Comodo Auto-Sandbox -- as good as an anti-executable?

Status
Not open for further replies.

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
How well does Comodo Auto-Sandbox lock down a system?
I am running Comodo Firewall free version, without anti-virus component.
unrecognized applications are set to run virtually, and I have set location to : any
config is: Firewall Security
besides all that, I am manually running my browser in comodo sandbox.

Am I overdoing it?

Does turning on HIPS significantly improve protection?

Windows 10 x64
Webroot SecureAnywhere 2016
HitmanPro.Alert
 
I

illumination

1. Am I overdoing it?

2. Does turning on HIPS significantly improve protection?

Judging by your set up of the autosandbox, you have looked at cruelsisters recommended settings, and if so, you should know she disables the HIPS.

1. No, that should cover you, the strength of CIS or CFW is its sandbox, it is basically the backbone of the product.

2. Turning on Hips provides another layer yes, but will in the end only significantly improve the amount of time you will be spending answering pop ups. The auto sandbox already has you covered with the settings you have it at.
 
Y

yigido

Please turn on "Proactive Security" configuration under settings
Restart PC
Disable HIPS (agreed to @illumination words about HIPS)

You will have auto-sandbox with a whitelist (local & cloud).. unknowns goes to sandbox. Infection? Forget about it :)
ahh by the way, you have cloud antivirus in free firewall too ;)
 

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
I noticed that the shared folder, where the downloads go, is only partially virtualized.
If I try to open an exe file it is blocked, but if I open a Word file or a PDF file, it opens unsandboxed
Isn't that a security problem? One of the most common attack vectors is through a Word file or PDF file that has malicious code.
 
  • Like
Reactions: Dirk41 and 1qay1qay

1qay1qay

Level 1
Verified
Apr 17, 2016
36
in time that you wait on HIPS to protect you youre files are normal already encrypted, so as other says sandbox and block for every unknown files ... block not run virtualized . For prof and deep explaination follow cruelsis video channel on youtube
 

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
in time that you wait on HIPS to protect you youre files are normal already encrypted, so as other says sandbox and block for every unknown files ... block not run virtualized . For prof and deep explaination follow cruelsis video channel on youtube
the english was a little hard to understand, but I think you were saying that it's a waste of time to go through the whole HIPS rigmarole on sandboxed files. Right. Better to just turn off HIPS.
 
  • Like
Reactions: 1qay1qay
Y

yigido

the english was a little hard to understand, but I think you were saying that it's a waste of time to go through the whole HIPS rigmarole on sandboxed files. Right. Better to just turn off HIPS.
While you are using fully automatic sandbox with whitelist.. you do not need the HIPS. It will just pop you more alert. Without HIPS, firewall will be moree silent ;) Run a rating scan with CFW and send the unknown files to Comodo for whitelisting, with this way you will help the community and your own setup ;)
 
  • Like
Reactions: 1qay1qay

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
While you are using fully automatic sandbox with whitelist.. you do not need the HIPS. It will just pop you more alert. Without HIPS, firewall will be moree silent ;) Run a rating scan with CFW and send the unknown files to Comodo for whitelisting, with this way you will help the community and your own setup ;)
But in file rating, one should consider turning off trusting digital signatures.
 
  • Like
Reactions: 1qay1qay
Y

yigido

But in file rating, one should consider turning off trusting digital signatures.
Did you mean you want to turn off 'trusting digital signatures' ?
Then, you will get too much sandboxed files, processes.. even Microsoft one.. Your system will be unusable.. Just a warn from a friend.
 
  • Like
Reactions: Dirk41 and 1qay1qay

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
Did you mean you want to turn off 'trusting digital signatures' ?
Then, you will get too much sandboxed files, processes.. even Microsoft one.. Your system will be unusable.. Just a warn from a friend.
you can leave on "trust files installed by trusted installers". That will give you a more limited trust list .
 
  • Like
Reactions: 1qay1qay
Y

yigido

you can leave on "trust files installed by trusted installers". That will give you a more limited trust list .
Those list collected and the list has very strict rules. While using KIS, if a file digitally signed.. KIS trusts it. But many adware have digital signature these days. Comodo trusted vendors are huge and it will increase the usability of auto-sandbox. For example, using privatefirewall, it has very small list of vendors and it is harder to use than Comodo.
But you can still remove the any vendor from Comodo trusted vendors that you do not like.
 
  • Like
Reactions: 1qay1qay

1qay1qay

Level 1
Verified
Apr 17, 2016
36
sorry for my bad English - but basically yes - my point is that best protection today is "default deny" and block all unknown files ... but problem arise if malware will start to use digicert ... as gov spyware already use digi cert i suppose ... they found a guy in China last month that "lease" his state mobile company cert to malware group to sign an app .... i really dont know what to do anymore ... if we block "verified publisher" windows will break down with todays realtime updates policy .... and there is newest problem with filleless infections via Angular exploit kit (ok, filleless concept is not new and it was around before, but this time is weaponized and idiotproof three-click exploit readay on sale for xxx € to anyone )... Did anyone test this memory hijacking concept - do this infection at some point use disk to store payloadit or not ... if not, then this can not be stopped with sandboxing and anti-exe policy.
 
  • Like
Reactions: cruelsister

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
you can turn off trusted vendors, and leave on trusted installers. That should save you from the common criminals. The big governments are not looking for you anyway.

to protect from the exploits, add an anti-exploit like HitmanPro.Alert.
 
  • Like
Reactions: 1qay1qay

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
this got repeated, I don't know why...
 

1qay1qay

Level 1
Verified
Apr 17, 2016
36
"turn off trusted vendors, and leave on trusted installers" ... i will try that :)

Regard exploit i use Heimdal pro on all computers as url filter and local DNS + Yandex as offline DNS ... lets hope to the vest
 
  • Like
Reactions: cruelsister
H

hjlbx

sorry for my bad English - but basically yes - my point is that best protection today is "default deny" and block all unknown files ... but problem arise if malware will start to use digicert ... as gov spyware already use digi cert i suppose ... they found a guy in China last month that "lease" his state mobile company cert to malware group to sign an app .... i really dont know what to do anymore ... if we block "verified publisher" windows will break down with todays realtime updates policy .... and there is newest problem with filleless infections via Angular exploit kit (ok, filleless concept is not new and it was around before, but this time is weaponized and idiotproof three-click exploit readay on sale for xxx € to anyone )... Did anyone test this memory hijacking concept - do this infection at some point use disk to store payloadit or not ... if not, then this can not be stopped with sandboxing and anti-exe policy.

  1. Clean install your OS
  2. Clean install desired softs
  3. Install anti-executable or software restriction policy
  4. Don't use Trusted Vendors (if paranoid)
It is also recommended:
  • Run exploitable\abusable programs and process with limited file system and registry access rights
You should be safe except in case you are targeted - which, in that case, you won't be able to protect your system no matter what security softs you use...

* * * * *

It's not that difficult. You can accomplish this with either AppGuard, ReHIPS or COMODO.
 
Last edited by a moderator:

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
  1. Clean install your OS
  2. Clean install desired softs
  3. Install anti-executable or software restriction policy
  4. Don't use Trusted Vendors (if paranoid)
It is also recommended:
  • Run exploitable\abusable programs and process with limited file system and registry access rights
You should be safe except in case you are targeted - which, in that case, you won't be able to protect your system no matter what security softs you use...

* * * * *

It's not that difficult. You can accomplish this with either AppGuard, ReHIPS or COMODO.
there always has to be an attack vector.
so if you sandbox your browser, use only web mail, and open your downloaded files in sandbox, I can't figure out how you are going to get infected -- unless you are targeted, like you said. With gmail and other webmail services, you can open most attachments in a webpage, in order to read it or view it or print it. So you usually don't even have to download anything.
 

cruelsister

Level 42
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,147
Shmu- Remember that a Word document (or a Excel sheet) to be malicious would have a script (macro) attached to it; popular now are Powershell macros contained within Office docs. When things like these are run in Comodo although the document itself could be fine and be opened, the macro, being unsigned will be sandboxed. Most likely the whole thing would just show up as an error to open.
The best way to protect against this sort of thing (whether the macro is signed or unsigned) is independent of any anti-malware application. Just do not enable macros in either Micrososft Office or Apache Open Office and disable powershell (which is the most popular recently) in Windows.

Finally I don't want to comment on signed malware right now as it will be covered in the current RAT video series.

Really finally- 1qay- Thank you for joining MalwareTips!!!! It's like you read my mind. The issue of governments either strong-arming legitimate software companies to "share" their certificates, or by setting up companies themselves that produce legitimate software with a secret surprise coded within is something that is never ever discussed but is a grave concern for those with a need to know.
 

shmu26

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
Shmu- Remember that a Word document (or a Excel sheet) to be malicious would have a script (macro) attached to it; popular now are Powershell macros contained within Office docs. When things like these are run in Comodo although the document itself could be fine and be opened, the macro, being unsigned will be sandboxed. Most likely the whole thing would just show up as an error to open.
The best way to protect against this sort of thing (whether the macro is signed or unsigned) is independent of any anti-malware application. Just do not enable macros in either Micrososft Office or Apache Open Office and disable powershell (which is the most popular recently) in Windows.

Finally I don't want to comment on signed malware right now as it will be covered in the current RAT video series.

Really finally- 1qay- Thank you for joining MalwareTips!!!! It's like you read my mind. The issue of governments either strong-arming legitimate software companies to "share" their certificates, or by setting up companies themselves that produce legitimate software with a secret surprise coded within is something that is never ever discussed but is a grave concern for those with a need to know.
very interesting. I didn't know that the macro could be sorted out from the actual office doc. I thought the authors obfuscated the code enough so it didn't appear as malicious.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top