First off, I LOVE the presentation style of the video! Easy to view, easy to understand.
The main question that I have is if the Script Analysis function of Comodo was enabled. Having it enabled (checked) is essential and was demonstrated in a video I did ~6 months ago ("The Importance Of Comodo's Script Analysis").
If it was indeed enabled then this would be problematic.
Could it be executed as plain zero-day code instead?
I was interested in putting it on VMware win10, but for unclear reasons before I downloaded it, xcitium sales people started calling me to the point of annoyance. I backed away.Xcitium is the best AV
I'm no expert, but I wonder if the attack is like those that users posted in the past where the developers replied something like "Comodo allowed the user started...). I don't remember the developer's words or response, but it was like the @ErzCrz response in post #9: " if a unknown file executed a cmd or svchost or any other program that could execute the code to disable the virtualization that both the unknown file an any process or file launched by that unknown file would be Contained. Sure, a user can run that cmd line they create on their own"Yes, it was enabled. The attack vector does not use scripts. I used a shortcut with CmdLines, and this could bypass Comodo's script analysis.
Of course, I tried scripts, but they were contained by Comodo. Also, the attack was blocked when I used PowerShell instead of CMD.
Comodo has a clever method to block PowerShell CmdLines. The CmdLine is converted to .PS1 script. The script is analyzed by Comodo and contained.
I have used Comodo Antivirus Cloud in the past with all these settings enabled (blocking cmd etc) and never ran into an issue. Comodo Cloud AV also had the containment / virtualization module of CISIt seems that it doesn't ring the Alarm-Bells at Comodo's, it not even worries them so it seems...
I wonder if script analysis would have blocked the attack like PowerShell if, like PowerShell, "Embedded Code Detection" was enabled for CMD under Script Analysis - Runtime Detection.
View attachment 282093
forums.comodo.com
Regarding mentioned video. Here HIPS module not only deny any malicious cmd execution but also protects CIS internal processes, keys, files etc. So here the analyst disabled it first using admin rights. After that point, none of the sensitive processes, keys, files are protected. I think “disable CF” script also writes to registry to stop cmdvirth.exe thats why he required a restart at that point. So basically he is also stopping containment too.
So if HIPS was not disabled by admin at first place, this case wont happen anyway. Even if that state if an Unknown application launching CMD, CIS would contain it whereas the user is launching it themselves.
So Its not a programmatic attack but user himself, on the computer is turning things off.
As I mentioned in my post #28, "if the attack is like those that users posted in the past where the developers replied something like (Comodo allowed the user started...)"Response of @ozer.metin (Comodo Staff- Chief Innovation and Technology Officer)
![]()
Comodo Bypass by CMD file
App Review - The Comodo’s challenge. | MalwareTips Forums In this conversation, a user manages to stop Comodo services using a CMD shortcut. as he describes in conversation. He said he is willing to help Comodo if they want to fix the problem.forums.comodo.com
Not many, but you do not know which should be blocked. Furthermore, some external LOLBins can do the same.I suppose there's the option of adding all the .exe's under Win/System32 folder so they're all covered though I don't know what impact that would have. How many of them would be able to execute such a code really?
Yes, no AV is infallible, but to be fair, this was not a bypass of Comodo, as responded by the team. They clearly mentioned how Comodo treats the command execution.It makes me happy to see a video of Comodo being bypassed by a developer
And yes, unfortunately, Comodo is clearly not infallible (no AV is anyway).
Just that it's pretty easy to bypass the Sandbox. I did it once a while ago by stealing the digital signature of a well-known program.
I don't know if it's been corrected now...
So when I see comments like "Comodo is the best antivirus" already there is NO such thing because NO antivirus will protect 100%.
Response of @ozer.metin (Comodo Staff- Chief Innovation and Technology Officer)
Regarding mentioned video. Here HIPS module not only deny any malicious cmd execution but also protects CIS internal processes, keys, files etc. So here the analyst disabled it first using admin rights. After that point, none of the sensitive processes, keys, files are protected.
Response of @ozer.metin (Comodo Staff- Chief Innovation and Technology Officer)
I think “disable CF” script also writes to registry to stop cmdvirth.exe thats why he required a restart at that point.
Response of @ozer.metin (Comodo Staff- Chief Innovation and Technology Officer)
Even if that state if an Unknown application launching CMD, CIS would contain it whereas the user is launching it themselves.
Yes, this is what the team meant. Also, the team meant Comodo would prevent such an attack from an unknown program even if HIPS was in the disabled state.What do we learn from Comodo's response?
When HIPS was enabled with Proactive config then this attack would have failed?