Amazon RSA 2048 M04
TLS certificate intermediate · suspicious phishing activity
What is Amazon RSA 2048 M04?
- Operator
- Amazon Trust Services LLC
- Chains to
- Amazon Root CA 1
- Key type
- RSA
- In use since
- 2024
Fourth ACM public-certificate intermediate, rotated alongside M01-M03.
Functionally identical to its M0x siblings; AWS load-balances issuance across the rotation.
Frequently asked questions
What is Amazon RSA 2048 M04?
Amazon RSA 2048 M04 is a publicly trusted intermediate certificate authority operated by Amazon Trust Services LLC and chained to Amazon Root CA 1. It is recognized by all mainstream browsers and operating system trust stores, so the certificate itself is not a phishing indicator - the same intermediate signs millions of legitimate sites. phishunt only flags the specific domains listed below as suspicious; Amazon RSA 2048 M04 as a CA is fine.
Why does Amazon RSA 2048 M04 show up on phishing sites?
Amazon Trust Services LLC issues RSA domain-validated certificates automatically and at no cost (or very low cost), which is the exact workflow scammers need to put HTTPS on a throwaway domain. Domain validation only proves that the requester controls the domain name, not that the site behind it is trustworthy. phishunt lists the specific domains currently flagged below — those are the suspicious ones, not Amazon RSA 2048 M04 itself.
How do I verify a certificate issued by Amazon RSA 2048 M04?
In a desktop browser, click the padlock in the address bar and open the certificate viewer. Confirm the issuer chain ends at Amazon Root CA 1, that the subject matches the domain you expect, and that the notAfter date has not passed. A valid Amazon RSA 2048 M04 certificate only proves TLS was negotiated correctly — always verify the domain name itself belongs to the service you intended to visit.
What is the difference between Amazon RSA 2048 M04 and Amazon RSA 2048 M01?
Amazon RSA 2048 M04 and its siblings (Amazon RSA 2048 M01, Amazon RSA 2048 M02, Amazon RSA 2048 M03) share the same operator (Amazon Trust Services LLC) and roll up to the same root (Amazon Root CA 1). CAs rotate multiple intermediates so that if one key ever has to be revoked, the damage is contained. As a user, you can treat all of them as the same trust anchor.
It is strongly recommended to use them for Threat Hunting or add them to a Watchlist.
| Last check (UTC) | First seen (UTC) ▾ | URL | Screenshot | Flags | Details |
|---|---|---|---|---|---|
| 2026-04-25 01:01 | 2026-04-25 01:01 | ![]() |
OpenPhish urlscan | Details | |
| 2026-03-14 06:04 | 2026-03-14 06:04 | ![]() |
PhishTank | Details | |
| 2026-03-12 11:00 | 2026-03-12 11:00 | ![]() |
PhishTank | Details | |
| 2026-03-12 05:01 | 2026-03-12 05:01 | ![]() |
PhishTank | Details | |
| 2026-03-12 05:01 | 2026-03-12 05:01 | ![]() |
PhishTank | Details | |
| 2026-03-12 05:00 | 2026-03-12 05:00 | ![]() |
PhishTank | Details | |
| 2026-03-12 01:01 | 2026-03-12 01:01 | ![]() |
OpenPhish | Details | |
| 2026-03-11 15:00 | 2026-03-11 15:00 | ![]() |
GSB PhishTank | Details | |
| 2026-03-11 01:03 | 2026-03-11 01:03 | ![]() |
OpenPhish | Details | |
| 2026-03-09 01:02 | 2026-03-09 01:02 | ![]() |
OpenPhish | Details | |
| 2026-03-06 14:04 | 2026-03-06 14:04 | ![]() |
PhishTank | Details | |
| 2026-03-05 00:02 | 2026-03-05 00:02 | ![]() |
PhishTank | Details | |
| 2026-03-04 13:02 | 2026-03-04 13:02 | ![]() |
OpenPhish | Details | |
| 2026-03-04 13:01 | 2026-03-04 13:01 | ![]() |
OpenPhish | Details | |
| 2026-03-04 13:00 | 2026-03-04 13:00 | ![]() |
PhishTank | Details | |
| 2026-03-04 01:04 | 2026-03-04 01:04 | ![]() |
OpenPhish | Details | |
| 2026-03-03 12:03 | 2026-03-03 12:03 | ![]() |
PhishTank | Details | |
| 2026-03-02 10:04 | 2026-03-02 10:04 | ![]() |
PhishTank | Details | |
| 2026-02-27 16:01 | 2026-02-27 16:01 | ![]() |
PhishTank | Details | |
| 2026-02-25 12:00 | 2026-02-25 12:00 | ![]() |
PhishTank | Details | |
| 2026-02-25 08:00 | 2026-02-25 08:00 | ![]() |
PhishTank | Details | |
| 2026-02-25 04:00 | 2026-02-25 04:00 | ![]() |
OpenPhish | Details | |
| 2026-02-24 20:02 | 2026-02-24 20:02 | ![]() |
PhishTank | Details |
It is strongly recommended to use them for Threat Hunting or add them to a Watchlist.
| URL | Screenshot | Flags | Details |
|---|---|---|---|
| https://charliemanarix-facebo… | ![]() |
OpenPhish urlscan | Details |
| https://saison-apinoreply-vrt… | ![]() |
PhishTank | Details |
| https://standard-cdn.s3.ap-no… | ![]() |
PhishTank | Details |
| https://q-r.to/correospago-es | ![]() |
PhishTank | Details |
| https://qrco.de/correospago-es | ![]() |
PhishTank | Details |
| https://l.ead.me/correospago-… | ![]() |
PhishTank | Details |
| http://s3.ca-central-1.amazon… | ![]() |
OpenPhish | Details |
| https://73ahgytpvpjfhxq5v.s3.… | ![]() |
GSB PhishTank | Details |
| https://7vnnjb-pv1x3c-sl5yz6-… | ![]() |
OpenPhish | Details |
| https://charliemanarix-facebo… | ![]() |
OpenPhish | Details |
| https://optimized-performance… | ![]() |
PhishTank | Details |
| https://go-smart-archive.s3.u… | ![]() |
PhishTank | Details |
| http://scan002652601212026020… | ![]() |
OpenPhish | Details |
| https://s3.ap-southeast-2.ama… | ![]() |
OpenPhish | Details |
| https://managed-exchange-stor… | ![]() |
PhishTank | Details |
| https://s3.ap-southeast-2.ama… | ![]() |
OpenPhish | Details |
| https://business-productivity… | ![]() |
PhishTank | Details |
| https://app-interactive-endpo… | ![]() |
PhishTank | Details |
| https://hub-managed-endpoint-… | ![]() |
PhishTank | Details |
| https://ventures-portal-2022.… | ![]() |
PhishTank | Details |
| https://live-studio-archive-t… | ![]() |
PhishTank | Details |
| http://s3.ap-southeast-2.amaz… | ![]() |
OpenPhish | Details |
| https://s3.ap-southeast-2.ama… | ![]() |
PhishTank | Details |
