Cybersecurity Reference > Glossary
What is Domain Fronting?
An attacker sends requests that appear to target a legitimate, trusted domain while actually communicating with a malicious server hosted on the same CDN infrastructure. The deception works by creating a mismatch between two parts of the connection: the domain name shown in the TLS Server Name Indication field and the domain specified in the HTTP Host header. Security tools inspecting the traffic see connections to a reputable site—perhaps a major cloud provider—while the CDN quietly routes the actual request to the attacker's server based on that hidden Host header.
This makes domain fronting especially effective against domain-based filtering, deep packet inspection, and geographic censorship. Attackers use it for command and control communications in sophisticated campaigns, for exfiltrating data without triggering alarms, and for bypassing network restrictions that would otherwise block their traffic. Major cloud providers have pushed back by requiring the SNI and Host header to match, but the technique still works on platforms that haven't implemented these safeguards. For defenders, it's a reminder that even traffic to trusted domains deserves scrutiny when behavior patterns seem off.
Origin
The transition from circumvention tool to threat vector happened quickly. By 2017, security researchers documented nation-state actors and cybercriminal groups using domain fronting for malicious purposes, particularly for command and control infrastructure that could evade detection. The technique's abuse prompted major CDN providers to take action. In 2018, both Google and Amazon announced they would block domain fronting on their platforms by enforcing strict matching between SNI and Host headers. Microsoft followed with similar restrictions. This response didn't eliminate the technique entirely, but it significantly reduced the available infrastructure attackers could exploit, forcing them to seek out smaller providers or alternative obfuscation methods.
Why It Matters
The technique matters because it targets a blind spot in many security architectures. Organizations that have invested in perimeter defenses, threat intelligence feeds, and domain filtering may still miss traffic that appears to flow to Microsoft Azure or similar platforms. This is particularly concerning for detecting advanced persistent threats, where attackers need long-term, low-profile command and control channels. Even after major providers closed the loophole, smaller CDNs and hosting services continue to offer viable infrastructure for domain fronting, keeping the technique relevant.
The broader implication is that defenders need behavioral analysis and anomaly detection, not just reputation-based filtering. Watching for unusual traffic patterns, unexpected data volumes to CDN endpoints, or inconsistencies in connection metadata becomes more important than simply checking if a domain is on an allowlist. Domain fronting reminds security teams that trust has to be conditional, even for traffic that looks completely normal on the surface.
The Plurilock Advantage
We also provide 24x7 managed detection and response that looks beyond domain reputation to identify behavioral anomalies that suggest hidden command and control traffic.
When your defenses need to catch threats that hide in plain sight, our adversary simulation services show you exactly where the gaps are.
.
Need Protection Against Domain Fronting Attacks?
Plurilock's network security solutions can detect and block sophisticated domain fronting techniques.
Get Network Security Help → Learn more →




