Scenario 1: An internal host communicates with multiple domains via HTTPS, with traffic patterns showing frequent changes in destination domains but consistent JA3 hashes. Further investigation reveals malware using domain fronting to evade detection while maintaining contact with C2 servers.
Scenario 2: A security audit detects HTTPS sessions from an internal host to multiple domains within a short period. Analysis shows these sessions contain hidden command and control traffic, indicating the host is compromised and using multi-home fronting for evasion.