2). Regarding this bypass- the malware used essentially is 2 components. The POC is the trigger and if allowed to proceed ANY added file, Benign or malicious will also proceed. If the POC is prevented from running, no subsequent payload can proceed.
Here is the original attack flow:
Run POC -> POC can create services outside containment through magic -> Use service(to run curl.exe) to download the payloads ->
-> Use service to run a file trusted by Comodo and do dll hijacking(the bad dll released escaped.txt) -> Run tdsskiller -> Comodo dead
As we can see Comodo did not detect or contain DLL hijacking with bad DLL. It is also common for other AVs, so DLL hijacking popularity is growing.
The modified attack flow:
Exploit (system or benign application) -----> Buffer overflow -----> run shell code ----->
create service ----> use service to download the payloads ----> DLL hijacking (ransomware, info stealer, etc.)
In the modified attack, the malicious code is in the DLL (no other file is used to avoid detection/containment).
Such attack can bypass Comodo without triggering containment, especially when HIPS is disabled or in Safe Mode. The attack is much easier with disabled LUA, because the shell code runs with high privileges. Without this tweak, the exploit needs also another exploit (privilege escalation) to create the service. Exploits without privilege escalation are common. Exploits with privilege escalation are rare and quickly patched.
You are an active member on the Comodo forum, so it would be interesting to ask the Comodo staff why they do not disable LUA to improve the containment in Limited, Restricted, and Untrusted settings.