Serious Discussion Comodo Internet Security 2025 was obliterated by an exploit!

rashmi

Level 13
Jan 15, 2024
646
The default files seem to be OK for most users. Using the "All applications" group includes all possible executable types blocked by Comodo, but increases the number of alerts.
Do you mean only the "executables" file group is sufficient?
 

vitao

Level 3
Thread author
Mar 12, 2024
147
YES Xcitium has finally improved signatures i told the guy to improve the signatures on comodo forums the FlorinG guy and he actually listened to me and improved it
i saw this during the test too but as it was about the virus signatures i decided to not mention it on the video but im going to produce a new video about these sites that provide samples and that vendors looking into these and updating their signatures by using these samples is making pointless av testes with malwares downloaded from these same sources. its time to focus on really zero day only...

anyway, did you notice the virus signature testing? its a shame as there is no dif between the full or the lite dbs... so why promote it? just to have a lighter file on hd?
 

rashmi

Level 13
Jan 15, 2024
646
I mean that it has a good balance between usability and security.
I'll make a new file group and add the files from the executables file group to it. In a previous post, you noted the absence of MSI in the executables file group. If I remember correctly, Comodo had a bug where it didn't run unrecognized MSI files in containment. I'm uncertain whether they've resolved the issue. In the custom file group, should I include the MSI file or any files from the "pseudo file downloaders" group?
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,681
In the custom file group, should I include the MSI file or any files from the "pseudo file downloaders" group?

You can but it seems that most "Pseudo File Downloaders" are included in Script Analysis. I did not test it, so I do not know the difference.
It is also possible to create a new group for executable types to be whitelisted. Next, this group can be probably used to whitelist some executable types (*.tmp, etc.) while using "All Applications" group.
 
Last edited:

rashmi

Level 13
Jan 15, 2024
646
You can but it seems that most "Pseudo File Downloaders" are included in Script Analysis. I did not test it, so I do not know the difference.
It is also possible to create a new group for executable types to be whitelisted. Next, this group can be probably used to whitelist some executable types (*.tmp, etc.) while using "All Applications" group.
Yes, a "whitelist" file group is possible. I believe, in containment, we can set the "whitelist" group as "ignore" and place the rule above the "all applications" rule. Which files should we whitelist to achieve a balance between usability and security?
 
  • Like
Reactions: simmerskool

rashmi

Level 13
Jan 15, 2024
646
Executables not used as initial attack vectors. For now, I would ignore *.tmp files.
I successfully tested a new "whitelist" (*.tmp) file group using the latest Ant Download Manager Beta. Unlike the default containment rule, Comodo's "all applications" 1-hour limit prevented the containment of AntDM and antCH files when launched.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top