- Dec 10, 2022
- 542
I still say sandboxie is the best defense when properly used when knowing a file could be malicious or you are savvy enough to use it.
I still say sandboxie is the best defense when properly used when knowing a file could be malicious or you are savvy enough to use it.
Latest Xcitium edition (Xcitium Client Security 13.2.0.9560) exploited by the same poc. RansomFest it seems...
i was thinking on something a little easier. comodo internet security (av + fw), in proactive, reputation as restrict, disable cloud lookup and disable trust softwares installed by trusted installers, what do you think?I think that the attack can be blocked by using only Comodo Firewall (antivirus disabled) and disabling cloud backend:
View attachment 286666
The idea is to trust only the files whitelisted by the user or signed by Trusted Vendors. Other executables will be considered Unrecognized, even if they are trusted by signatures or in Comodo's cloud. This should block most attacks via DLL hijacking.
However, the setup without a cloud backend must be well tested - I am unsure if Comodo can properly recognize the catalog-signed system files (the certificate is not embedded in a system file).
Edit.
This setup can be strengthened with Microsoft Defender + ASR rule "Block use of copied or impersonated system tools (preview)". That rule will prevent using system LOLBins (copied/dropped to UserSpace) vulnerable to DLL hijacking.
i was thinking on something a little easier. comodo internet security (av + fw), in proactive, reputation as restrict, disable cloud lookup and disable trust softwares installed by trusted installers, what do you think?
yep. ill try this but i suspect this would not bring any difference, but hey! why not!It is worth trying.
yep. ill try this but i suspect this would not bring any difference, but hey! why not!![]()
sorry. i cant. i made a promisse for the dev.@vitao
If you'll share the sample, POC, I'll do my own investigation in detail on multiple settings for Xcitium and Comodo products, and results will be shared with everyone here.
It's possible that, with cloud, rating, and trust options disabled in file rating settings, all non-Windows/non-OS features or programs will run within Comodo containment.i was thinking on something a little easier. comodo internet security (av + fw), in proactive, reputation as restrict, disable cloud lookup and disable trust softwares installed by trusted installers, what do you think?
Aahh, Comodo Cloud AV. Loved this program. I thought it better than CFW back then. I haven't used it since it was discontinued, and wasn't aware it still functioned on Win 11.@vitao
You may test Comodo Cloud Antivirus (https://download.comodo.com/ccav/installers/ccav_installer.exe) if it's possible. Despite being a discontinued (2019) product, it still functions on Windows 11, as I just installed and tested it. From what I recall, CCAV has a limited vendor list, comparable containment to CIS proactive security, and a few built-in protection measures. It does not have HIPS. It would be refreshing to see how it performs against your POCs.
View attachment 286681
Any IoC, SHA of the sample?sorry. i cant. i made a promisse for the dev.
Comodo 2025 cloud lookup uses Valkyrie, according to staff. Comodo Cloud AV's Valkyrie component delivered verdicts on unknown files. I received Valkyrie verdicts for some unknown files. Valkyrie's effectiveness as protection would have improved with continued CCAV. I extensively tested the Valkyrie website previously, and its performance was impressive, with negligible false positives. Valkyrie, if successfully implemented, has the potential to improve Comodo's detection significantly. However, Comodo primarily focuses on application whitelisting and containment, and the other modules are secondary. Whitelisted malware can make these modules or Comodo ineffective. I can't remember if Comodo AV, Cloud AV, or VirusScope scans whitelisted or trusted files.interject question re Valkyrie (or does it have new name or URL) since it is a comodo service and Cloud AV was mentioned by @rashmi. I do have CF2025 on VM with cruelsister settings, and that VM is tight & light. I even have paid CIS license but don't use it (r&dfc) -- does comodo have cloud analysis platform? I went to valkyrie site (I have a login) and it asks for file upload and then it spins & spins and nothing ever happens beyond that. Occasionally here I see reference to comodo cloud analysis, but I'm not successful using now a days, but I used to use it in the past. Anyone know?
good info thanks, but is the a web portal to upload a suspicious file from browser that works, there used to be, but I'm not finding it anymore...Comodo 2025 cloud lookup uses Valkyrie, according to staff. Comodo Cloud AV's Valkyrie component delivered verdicts on unknown files. I received Valkyrie verdicts for some unknown files. Valkyrie's effectiveness as protection would have improved with continued CCAV. I extensively tested the Valkyrie website previously, and its performance was impressive, with negligible false positives. Valkyrie, if successfully implemented, has the potential to improve Comodo's detection significantly. However, Comodo primarily focuses on application whitelisting and containment, and the other modules are secondary. Whitelisted malware can make these modules or Comodo ineffective. I can't remember if Comodo AV, Cloud AV, or VirusScope scans whitelisted or trusted files.
good info thanks, but is the a web portal to upload a suspicious file from browser that works, there used to be, but I'm not finding it anymore...![]()
Thanks, the webpage looks like the upload page I tried a day or 2 ago, but uploaded file just seemed to spin in a loop... Just tried again with 3.5 mb file and I got: 500 oops! something went wrong. we are fixing it please come back in a while... BUT just tried a URL and it seems to be working for that...![]()
Valkyrie Verdict
KNow what is safe, and what is malware with Valkyrie Verdict - your free analysis service for files and websites.verdict.valkyrie.comodo.com