Fig. 3
From: Cloud repository as a malicious service: challenge, identification and implication

Example of the redirection infrastructure leading to the le- gitimate bucket cloudf ront.net d24n15hnbwhuhn (a) and the Bar s3. amazonaws.com cicloudf ront (b), which are in RED color