trick even cautious users, since the infrastructure appears legitimate. Identifying these kits quickly (and mapping out their related infrastructure) is essential for defending both employees and customers.

Example Workflow Scenario:

  • AWS Signal: A fake AWS login page is reported by users.

  • Hunt.io Pivot: The domain is enriched in Hunt.io and reveals dozens of related phishing sites hosted across AWS cloud environments.

  • Outcome: The SOC blocks not just one URL but the entire phishing cluster.

figure 5 Practical AWS Threat Hunting

All of these examples point to the same reality: hunting in AWS isn't just about spotting single signals, it's about pivoting to reveal the bigger picture.

Why Pivoting is the Key to AWS Threat Hunting

Adversary infrastructure is rarely isolated. A single IP address might be tied to multiple domains, SSL certificates, or phishing kits, and each of those can reveal further connections. Without pivoting, defenders only see fragments of an operation.

figure 6 Practical AWS Threat Hunting

With Hunt.io, pivoting becomes the default workflow:

  • From IPs to Domains: An AWS-hosted IP can quickly expand into related domains or subdomains through SSL certificate fingerprints or reverse DNS records.

  • From Certificates to Infrastructure: A single SHA256 certificate hash might link multiple phishing sites, showing clusters that would otherwise go unnoticed.

  • From IOCs to Campaigns: One IOC in a GuardDuty alert can be enriched and expanded into attacker toolkits, open directories, or entire C2 networks.

  • From Associations to Actor Profiles: Tying domains, hashes, and certificates together builds the larger campaign picture, who is behind it, what tools they use, and how they move infrastructure across cloud providers.

The screenshot above shows this in action: starting from one AWS IP, pivots expose linked domains (gophish.dev.watch.tv.br, sm-prod.io, www.iprocessi.com) and certificate hashes that surface wider attacker campaigns.

This is the core of Hunt.io: giving threat hunters a way to start from any signal (an IP, domain, hash, or certificate subject) and pivot into a campaign view that reveals the adversary's infrastructure.

This is what makes AWS threat hunting effective. Instead of relying only on AWS services for monitoring, teams combine native data sources with Hunt.io to uncover the full scope of adversary campaigns.

Conclusion

AWS is one of the most trusted cloud environments, yet attackers consistently exploit it. From thousands of active C2 servers to phishing campaigns and malicious directories, AWS threats are on the rise.

Hunt.io bridges this gap by turning any signal into an entry point. Whether the starting point is an IP, domain, or file hash, Host Radar and AttackCapture™ expose the wider AWS infrastructure adversaries rely on. This pivot-driven approach gives security teams the visibility they need to move from isolated alerts to full campaign awareness.

See how Host Radar powers practical AWS threat hunting. Book a demo today.

Related Posts:

Practical AWS Threat Hunting: Exposing C2s, Phishing Kits, and Open Directories with Hunt.io
Sep 25, 2025

Learn AWS threat hunting with Hunt.io. Expose C2 servers, phishing kits, and open directories in AWS using Host Radar and pivoting intelligence.

Practical AWS Threat Hunting: Exposing C2s, Phishing Kits, and Open Directories with Hunt.io
Sep 25, 2025

Learn AWS threat hunting with Hunt.io. Expose C2 servers, phishing kits, and open directories in AWS using Host Radar and pivoting intelligence.

Practical AWS Threat Hunting: Exposing C2s, Phishing Kits, and Open Directories with Hunt.io
Sep 25, 2025

Learn AWS threat hunting with Hunt.io. Expose C2 servers, phishing kits, and open directories in AWS using Host Radar and pivoting intelligence.

Splunk Threat Hunting: Practical Guide with Hunt.io Feeds
Sep 25, 2025

Splunk Threat Hunting made practical: use Hunt.io feeds to detect live C2, enrich alerts, and reduce noise in your Splunk environment.

Splunk Threat Hunting: Practical Guide with Hunt.io Feeds
Sep 25, 2025

Splunk Threat Hunting made practical: use Hunt.io feeds to detect live C2, enrich alerts, and reduce noise in your Splunk environment.

Splunk Threat Hunting: Practical Guide with Hunt.io Feeds
Sep 25, 2025

Splunk Threat Hunting made practical: use Hunt.io feeds to detect live C2, enrich alerts, and reduce noise in your Splunk environment.

Sqrrl Threat Hunting Framework: A Complete Guide
Sep 25, 2025

Uncover the Sqrrl Threat Hunting Framework. Learn the key techniques and best practices to proactively hunt for threats and bolster your security.

Sqrrl Threat Hunting Framework: A Complete Guide
Sep 25, 2025

Uncover the Sqrrl Threat Hunting Framework. Learn the key techniques and best practices to proactively hunt for threats and bolster your security.

Sqrrl Threat Hunting Framework: A Complete Guide
Sep 25, 2025

Uncover the Sqrrl Threat Hunting Framework. Learn the key techniques and best practices to proactively hunt for threats and bolster your security.

Threat Hunting Loop: A Practical Guide
Sep 18, 2025

Master the threat hunting loop. Our guide walks you from the initial hypothesis to the final action to strengthen your defenses.

Threat Hunting Loop: A Practical Guide
Sep 18, 2025

Master the threat hunting loop. Our guide walks you from the initial hypothesis to the final action to strengthen your defenses.

Threat Hunting Loop: A Practical Guide
Sep 18, 2025

Master the threat hunting loop. Our guide walks you from the initial hypothesis to the final action to strengthen your defenses.