Serious Discussion Comodo Internet Security 2025 was obliterated by an exploit!

rashmi

Level 13
Jan 15, 2024
650
If you are using a signed PoC, search the "Vendor List" for the vendor. Also, check "HIPS Events" in Logs for the Cloud verdict. Based on this, you can disable features and retest.
 
  • Like
Reactions: simmerskool

vitao

Level 3
Thread author
Mar 12, 2024
148
I'd assume the language we warned you about and how to talk to other members of the forum.
i thought so but it was not anything related to forum users nor disrespect with anyone. it was just one person who, for whatever reason, was frustated about one word used in a setence wich had nothing to do with this user or his feelings, but he was in the need of some attention and tried to change the subject to make this personal. astleast that is what im feeling about it. as feelings are what people take in consideration, maybe my feelings would be taken into it too. no?

see the problem? (i think i manage to explain a little bit more this time).

oh, btw, i apologized for the word even if it was nothing wrong with it. anyway... we are offtopic again.
 

outlawxtorn

Level 6
Verified
Content Creator
May 29, 2017
284
i thought so but it was not anything related to forum users nor disrespect with anyone. it was just one person who, for whatever reason, was frustated about one word used in a setence wich had nothing to do with this user or his feelings, but he was in the need of some attention and tried to change the subject to make this personal. astleast that is what im feeling about it. as feelings are what people take in consideration, maybe my feelings would be taken into it too. no?

see the problem? (i think i manage to explain a little bit more this time).

oh, btw, i apologized for the word even if it was nothing wrong with it. anyway... we are offtopic again.
Agree to disagree; apologies, by the way, for getting you off topic.
 

Bot

AI-powered Bot
Apr 21, 2016
4,599
Great job on finding a solution! This will definitely help many users. If anyone has specific language subtitle requests, feel free to ask.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,681
Thanks. :)(y)
After disabling alerts (silent mode), such a restricted setup can protect children, happy clickers, etc. However, an advanced user (family administrator) must manage false positives. It will work best with signed applications because the signer can be added to the Trusted Vendors list.
Disabling cloud lookup can also prevent inexperienced users from installing new applications, so the family administrator has some control over what is installed on the computer.
 
Last edited:

rashmi

Level 13
Jan 15, 2024
650
According to the Comodo alert, the PoC has a digital signature. It appears the Comodo cloud contains this signature, but the local whitelist does not. As a result, the PoC failed in this test. If you had checked the Comodo logs as I repeatedly suggested, you would have discovered this solution during the first test. The problem with your PoC tests is that you post the results without confirming them.

Nothing new here. What comes next? A PoC uses a certificate on the Comodo local whitelist, alongside a method to disable that whitelist! 😊
 
Last edited:

vitao

Level 3
Thread author
Mar 12, 2024
148
According to the Comodo alert, the PoC has a digital signature. It appears the Comodo cloud contains this signature, but the local whitelist does not. As a result, the PoC failed in this test. If you had checked the Comodo logs as I repeatedly suggested, you would have discovered this solution during the first test. The problem with your PoC tests is that you post the results without confirming them.

Nothing new here. What comes next? A PoC uses a certificate on the Comodo local whitelist, alongside a method to disable that whitelist! 😊
sorry but youre wrong. the exe has certs but the dll hasnt (atleast is seems so). the dll continues to be ignore by cis, cloud lookup, valkyrie, etc. but even win defender can recognize it. so, no, the test is not wrong and there is nothing to check on logs as cis has no proper log for this dll. just that its not recognized but still its allowed to run on default config.

edit.: the confirmation is the file running, ruining personal files and cis doing nothing to prevent it. in this case, with the config changed, cis can prevent the exe to execute but not the dll, so if the exe was with an valid cert vendor (like, lets say, sectigo?), even with this configuration cis would not prevent the exe to run, so...

edit.: and the funny part is cruelsister saying that allowing an ransomware to run is a trivial issue...
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,681
Disabling cloud lookup significantly reduces the possibility of using by the attackers the Trusted (but vulnerable) EXE files to avoid auto-containment. This approach is similar to WDAC or AppLocker policies (strict default-deny, no cloud app reputation). It can also prevent other attack vectors (different from DLL hijacking) when Trusted files are exploited. The shorter the Trusted Vendors list, the smaller the chances of infection.

I do not recommend disabling cloud lookup, except when a "family administrator" has the motivation to protect "computer illiterate" users or when Comodo is used in organizations.
I do not use such a setup, so I cannot exclude the possibility that it might be hardly usable in practice. I think that Comodo users can share some thoughts about it in this thread.
 
Last edited:

Vitali Ortzi

Level 28
Verified
Top Poster
Well-known
Dec 12, 2016
1,764
I do not recommend disabling cloud lookup, except when a "family administrator" has the motivation to protect "computer illiterate" users or when Comodo is used in organizations.
I do not use such a setup, so I cannot exclude the possibility that it might be hardly usable in practice. I think that Comodo users can share some thoughts about it in this thread.
Defeats the purpose I use comodo as the comodo cloud has less false positives then wdac ,Smart App Control etc that are superior in terms of security
Anyway I came to the conclusion the best way to use comodo as a layer to add to av software (it's super light and stops nearly every malware)
And those that want something more restrictive should use built in protection or something like voodooshield
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,681
Cloud Lookup is disabled in this @cruelsister's video:

""


1735299193062.png
 

Vitali Ortzi

Level 28
Verified
Top Poster
Well-known
Dec 12, 2016
1,764
Cloud Lookup is disabled in this @cruelsister's video:

""


View attachment 286898

She disabled it specifically to show the containment blocks the samples in her videos as it was marked as malware
But she doesn't disable cloud lookup in her config
Yes disabling cloud is definitely far more restrictive but makes the product too unusable as it's always a balance between false positives and at that ratio of false positives you're better of using superior built in protections


Anyway really miss cruel sister in this fourm she's absolutely an expert on everything comodo and more
 
Last edited:

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,681
Yes disabling cloud is definitely far more restrictive but makes the product too unusable...

It will be unusable for most MT members. But, it is more usable than Linux, Windows in S Mode, etc. I think that 1/3 (or more) of average users could use it with the help of family administrators. Many people use computers with already installed applications and do not change anything. The problem rather can be a lack of family administrators. :)
When using signed applications, this setup does not produce false positives while the system or applications are updated. In such a case it will be more usable than Smart App Control which can sometimes (partially) block signed updates due to unsigned DLLs.
 
Last edited:

oldschool

Level 85
Verified
Top Poster
Well-known
Mar 29, 2018
7,781
Anyway really miss cruel sister in this fourm she's absolutely an expert on everything comodo and more
She's missing because of this:
I've given up on MT recently as it seems to be overrun by Trolls for only God knows why. I've posted videos about various AM applications (MB, eset, esmisoft, Symantec, etc) being bypassed by malware (and these could be confirmed as the malware was in the Wild) all of which raised barely a peep. but when something trivial is found against Comodo it's like the World is ending
Comodo Internet Security 2025 Beta / Final / Infos Thread
 

vitao

Level 3
Thread author
Mar 12, 2024
148
well, after testing it for the video i continued to use this config on the same vm. i tried to make this vm almost the same as my main computer. after some time using it i understand that its a good way of using cis, but it has more popups and more user decisions to make, and its not a good place for many, but cis just works fine after some ours using it, marking files as trusted, etc. almost like if it was hips in learning mode. but more secure...
 

outlawxtorn

Level 6
Verified
Content Creator
May 29, 2017
284
She disabled it specifically to show the containment blocks the samples in her videos as it was marked as malware
But she doesn't disable cloud lookup in her config
Yes disabling cloud is definitely far more restrictive but makes the product too unusable as it's always a balance between false positives and at that ratio of false positives you're better of using superior built in protections


Anyway really miss cruel sister in this fourm she's absolutely an expert on everything comodo and more
I also miss Cruel; she is THE Comodo expert.
 

rashmi

Level 13
Jan 15, 2024
650
Disabling cloud lookup significantly reduces the possibility of using by the attackers the Trusted (but vulnerable) EXE files to avoid auto-containment. This approach is similar to WDAC or AppLocker policies (strict default-deny, no cloud app reputation). It can also prevent other attack vectors (different from DLL hijacking) when Trusted files are exploited. The shorter the Trusted Vendors list, the smaller the chances of infection.

I do not recommend disabling cloud lookup, except when a "family administrator" has the motivation to protect "computer illiterate" users or when Comodo is used in organizations.
I do not use such a setup, so I cannot exclude the possibility that it might be hardly usable in practice. I think that Comodo users can share some thoughts about it in this thread.
Most users shouldn't disable cloud lookup or whitelists. Instead, I suggest using Comodo Firewall Proactive Security with Microsoft Defender. If you don't use containment, replacing it with blocking unknowns will enhance protection. Experts can remove certain vendors from the trusted vendor list and disable cloud lookup. This will undoubtedly become bothersome, particularly when running unsigned applications without cloud lookup. If Comodo offered an "ask" option for auto-containment alerts, I'd definitely keep core vendors and disable cloud lookup.

My suggestion for most is this.
* Comodo Firewall Proactive Security with Microsoft Defender
(I've opted against antivirus software for my family; Comodo Cloud Signatures offer sufficient "supplemental" protection for practical purposes or real-world scenarios.)
* Auto-Containment blocking unknowns
* Uncheck the first and third options in containment settings
* HIPS disabled
* Firewall blocking incoming connections or stealth mode
* Firewall treating the location as public
* VirusScope disabled or uncheck the third option in VirusScope to monitor applications on the system
(I've turned off VirusScope on my family's systems.)
* Website Filtering disabled
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top