bazang
Level 7
- Jul 3, 2024
- 301
This is how other security software firewalls work as well. They are no different than Comodo. Furthermore, most will not monitor legitimate svchost instances for code injection, for reasons that should be obvious to everybody here. There are only a few instances where AV will monitor for an attack on a svchost process, but nevertheless the firewall behavior remains the same for ALL security software under all circumstances - maliciously injected or not = those security software are not going to block legit svchost processes. Security software rely upon Microsoft's own built-in memory protection mechanisms to safeguard the integrity of legitimate svchost processes.The svchost.exe file is essential for the operation of Windows. Important things to note that a legitimate svchost file is SIGNED by Microsoft and resides in System32 (for 64-bit Windows). Also, it will never attempt to connect out by itself, but Child processes will utilize it to connect out’ but note that these child processes can be either legitimate or malicious.
Regarding Comodo, if Edge (signed and valid) utilizes svchost (signed and valid) to connect to the Net, Comodo will trust both and thereby the connection will be allowed without a peep from Comodo.
However, if a malicious (or unknown) file uses legitimate svchost, Comodo will react on the basis of the CHILD process (that’s why the Data stealer was flagged and stopped from connecting out to malware Command).
There is also the possibility that malware can create a fake svchost (NOT signed) and plop them anywhere on the drive. Such a file will blend in with other running svchost’s in Task Manager so the infective process more or less blends in quite well.
Again, for Comodo, any direct connection out by the mimicked svchost will be prevented as the fake will be regarded as Untrusted (coincidentally my next video-not about Comodo- contains such a malicious process).
Hope this clarifies a bit.
The person who keeps making the same argument about Comodo and "trusted" processes in an attempt to poison it here at MT is willfully, irresponsibly, and immorally misleading readers by not stating and explaining the facts for ALL security software.
The Comodo troll spreading misinformation by omission in an attempt to dissuade people from using Comodo via creation of fear, uncertainty, doubt (FUD).