Comodo Internet Security 2025 does not contain RANSOMWARE (bypass, infection and lost of files)

vitao

Level 3
Thread author
Mar 12, 2024
110
Here is a post on the Wilders Security forum related to this thread:
https://www.wilderssecurity.com/thr...final-infos-thread.453843/page-3#post-3218351

I must partially agree with @cruelsister. The readers might wrongly understand the interesting POCs and discussions here because of very different viewpoints. I saw a similar situation when reading interesting threads about bypassing Microsoft Defender and other AVs. Whenever the bypass was presented, some people were convinced that AV was not enough, and willing to change it to another one. Such a reaction is natural but mainly irrational. Let's not be fooled by emotions.
The POCs and bypasses have a much smaller impact on security than hundreds of new malware variants, that bypass AVs each day due to the limitations of Machine Learning.
Currently, the Malware-As-A-Service is sufficiently prevalent and malware is often prepared to bypass the protection of most AVs.
  1. People who use Comodo should not be surprised that it can be bypassed. Auto-containment is not a perfect solution.
  2. Users should not think that other AVs can protect better because someone presented some of Comodo's bypasses or POCs.
It is better to see an AV like a human immune system. It is not intended to protect any cell in the body but to prevent infecting many cells.
well, i didnt see the topic you mentioned but i agree with you. i usualy come here to bring some tests with cis showing poc evading containment, ransonware being trusted, etc., but i still have cis as main protection. every software has flaws. i guess that the problem with cis is the delay comodo has to "do something" when needed :p
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top