Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Most of the malware created these days is designed to generate income to the malware authors. That’s not a surprise, but it is amazing how creative these digital criminals can be. At Comodo AV Labs we observe and analyze the many schemes, tricks and methods they use to acquire their ill-gotten gain, including:
Recently, we have observed the rise of a new direct payment scheme where victims are tricked into paying to download freeware software. This is a very attractive approach for cyber criminals. The author does not need to spend the time and money to create a complex application which the user actually needs. They don’t even have to write a fake program that looks real.
After the application is paid for and installed, the user may never suspect anything because the application works as expected. Even if the victim figures out they paid for something they could have gotten for free, the fraudster is not connected to the software and will be almost impossible to trace.
The malware author can launch his scheme with three simple steps. First, a payment method for use in the process is established. This varies, but includes online payment, bank transfer and surcharge SMS services.
Second, they create a custom “pay-to-install” installer that implements the previous set payment service and either wraps the setup of the original software or downloads the legitimate application from a custom location when the payment is made.
Third, they “promote” the application to potential victims. This can be achieved via search engine optimization black hat tricks, methods widely used by the malware authors, via advertisements, spam and more.
We have encountered this type of trickery among some malicious applications we have analyzed. The following information should help users understand the threat and offers some basic rules to avoid getting scammed this way.
Upon execution, the application displays a welcome message and states it is an installer for “Mozilla Firefox 26.0”, the well-known, legitimate and free web-browser.
The next step of the installation brings the user to a screen which states that in order for the application to be installed, a payment has to be made via a surcharge SMS to the number 81126. It promises the user that an installation code will be delivered and the process can continue. If the code is not written in the edit box, installation does not continue.
Extracting the configuration file from the installer reveals some more interesting, and alarming details about the steps it’s taking and also the codes used in the process.
Let’s consider a scenario where the user sends a SMS message to retrieve the installation code.
When this code is written into the edit box, it is verified against the one in the configuration and a message box is displayed, stating that “The first code is valid.
In the next step, input the second of the three required codes. Send a SMS with the text X10 to 81126 and you will receive a message with your installation code.”
In conclusion, it was not one, but three surcharge text message that were needed to be sent in order to retrieve an “installation code”. The first:
Then the second “code”:
After each code input, a report is sent via an http call to record the usage of a valid code. The domain used for this is vox-telecom.com. The website associated with this domain does not have any contact information, company details or who is behind it.
It has all the clues that it’s a set-up meant to give users a shade of trust by using the name of a known company from telecommunication business area.
After user inputs the third code as well, installer proceeds to download the legitimate application installer from softwareapp-pro.s3.amazonaws.com/ uploads/ program_file/file_url/167/ a680381d-79b3-4aa1-b0b0-8d748a09a486/ Firefox%20Setup%2026.0.exe and runs it.
As seen in the snapshot, the digital signature confirms indeed that downloaded application is valid and can be safely installed.After setup is finished, initial installer exists, leaving the user with a newly installed application which was, in fact freeware, but he paid for it.
To avoid such situations, users should always download applications from the vendor’s website or a reputable download site such as download.com. Beware of links promoted via emails, advertisements or website pop-ups.
Also, make a point to check if the application you need is freeware or indeed you need to pay for it. Many paid applications have a trial version which can be tested before buying them, with payment methods described their documentation.
Importantly, beware of software applications that request payment via phone or SMS surcharge numbers upon installation.
But most of all, the best way to be protected from such malware is by installing an efficient antivirus on your system.
Sample details:SHA1: 95606b25cb0f39e27e9cdb30cb4647e2baf4d7feMD5: 255f8ec6eccdb85806cb4a9cad136439Comodo Internet Security detection: TrojWare.Win32.ArchSMS.AB
Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks, many companies today are looking for greater protection of their decentralized computing work environments from their Managed Service Providers (MSPs). As a result, MSPs need to deliver firewall solutions that are designed…
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is increasingly true for EU member states and the organizations that are based in or operate from these countries. The number of cyber-attacks targeting EU member states has risen. The…
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as that of a pandemic. This means that a building doesn’t necessarily have to be demolished or lives have to be lost for an unforeseen event to completely…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP