Serious Discussion Comodo Internet Security 2025 was obliterated by an exploit!

bazang

Level 10
Jul 3, 2024
458
Why do people who want Comodo to be a more refined product not establish and promote a GoFundMe for the product?

Or suggest to Melih that he create a GoFundMe?

The fundamental issue with the product is a very simple one to understand: Melih owns the product, it generates virtually no revenue, and since Day 1 he as spent millions of his own money to subsidize the product and give it away. Well, he's not willing to spend any more on the product other than to keep it alive. There is no dedicated development team for the source code, and that means there is nobody to fix bugs and make the product more polished.

Without a revenue stream to support its development, Comodo will never be any better than it is right now. Without bringing in substantial money, it shall always be a 1000-bug, broken feature freeware.

Tip: Melih will never accept GoFundMe funds because he does not want to be obligated to end users to fix stuff. He is perfectly OK with the product as it is now. He has no aspirations to make it as polished as other security software. in fact, Melih's belief is that the product is fine as it is. The entire point of CIS\CFW is that a freeware does as good, if not better than, most other security software even with 1000 bugs and other problems. Melih is not wrong in this regard.

I think a lot of end users do not understand that Comodo is Melih's ideological play-thing. He created it to prove an ideological point within a software publishing industry that he believes to be wrong and which he deeply despises. He did not create Comodo to satisfy users.

When you understand all of this, then you realize why the product is as it is and that it shall never be any better than it is at this very moment.
 
Last edited by a moderator:
  • Like
Reactions: Sorrento

vitao

Level 4
Thread author
Mar 12, 2024
167
Why do people who want Comodo to be a more refined product not establish and promote a GoFundMe for the product?

Or suggest to Melih that he create a GoFundMe?

The fundamental issue with the product is a very simple one to understand: Melih owns the product, it generates virtually no revenue, and since Day 1 he as spent millions of his own money to subsidize the product and give it away. Well, he's not willing to spend any more on the product other than to keep it alive. There is no dedicated development team for the source code, and that means there is nobody to fix bugs and make the product more polished.

Without a revenue stream to support its development, Comodo will never be any better than it is right now. Without bringing in substantial money, it shall always be a 1000-bug, broken feature freeware.
but who said that?

comodo is lucrative as xcitium as itariam as valkyrie, as any other softwares from melih company.

the problem is really simple. they dont have people who know how to solve the issues and what they have are looking at xcitium. the prove of it is that the same exploit/poc that destroys cis containment do the same with xcitium and there is no response from xcitium nor comodo about it. the flaw exists. its a big problem. xcitium users, who are the paid ones, are not secured and even so, they dont get any update regardless this...
 
  • Thanks
  • Like
Reactions: Sorrento and kylprq

bazang

Level 10
Jul 3, 2024
458
but who said that?

comodo is lucrative as xcitium as itariam as valkyrie, as any other softwares from melih company.

the problem is really simple. they dont have people who know how to solve the issues and what they have are looking at xcitium. the prove of it is that the same exploit/poc that destroys cis containment do the same with xcitium and there is no response from xcitium nor comodo about it. the flaw exists. its a big problem. xcitium users, who are the paid ones, are not secured and even so, they dont get any update regardless this...
Comodo products are not lucrative. They are what is called "loss leaders." Melih gives them away for free or charges very low subscription rates. That means he is selling them at a loss.

There are no dedicated Comodo developer teams! There never has been.

Here are the facts about Comodo's security products:

The fundamental issue with the product is a very simple one to understand: Melih owns the product, it generates virtually no revenue, and since Day 1 he has spent millions of his own money to subsidize the product and give it away. Well, he's not willing to spend any more on the product other than to keep it alive. There is no dedicated development team for the source code, and that means there is nobody to fix bugs and make the product more polished. Without a revenue stream to support its development, Comodo will never be any better than it is right now. Without bringing in substantial money, it shall always be a 1000-bug, broken feature freeware.

Melih earns virtually all of his money from digital certificates, venture capital and other services. He earns virtually $0 from Comodo security software.

Comodo companies do not operate like Avast, Bitdefender, Kaspersky and Norton. I don't blame people who do not understand this fact. It takes a lot of research to figure it out.

Melih has no obligation to fix anything. Anybody that installs Comodo software, the EULA says clearly "You accept this software AS IS and you use it at your own risk." This is true of every last software EULA out there. So Comodo is no different.

All Comodo software, including Xcitium, are very unprofitable for Melih. He loses money on them all. So that means he is personally subsidizing all these software out of his own pocket. CIS\CFW were never profitable. They have always been freeware.
 
Last edited:

Loyisa

Level 1
Aug 8, 2024
20
UPDATE: Fixed in Xcitium
This is not a Comodo config issue, but a containment security infrastructure issue, and you will have to wait for a CIS update to fix this.
So adding *\Device\NamedPipe\ntsvcs to protected files or protected com is currently useless until CIS gets a security update.
QQ20241119-231504.png
 

bazang

Level 10
Jul 3, 2024
458
What about andy ful challenge did they contact Andy to work on fixing it ?
Why would anybody contact @Andy Ful ?

Submit bug report on COMODO forum. If it is fixed then great. If not, then ¯\_ (ツ)_/¯ . A person either accepts it or does not.

People/users want stuff fixed, but nobody is willing to pay for the fixes. That means COMODO will never be any better than it is at this moment.

Melih's philosophy is "If you want something for free, then you will have to accept whatever I decide to give you. If not, go use something else. Please because I do not want to be bothered with ungrateful, whiny, complaining users."
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,743
What about andy ful challenge did they contact Andy to work on fixing it ?

No, they did not.
I use a different method that does not trigger containment. It is not exactly an exploit, but rather taking advantage of AVs ignoring some known (and unknown but signalized) attack methods until they are sufficiently prevalent. Furthermore, some methods are hard to fix, like DLL hijacking. Most AVs try to fight it by improving DLL detection, which is insufficient in targeted attacks.
In the case of Comodo, the attack that exploits vulnerable but trusted EXE can be especially successful due to two weaknesses:
  1. Poor detection of weaponized DLLs.
  2. Poor detection of some UAC bypasses.
At the same time, Comodo can block most attacks in the wild via Auto-containment and Script Analysis modules. So finally, the attacker must know that the target uses Comodo to have fair chances to pass by the protection.
 
Last edited:

Vitali Ortzi

Level 29
Verified
Top Poster
Well-known
Dec 12, 2016
1,885
sorry but its not fixed. you tested it with poc v2. try it with poc v3. cis continues to be r@ped by the poc, so they didnt solve anything...
Please show it with video evidence and post on the fourm or someone else upload it if you're banned
 

Vitali Ortzi

Level 29
Verified
Top Poster
Well-known
Dec 12, 2016
1,885
No, they did not.
I use a different method that does not trigger containment. It is not exactly an exploit, but rather taking advantage of AVs ignoring some known (and unknown but signalized) attack methods until they are sufficiently prevalent. Furthermore, some methods are hard to fix, like DLL hijacking. Most AVs try to fight it by improving DLL detection, which is insufficient in targeted attacks.
In the case of Comodo, the attack that exploits vulnerable but trusted EXE can be especially successful due to two weaknesses:
  1. Poor detection of weaponized DLLs.
  2. Poor detection of some UAC bypasses.
At the same time, Comodo can block most attacks in the wild via Auto-containment and Script Analysis modules. So finally, the attacker must know that the target uses Comodo to have fair chances to pass by the protection.

No, they did not.
I use a different method that does not trigger containment. It is not exactly an exploit, but rather taking advantage of AVs ignoring some known (and unknown but signalized) attack methods until they are sufficiently prevalent. Furthermore, some methods are hard to fix, like DLL hijacking. Most AVs try to fight it by improving DLL detection, which is insufficient in targeted attacks.
In the case of Comodo, the attack that exploits vulnerable but trusted EXE can be especially successful due to two weaknesses:
  1. Poor detection of weaponized DLLs.
  2. Poor detection of some UAC bypasses.
At the same time, Comodo can block most attacks in the wild via Auto-containment and Script Analysis modules. So finally, the attacker must know that the target uses Comodo to have fair chances to pass by the protection.
Can comodo under user account with a separate admin stop all of your attacks , known ones and what recommendations you have for comodo users (I have a low end system where even defender and eset are too heavy )
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,743
Can comodo under user account with a separate admin stop all of your attacks , known ones and what recommendations you have for comodo users (I have a low end system where even defender and eset are too heavy )

The AV Challenge attack on the Standard User Account (SUA) will trigger the UAC Credential Prompt. If the user does not insert credentials, the attack will be blocked. When using SUA, most malware (including ransomware) are often less dangerous.
But, Comodo is still vulnerable to attacks via DLL hijacking. Examples of such attacks can be found in the wild against organizations, like PlugX RAT, AsyncRAT, or Kransom mentioned here:

However such examples are rare. In most cases, the attacks also use scripting that can be mitigated via Comodo's Script Analysis (tweaked). If the non-enterprise user wants to increase Comodo's protection against such threats, tweaking Script Analysis settings could help.
 
Last edited:
  • +Reputation
Reactions: simmerskool

vitao

Level 4
Thread author
Mar 12, 2024
167
It is not necessary. The POC mentioned by @vitao does not trigger containment (contrary to the first POC) and the Comodo fix is only related to the containment escape.
on my testings it seems containment continues to just ignore but there is something new: the dll (the ransom itself) shows at unrecognized list but not blocked not prompted for user decision, so it seems its the containment being evaded here, right? or am i getting it wrong?

ive already recorded the video with the test but i need to record the part with my talkings. ill try to do it by the weekend.

edit.: one thing that needs to be noted here. the dll is the ransomware itself and windwos defender block it by recognizing it as malicious but comodo antivirus just plays the dumb and ignores it. even kingsoft can recognize it as malware but cis... funny right?

edit2: the video testing it will have 2 parts. one showing the new cis with its default config. in the second one cis is with cruelsister config tweaked by me and with the part that loyisa said that had to be changed, the script analys that i checked every damn option there.

in both scenarios cis is r@ped by the poc in its v3. in both scenarios uac is turned off by windows settings (not by regedit, so its not fully off as many knows). i tried with uac on and the result was the same but as it was a short attempts it is not on the full video recorded before :p
 
  • Applause
Reactions: Vitali Ortzi

vitao

Level 4
Thread author
Mar 12, 2024
167
The AV Challenge attack on the Standard User Account (SUA) will trigger the UAC Credential Prompt. If the user does not insert credentials, the attack will be blocked. When using SUA, most malware (including ransomware) are often less dangerous.
But, Comodo is still vulnerable to attacks via DLL hijacking. Examples of such attacks can be found in the wild against organizations, like PlugX RAT or AsyncRAT mentioned here:

However such examples are rare. In most cases, the attacks also use scripting that can be mitigated via Comodo's Script Analysis (tweaked). If the non-enterprise user wants to increase Comodo's protection against such threats, tweaking Script Analysis settings could help.

Maybe you can help me a little bit.

In an recent video showing cis 2025 (the previous one) with its default config against 200 new malwares i was surprised by one little fella who bypasses everything but its marked in virustotal by many as malware. Can you say something about this file? After I did the testings I was going to record another video so i decided to update the malwares used on the tests and i forgot to save this file. now i can not find it anywhere to download it for study.

the video:

the sha256 of the file: 75d96dfe70912f3f2c5b669ebac010a83904daea9a908c5352063f1508d8ed58

edit> nvm. i just found the file on tria ge... :) ill do some more testings on it but if anyone can talk a little about this one ill be vary glad :D
 
  • Like
Reactions: Andy Ful

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,743
on my testings it seems containment continues to just ignore but there is something new: the dll (the ransom itself) shows at unrecognized list but not blocked not prompted for user decision, so it seems its the containment being evaded here, right? or am i getting it wrong?

The containment was evaded because it was not triggered at all. The DLL is considered Unrecognized because it was scanned, and Comodo did not know it.
Comodo (by default) does not auto-contain trusted files and DLLs loaded by them, and the EXE used in the attack (StarRail.exe) is a well-known and trusted EXE from the original benign game. That is how DLL hijacking works: the EXE file must be well-known and benign.
 
Last edited:
  • +Reputation
Reactions: simmerskool

vitao

Level 4
Thread author
Mar 12, 2024
167
The containment was evaded because it was not triggered at all. The DLL is considered Unrecognized because it was scanned, and Comodo did not know it.
Comodo (by default) does not auto-contain trusted files and DLLs loaded by them, and the EXE used in the attack (StarRail.exe) is a well-known and trusted EXE from the original benign game. That is how DLL hijacking works: the EXE file must be well-known and benign.

hmmm.. so.. if this kind of thing goes live and people target cis users, just for fun, god help us... as comodo doesnt seems to care too much... right?
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,743
Maybe you can help me a little bit.

The PowerShell script (detected by Kaspersky) was blocked by Comodo via Script Analysis. The PowerShell CmdLine was converted to PS1 script and copied to C:\ProgramData\Comodo\Cis\tempscript folder.
 
  • +Reputation
Reactions: simmerskool

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top