CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks
Black Hat Asia 2025 · Day 2 · Briefings
This talk, "CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks," presented by Julie from the National University of Singapore and Zu from Singapore Management University, unveils a novel class of **amplification attacks** that leverage Content Delivery Networks (CDNs) against their own protected origin servers. The research exposes fundamental vulnerabilities arising from seemingly innocuous CDN "back-to-origin" strategies, which are designed to optimize performance and improve user experience. Instead of being a defensive shield, CDNs can be weaponized to generate massive amounts of traffic towards a victim's origin server, effectively bypassing the CDN's own Distributed Denial of Service (DDoS) defenses.
AI review
This is a critical piece of research, exposing a novel class of amplification attacks that weaponize CDNs against their own origin servers. The 'CDN Cannon' isn't just a clever name; it's a stark reminder that performance optimizations often create gaping security holes. The speakers have delivered deep technical insights into how seemingly innocuous back-to-origin strategies, combined with cache-bypassing techniques, can turn a defender's shield into an attacker's amplifier. This isn't theoretical fluff; 11 major CDN vendors confirmed the vulnerabilities, demonstrating the widespread and…