Comodo Cybersecurity: Difference between revisions
Removed Biblioraphy section points dead link & include portal section |
No edit summary Tags: Mobile edit Mobile web edit |
||
(218 intermediate revisions by more than 100 users not shown) | |||
Line 1: | Line 1: | ||
{{Short description|Software company in United Kingdom}} |
|||
{{mi| |
|||
{{Tone|date=July 2024}} |
|||
{{Cleanup rewrite|date=January 2025}} |
|||
{{Copy edit|date=January 2025}} |
|||
{{More citations needed|date=January 2025}} |
|||
{{Unreliable sources|date=January 2025}} |
|||
}} |
|||
{{Use dmy dates|date=June 2019}} |
|||
{{Infobox company |
{{Infobox company |
||
| name |
| name = Xcitium |
||
| former_name = Comodo Security Solutions, Inc. |
|||
| logo = File:Comodo logo.png |
|||
| logo = Comodo Cybersecurity.png |
|||
| logo_size = 200px |
|||
| logo_size = |
|||
| type = [[Privately held company|Private]] |
|||
| type = [[Privately held company|Private]] |
|||
| slogan = Creating Trust Online |
|||
| industry = [[Computer software]] |
|||
| foundation = [[United Kingdom]] ({{Start date|1998}})<ref name="ukfounding"/> |
|||
| foundation = [[United Kingdom]]<br>({{Start date and age|df=yes|1998}})<ref name="ukfounding"/> |
|||
| hq_location = 1255 Broad Street |
|||
| hq_location_city |
| hq_location_city = [[Clifton, New Jersey]] |
||
| hq_location_country = |
| hq_location_country = United States |
||
| area_served = Worldwide |
|||
| key_people = [[Melih Abdulhayoğlu]] ([[President]] and [[Chief executive officer|CEO]]) |
|||
| key_people = [[Melih Abdulhayoğlu]] ([[President (corporate title)|President]] and [[Chairman]]) |
|||
| num_employees = 1,100+ |
|||
| num_employees = 1,200+{{Citation needed|date=February 2018}} |
|||
| industry = {{ublist |[[Computer security]] |[[internet security]]}} |
|||
| homepage = {{URL|https://www.comodo.com}} |
|||
| products = {{ublist |[[SSL Certificates]] |[[AntiVirus]] |[[Firewall (computing)|Firewall]] |[[PCI Compliance]] |EndPoint Security |Managed DNS}} |
|||
| homepage = {{URL|https://www.comodo.com}} |
|||
}} |
}} |
||
'''Comodo Security Solutions, Inc.''', is a [[cybersecurity]] company headquartered in [[Bloomfield, New Jersey]]. Under the brand '''Sectigo''', the company acts as a web [[Certificate authority]] (CA) and issues [[SSL/TLS]] certificates. |
|||
'''Comodo Group, Inc.''' is a privately held group of companies providing [[computer software]] and [[Transport Layer Security|SSL]] [[Public key certificate|digital certificates]], based in [[Clifton, New Jersey]] in the [[United States]]. It has offices in the [[United Kingdom]], [[Ukraine]], [[Romania]], [[China]], [[India]], [[Turkey]] and Clifton, NJ.<ref>{{cite web|url=https://www.comodo.com/contact-comodo/contact-us.php|title=Comodo Company Locations|accessdate=14 August 2015}}</ref> As of 3 February 2017, Comodo is the largest issuer of SSL certificates with a 44% market share on 13.9% of all web domains.<ref>{{cite web |url=https://w3techs.com/technologies/overview/ssl_certificate/all |title= Usage of SSL certificate authorities for websites |website=W3Techs |accessdate=2017-02-03}}</ref> |
|||
==History== |
==History== |
||
The company was founded in 1998 in the United Kingdom |
The company was founded in 1998 in the [[United Kingdom]]<ref name="ukfounding">{{cite news|url=http://www.thetelegraphandargus.co.uk/news/11449076.Global_internet_security_firm_s_Bradford_roots/|title=How US entrepreneur's global internet security firm started life in Bradford|date=3 September 2014|access-date=3 September 2014|newspaper=Telegraph & Argus}}</ref> by [[Melih Abdulhayoğlu]]. The company relocated to the [[United States]] in 2004. Its products are focused on computer and internet security. The firm operates a [[certificate authority]] that issues [[SSL Certificates|SSL certificates]]. The company also helped on setting standards by contributing to the [[IETF]] (Internet Engineering Task Force) [[DNS Certification Authority Authorization]] (CAA) Resource Record.<ref>{{cite web|url=https://tools.ietf.org/html/rfc6844|title=DNS Certification Authority Authorization – Comodo |year=2013 |doi=10.17487/RFC6844 |access-date=14 January 2013|last1=Hallam-Baker |first1=P. |last2=Stradling |first2=R. |s2cid=46132708 |doi-access=free}}</ref> |
||
In October 2017, [[Francisco Partners]] acquired Comodo Certification Authority (Comodo CA) from Comodo Security Solutions, Inc. Francisco Partners rebranded Comodo CA in November 2018 to Sectigo.<ref>{{Cite web|url=https://www.securityweek.com/francisco-partners-acquires-comodo-ca|title=Comodo Sells Certificate Business to Private Equity Firm {{!}} SecurityWeek.Com|website=www.securityweek.com|date=31 October 2017 |access-date=2019-10-29}}</ref><ref>{{Cite web|url=https://www.enterprisetimes.co.uk/2018/11/02/comodo-ca-becomes-sectigo-and-expands-to-cover-iot/|title=Comodo CA becomes Sectigo and expands to cover IoT -|last=Murphy|first=Ian|date=2018-11-02|website=Enterprise Times|language=en-GB|access-date=2019-11-21}}</ref> |
|||
==Companies== |
|||
* '''Comodo CA Limited''': Based in [[City of Salford]], [[Greater Manchester]], UK,<ref>{{cite web|url=https://www.comodo.com/contact-comodo/contact-us.php?key5sk0=2128&key5sk1=b80c454519459017187cf9cada5815e5414f518c|title=Comodo - Contact Us}}</ref> is a digital certificate authority that issues SSL and other digital certificates. According to W3Techs.com, Comodo is the largest digital certificate provider.<ref>{{cite web|url=http://www.w3techs.com|title=W3Techs - extensive and reliable web technology surveys|work=w3techs.com}}</ref><ref>{{cite web|url=http://www.turkofamerica.com/index.php?option=com_content&task=view&id=1461&Itemid=161|title=- Comodo Named Fastest Growing SSL Certificate Authority|author=Admin TOA|work=Turkofamerica.com|accessdate=2015-03-30}}</ref> |
|||
* '''Comodo Security Solutions, Inc''': Based in Clifton, NJ, develops and markets security software for commercial and consumer use. This includes web site vulnerability and penetration scannng, corporate and consumer pc security systems and other networks security products. Comodo AntiVirus Labs support all versions of their security systems.<ref>{{cite web|url=https://www.icsalabs.com/vendor/comodo-security-solutions-inc|title=Comodo Security Solutions, Inc.|work=Icsalabs.com|accessdate=2015-03-30}}</ref> |
|||
* '''[[DNS.com]]''': Based in [[Louisville, Kentucky]], the company provides managed DNS services.<ref>{{cite web|url=http://www.domainersmagazine.com/Jul-Aug-Issue-22/DNS.com-The-Next-Geo-Targeting-Solution.html|title=Domainers Magazine - DNS.com : The Next Geo-Targeting Solution - Jul-Aug (Issue 22)|author=Joe Callan|work=Domainersmagazine.com|accessdate=2015-03-30}}</ref> |
|||
On June 28, 2018, the new organization announced that it was expanding from TLS/SSL certificates into IoT security with the announcement of its IoT device security platform.<ref>{{Cite web|url=https://betanews.com/2018/06/28/comodo-iot-security/|title=Comodo CA launches IoT security platform|date=2018-06-28|website=BetaNews|language=en|access-date=2019-10-29}}</ref> The company announced its new headquarters in [[Roseland, New Jersey]] on July 3, 2018<ref>{{Cite web|url=https://njbiz.com/comodo-ca-global-hq-coming-to-roseland/|title=Comodo CA global HQ coming to Roseland|last=Perry|first=Jessica|date=2018-07-03|website=NJBIZ|language=en-US|access-date=2019-10-29}}</ref> and its acquisition of CodeGuard, a website maintenance and disaster recovery company, on August 16, 2018.<ref>{{Cite web|url=https://www.crn.com/news/security/comodo-ca-buys-website-disaster-recovery-startup-codeguard|title=Comodo CA Buys Website Disaster Recovery Startup CodeGuard|last=Novinson|first=Michael|date=2018-08-16|website=CRN|access-date=2019-10-29}}</ref> |
|||
==Products== |
|||
On June 29, 2020, Comodo announced their strategic partnership with the company CyberSecOp.{{cn||date=May 2024}} The firm has partnered with Comodo in the past, and seeks to provide a range of cybersecurity products and consulting services. |
|||
===Consumer Security Products=== |
|||
*'''[[Comodo Internet Security]]''' (CIS) is a suite of security products for the desktop, provided free, with additional features available for a fee.<ref name="tha-list">{{cite web|url=http://www.comodo.com/products/comodo-products.php|title=Comodo Products - PC Security, Site Security, Prevention Software|work=comodo.com}}</ref> Support requires a subscription. It includes a [[personal firewall]], [[Host-based intrusion detection system]] and [[Antivirus software|antivirus program]].<ref>{{cite web |url = http://www.matousec.com/projects/proactive-security-challenge/results.php |title = Proactive Security Challenge: Results and comments |work = matousec.com |publisher = Difinex Ltd |accessdate = 2010-12-25}}</ref> |
|||
*'''Comodo Antivirus'''- A free Antivirus product that supports all major OS including Mac, (from OS X 10.4),<ref>{{cite web|url=https://www.comodo.com/home/internet-security/antivirus-for-mac.php|title=Comodo Antivirus for Mac details|accessdate=14 August 2015}}</ref> Linux (from Ubuntu 12.04)<ref>{{cite web|url=https://www.comodo.com/home/internet-security/antivirus-for-linux.php|title=Comodo Antivirus for linux Overview|accessdate=14 August 2015}}</ref> and Windows (from XP S2, including Windows 10).<ref>{{cite web |url=https://antivirus.comodo.com/antivirus-for-windows-10.php |title=Antivirus for windows 10|accessdate = 2010-12-25}}</ref> |
|||
*'''[[Comodo Mobile Security]]''' - A free Android application that protects mobile devices against viruses, worms and scripts. In addition, it also features SMS & Call Blocking, a software & process manager, data and apps backup and data traffic Monitor. |
|||
*'''Comodo email certificate''' - S/MIME-enabling certificates, free for personal use, per-year fee for corporate use.<ref>[https://www.comodo.com/home/email-security/free-email-certificate.php Comodo free secure email certificate]</ref> |
|||
==Companies== |
|||
===Enterprise Products - Digital Certificates and Certificate Management=== |
|||
* Comodo CA Limited (Sectigo): Based in the [[City of Salford]], [[Greater Manchester]], UK,<ref>{{cite web|url=https://www.comodo.com/contact-comodo/contact-us.php?key5sk0=2128&key5sk1=b80c454519459017187cf9cada5815e5414f518c|title=Comodo – Contact Us}}</ref> is a digital certificate authority that issues SSL and other digital certificates. In November 2018, Francisco Partners announced that Comodo Certificate Authority (Comodo CA) is rebranding as Sectigo.<ref>{{Cite web |title=Comodo CA Rebrands as Sectigo |url=https://www.sectigo.com/resource-library/comodo-ca-rebrands-as-sectigo |access-date=2024-06-18 |website=Sectigo® Official |language=en-US}}</ref> |
|||
*'''[[Comodo SSL]]''' - Comodo was founded as a Certificate Authority selling Comodo SSL and digital certificates. Its primary source of revenue comes from related products to business and enterprises.<ref>{{cite web|url=http://www.valuewalk.com/2016/12/ssl-certificate-tips/ |title=How To Get Powerful Website Protection – SSL Certificate | author=Natasha Miranda |work=www.valuewalk.com|accessdate=22 Dec 2016}}</ref> Related E-Commerce products include PCI Compliance Scanning and Web Site Vulnerability Scanning. |
|||
* |
* Comodo Security Solutions, Inc: Based in Clifton, New Jersey, US, develops security software for commercial and consumer use.<ref>{{cite web|url=https://www.icsalabs.com/vendor/comodo-security-solutions-inc|title=Comodo Security Solutions, Inc.|work=Icsalabs.com|access-date=30 March 2015}}</ref> |
||
* [[DNS.com]]: Based in [[Louisville, Kentucky]], US, the company provides managed DNS services.<ref>{{cite web|url=http://www.domainersmagazine.com/Jul-Aug-Issue-22/DNS.com-The-Next-Geo-Targeting-Solution.html|title=Domainers Magazine – DNS.com : The Next Geo-Targeting Solution – Jul–Aug (Issue 22)|author=Joe Callan|work=Domainersmagazine.com|access-date=30 March 2015|url-status=dead|archive-url=https://web.archive.org/web/20150412125418/http://www.domainersmagazine.com/Jul-Aug-Issue-22/DNS.com-The-Next-Geo-Targeting-Solution.html|archive-date=12 April 2015}}</ref> |
|||
===Enterprise Products - Security=== |
|||
*'''Comodo Advanced Endpoint Protection''' (AEP) provides next-generation endpoint protection, combining Comodo Client Security, ITSM, and Valkyrie file analysis.<ref>{{cite web|url=http://www.networkworld.com/article/3045287/security/comodos-default-deny-approach-keeps-known-and-unknown-malware-from-endpoints.html/ |title=Comodo's "default deny" approach keeps known and unknown malware from endpoints | author=Linda Musthaler |work=www.betanews.com| accessdate=29 Dec 2016}}</ref> |
|||
*'''Valkyrie Cloud File Analysis Platform''' - The Valkyrie cloud-based file analysis platform uses multiple techniques to provide a verdict of good or bad on unknown files. |
|||
*'''Comodo Client Security''' is the client application used by AEP to provide endpoint security. |
|||
*'''IT and Security Manager (ITSM)'''- ITSM is the management console used by AEP, providing a single consolidated dashboard of all decies and from which IT administrators can act on issues, report on current risk, and push changes. It allows for the configuration of security policies and visibility into the security posture and health of enterprise endpoints (PCs and mobile devices). |
|||
*'''Comodo Dome (cDome Shield, cDome Enterprise, cDome Data Protection)''' - a family of products providing a cloud-delivered secure web platform providing various security functions including web security, anti spam, secure VPN, and next generation firewall.<ref>{{cite web|url=http://betanews.com/2016/02/26/comodo-dome-cloud-security/ |title=Comodo Dome offers cloud-delivered security solution | author=Ian Barker|work=www.betanews.com|accessdate=21 Dec 2016}}</ref> In May 2014, the Comodo Group acquired [[MyDLP]], an [[open source]] data loss prevention system and integrated the functionality as Comodo Dome Data Protection. |
|||
*'''[[Securebox|Comodo Securebox]]''' was released in July 2014 and was jointly developed with Western Union with the intention of solving the problem of an application needing to conduct sensitive activities such as financial transactions from an already compromised system. Securebox containment technology protects the application and its activities even if the computer is infected with malware<ref>{{cite web|url=http://betanews.com/2014/07/23/comodo-securebox-always-assumes-the-worst-to-strengthen-endpoint-security/|title=Comodo SecureBox always assumes the worst to strengthen endpoint security|work=BetaNews|accessdate=2015-03-30}}</ref><ref>{{cite web|url=http://www.securityweek.com/new-comodo-securebox-protects-endpoint-applications|title=About Comodo Securebox|accessdate=14 August 2015}}</ref> |
|||
*'''Comodo Mobile Device Management''' - Comodo MDM software could rightly be called a powerful tool in the hands of IT administrators. Using this tool they can manage and at the same time ensure the security of a large number of mobile devices, both personal as well as those that are part of a corporate network.<ref>{{cite web|url=https://www.comodo.com/pdf/CMDM-Data-Sheet-Web.pdf|title=Comodo MDM User Guide|accessdate=18 May 2016|format=pdf}}</ref><ref>{{cite web|url=https://help.comodo.com/uploads/helpers/Comodo_MDM_End_User_Guide.pdf|title=Comodo MDM End User Guide|accessdate=20 June 2016|format=pdf}}</ref> |
|||
*'''Comodo cWatch''' a breach prevention and threat detection managed SaaS offering hosted by Comodo. |
|||
*'''Comodo Korugan''' - In 2014 Comodo introduced the Korugan line of Unified Threat Management Appliances that provide a bundle of network security solutions such as firewall, gateway antivirus and end security management.<ref>{{cite web|url=http://malwaretips.com/threads/korugan-unified-threat-management.40558/|title=Korugan Unified Threat Management|work=MalwareTips.com}}</ref><ref>{{cite web|url=http://www.pressebox.de/pressemitteilung/comodo-deutschland/Echte-IT-Tiefenverteidigung-Korugan-von-COMODO-schliesst-interne-und-externe-Sicherheitsluecken/boxid/716245|title=Echte IT-Tiefenverteidigung: Korugan von COMODO schließt interne und externe Sicherheitslücken|work=Pressebox.de|accessdate=2015-03-30}}</ref> |
|||
===Web browsers offered by Comodo=== |
|||
*'''[[Comodo Dragon]]''' - A [[Chromium (web browser)|Chromium]]-based browser with enhanced privacy and security<ref>[http://download.cnet.com/Comodo-Dragon/3000-2356_4-75119680.html Comodo Dragon], [[Download.com]]</ref> |
|||
* '''[[Comodo IceDragon]]''' - a [[Mozilla Firefox|Firefox]]-based browser, both with enhanced privacy and security features |
|||
===Other Products=== |
|||
#'''[[Comodo System Utilities]]''' - ''[[PC Magazine]]'' reviewed the product concluding "it is an effective system-enhancing utility that is as potent, if not more so in certain cases, as paid apps".<ref name=PCMag.com>{{cite web|title= Comodo System Utilities Review |url= http://www.pcmag.com/article2/0,2817,2370702,00.asp|publisher=Pcmag.com|accessdate=2015-03-30 }}</ref> |
|||
#'''SurGate Labs''' - In 2014 Comodo acquired SurGate Labs, a Turkish Software company that specializes in secure email an messaging systems. SurGate only recently began marketing its products outside of Turkey and Eastern Europe.<ref>{{cite web|url=http://cestiny.idnes.cz/surgate-outlookdav-041-/Software.aspx?c=A140614_213440_bw-cestiny-software_zel|title=SurGATE OutlookDAV|date=14 June 2014|work=iDNES.cz|accessdate=2015-03-30}}</ref><ref>{{cite web|url=http://www.teknolojioku.com/haber/surgate-labs-yurtdisina-aciliyor-16483.html|title=SurGATE Labs yurtdışına açılıyor!|date=4 February 2014|work=TeknolojiOku.com|accessdate=2015-03-30}}</ref><ref>{{cite web|url=http://surgate.com|title=Surgate Labs|work=Surgate.com|accessdate=2015-03-30}}</ref> |
|||
#'''Comodo Backup''' - In 2014 Comodo introduced Secured backup for Online Storage.<ref>{{cite web|url=https://backup.comodo.com/|title=Comodo Backup|accessdate=14 August 2015}}</ref> |
|||
#'''Comodo Penetration Testing''' - Comodo Penetration Tests will identify critical attack paths present in network infrastructure manually and provide advice to eliminate threats.<ref>{{cite web|url=https://dragonlabs.comodo.com/why-penetration-testing.php|title=Comodo Penetration Testing|accessdate=11 May 2016}}</ref> |
|||
== Industry affiliations == |
== Industry affiliations == |
||
Comodo is a member of the following industry organizations: |
Comodo is a member of the following industry organizations: |
||
* [[Certificate Authority Security Council]] (CASC): In February 2013, Comodo became a founding member of this industry advocacy organization dedicated to addressing industry issues and educating the public on internet security.<ref>{{cite web|url=http://www.networkworld.com/news/2013/021413-council-digital-certificate-266728.html |title=Multivendor power council formed to address digital certificate issues |author=Ellen Messmer |date=14 February 2013 |work=Network World | |
* [[Certificate Authority Security Council]] (CASC): In February 2013, Comodo became a founding member of this industry advocacy organization dedicated to addressing industry issues and educating the public on internet security.<ref>{{cite web|url=http://www.networkworld.com/news/2013/021413-council-digital-certificate-266728.html |title=Multivendor power council formed to address digital certificate issues |author=Ellen Messmer |date=14 February 2013 |work=Network World |url-status=dead |archive-url=https://web.archive.org/web/20130728114851/http://www.networkworld.com/news/2013/021413-council-digital-certificate-266728.html |archive-date=28 July 2013 }}</ref><ref>{{cite web|url=http://www.darkreading.com/authentication/167901072/security/news/240148546/major-certificate-authorities-unite-in-the-name-of-ssl-security.html|title=Authentication Security News, Analysis, Discussion, & Community|work=Darkreading.com|access-date=30 March 2015|url-status=dead|archive-url=https://archive.today/20130410174711/http://www.darkreading.com/authentication/167901072/security/news/240148546/major-certificate-authorities-unite-in-the-name-of-ssl-security.html|archive-date=10 April 2013}}</ref> |
||
* [[Common Computing Security Standards Forum]] (CCSF): In 2009 Comodo was a founding member of the CCSF, an industry organization that promotes industry standards that protect end users. Comodo CEO |
* [[Common Computing Security Standards Forum]] (CCSF): In 2009 Comodo was a founding member of the CCSF, an industry organization that promotes industry standards that protect end users. Comodo CEO Melih Abdulhayoğlu is considered the founder of the CCSF.<ref>{{cite web|url=http://www.securitypark.co.uk/|title=SecurityPark|access-date=30 March 2015|archive-url=https://web.archive.org/web/20150402184331/http://www.securitypark.co.uk/|archive-date=2 April 2015|url-status=dead}}</ref> |
||
* [[CA/Browser Forum]]: In 2005, Comodo was a founding member of a new consortium of |
* [[CA/Browser Forum]]: In 2005, Comodo was a founding member of a new consortium of certificate authorities and web browser vendors dedicated to promoting industry standards and baseline requirements for internet security.<ref>{{cite web | url=https://www.cabforum.org/ | title=CA/Browser Forum|publisher=Cabforum.org | access-date=23 April 2013}}</ref><ref>{{cite web | url=http://docbox.etsi.org/workshop/2012/201201_CA_DAY/5_Wilson_CAB-Forum.pdf | title=CA/Browser Forum History | last = Wilson | first = Wilson | publisher = DigiCert | access-date=23 April 2013}}</ref> Melih Abdulhayoğlu invited top browser providers and certification authorities to a round table to discuss the creation of a central authority responsible for delivering digital certificate issuance best practice guidelines.<ref>{{cite web|url=https://cabforum.org/pipermail/public/attachments/20150511/65e05471/attachment.pdf|title=Industry Round Table May 17th 2005 – New York|access-date=17 May 2005}}</ref> |
||
== Products == |
|||
* [[Comodo Dragon|Comodo Dragon (web browser)]] |
|||
* [[Comodo IceDragon|Comodo Ice Dragon (web browser)]] |
|||
* [[Comodo Internet Security]] |
|||
* [[Comodo System Utilities]] |
|||
* [[Comodo Mobile Security]] |
|||
* Comodo Endpoint Protection |
|||
* Xcitium EDR<ref>{{Cite web|url=https://www.xcitium.com/edr-security/edr-endpoint-detection-and-response/ |title=Xcitium EDR}}</ref> |
|||
==Controversies== |
==Controversies== |
||
===Symantec=== |
===Symantec=== |
||
In response to [[Symantec]]'s comment |
In response to [[NortonLifeLock|Symantec]]'s comment asserting paid [[Antivirus software|antivirus]] is superior to free antivirus, the CEO of Comodo Group, [[Melih Abdulhayoğlu]] had challenged Symantec on 18 September 2010 to see whether paid or free products can better defend the consumer against [[malware]].<ref>{{cite web |
||
|url = http://www.melih.com/2010/09/18/challenge-to-symantec-from-comodo-ceo/ |
|url = http://www.melih.com/2010/09/18/challenge-to-symantec-from-comodo-ceo/ |
||
|title = Challenge to Symantec from Comodo CEO |
|title = Challenge to Symantec from Comodo CEO |
||
|first = Melih |
|first = Melih |
||
|last = Abdulhayoğlu |
|last = Abdulhayoğlu |
||
| |
|author-link = Melih Abdulhayoğlu |
||
|date = 18 September 2010 |
|date = 18 September 2010 |
||
|publisher = Comodo Group |
|publisher = Comodo Group |
||
|access-date = 22 September 2010 |
|||
|accessdate = 2010-09-22 |
|||
|archive-url = https://web.archive.org/web/20110125203635/http://www.melih.com/2010/09/18/challenge-to-symantec-from-comodo-ceo/ |
|||
}}</ref> GCN'S John Breeden understood Comodo's stance on free Antivirus software and challenging Symantec: "This is actually a pretty smart move based on previous reviews of AV performance we've done in the GCN Lab. Our most recent AV review this year showed no functional difference between free and paid programs in terms of stopping viruses, and it's been that way for many years. In fact you have to go all the way back to 2006 to find an AV roundup where viruses were missed by some companies." <ref>{{Cite web|url=https://gcn.com/articles/2010/09/27/antivirus-paid-vs-free.aspx |title=Is free virus protection inferior? | author=John Breeden II |work=gcn.com |accessdate=23 Dec 2016}}</ref> |
|||
|archive-date = 25 January 2011 |
|||
|url-status = dead |
|||
}}</ref> GCN'S John Breeden understood Comodo's stance on free Antivirus software and challenging Symantec: "This is actually a pretty smart move based on previous reviews of AV performance we've done in the GCN Lab. Our most recent AV review this year showed no functional difference between free and paid programs in terms of stopping viruses, and it's been that way for many years. In fact you have to go all the way back to 2006 to find an AV roundup where viruses were missed by some companies."<ref>{{Cite web|url=https://gcn.com/articles/2010/09/27/antivirus-paid-vs-free.aspx |title=Is free virus protection inferior? | author=John Breeden II |work=gcn.com |date=27 September 2010 |access-date=23 December 2016}}</ref> |
|||
Symantec responded saying that if Comodo is interested they should have their product included in tests by independent reviewers.<ref>{{cite news |
Symantec responded saying that if Comodo is interested they should have their product included in tests by independent reviewers.<ref>{{cite news |
||
|url = |
|url = https://www.pcmag.com/article2/0,2817,2369524,00.asp |
||
|title = Comodo Challenges Symantec to Antivirus Showdown |
|title = Comodo Challenges Symantec to Antivirus Showdown |
||
|first = Neil J. |
|first = Neil J. |
||
Line 89: | Line 80: | ||
|publisher = Ziff Davis, Inc. |
|publisher = Ziff Davis, Inc. |
||
|date = 22 September 2010 |
|date = 22 September 2010 |
||
|access-date = 22 September 2010 |
|||
|accessdate = 2010-09-22 |
|||
}}</ref> |
}}</ref> |
||
Comodo volunteered to a Symantec vs. Comodo independent review.<ref>{{Cite web|url=https://www.melih.com/2010/09/18/challenge-to-symantec-from-comodo-ceo/ |title=Challenge to Symantec from Comodo CEO! | |
Comodo volunteered to a Symantec vs. Comodo independent review.<ref>{{Cite web |url=https://www.melih.com/2010/09/18/challenge-to-symantec-from-comodo-ceo/ |title=Challenge to Symantec from Comodo CEO! |access-date=23 December 2016 |archive-date=15 August 2016 |archive-url=https://web.archive.org/web/20160815054509/http://www.melih.com/2010/09/18/challenge-to-symantec-from-comodo-ceo/ |url-status=dead }}</ref> Though this showdown did not take place, Comodo has since been included in multiple independent reviews with AV-Test,<ref>{{Cite web|url=http://www.networkworld.com/article/2989137/linux/av-test-lab-tests-16-linux-antivirus-products-against-windows-and-linux-malware.html|archive-url=https://web.archive.org/web/20151007235204/http://www.networkworld.com/article/2989137/linux/av-test-lab-tests-16-linux-antivirus-products-against-windows-and-linux-malware.html|url-status=dead|archive-date=7 October 2015| title=AV-test Lab tests 16 Linux antivirus products against Windows and Linux malware | author=Ms. Smith|work=www.networkworld.com |access-date=23 December 2016}}</ref> PC World,<ref>{{cite web |url=http://www.pcworld.com/article/170640/comodo_internet_security.html |title=Comodo Internet Security Free Antivirus Software |author=Erik Larkin |work=www.pcworld.com |date=24 August 2009 |access-date=23 December 2016}}</ref> Best Antivirus Reviews,<ref>{{cite web |url=https://bestantivirus.reviews/review/comodo |title=Comodo 2016 Review: Malware Protection & Online Security |author=Daniele P. |work=www.bestantivirus.com |access-date=23 December 2016 |archive-url=https://web.archive.org/web/20161228233750/https://bestantivirus.reviews/review/comodo |archive-date=28 December 2016 |url-status=dead }}</ref> AV-Comparatives,<ref>{{Cite web|url=https://www.av-comparatives.org/av-vendors/ |title=Independent Tests of Anti-Virus Software |work=www.av-comparatives.org |access-date=23 December 2016}}</ref> and PC Mag.<ref>{{Cite web |url=https://www.pcmag.com/article2/0.2817.2388652.00.asp |title=The Best Free Antivirus Protection of 2016 |author=Neil P. Rubenking |work=www.pcmag.com |access-date=23 December 2016 }}{{Dead link|date=December 2023 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> |
||
===Certificate hacking {{anchor|2011 breach incident}}=== |
===Certificate hacking {{anchor|2011 breach incident}}=== |
||
On March |
On 23 March 2011, Comodo posted a report that 8 days earlier, on 15 March 2011, a user account with an affiliate registration authority had been compromised and was used to create a new user account that issued nine [[certificate signing request]]s.<ref name="comodo inc1">{{cite web|url=https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html |title=Report of incident on 15-MAR-2011: Update 31-MAR-2011 |publisher=Comodo group |access-date=24 March 2011 }}</ref> Nine certificates for seven domains were issued.<ref name="comodo inc1"/> The attack was traced to IP address 212.95.136.18, which originates in [[Tehran]], Iran.<ref name="comodo inc1"/> [[Moxie Marlinspike]] analyzed the [[IP address]] on his website the next day and found it to have [[English language|English]] localization and Windows operating system.<ref name=":0">{{Cite web|title=DEF CON 19 - Moxie Marlinspike - SSL And The Future Of Authenticity - YouTube|url=https://www.youtube.com/watch?v=UawS3_iuHoA |archive-url=https://ghostarchive.org/varchive/youtube/20211213/UawS3_iuHoA |archive-date=2021-12-13 |url-status=live|access-date=2021-01-13|website=www.youtube.com| date=2 November 2013 }}{{cbignore}}</ref> Though the firm initially reported that the breach was the result of a "state-driven attack", it subsequently stated that the origin of the attack may be the "result of an attacker attempting to lay a false trail.".<ref name="comodo inc1"/><ref name="comodo blog1">{{cite web|title=The Recent RA Compromise|url=http://blog.comodo.com/it-security/data-security/the-recent-ca-compromise/|first=Phillip|last=Hallam-Baker|date=23 March 2011|access-date=24 March 2011|publisher=Comodo Blog}}{{Dead link|date=December 2023 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> |
||
Comodo revoked all of the bogus certificates shortly after the breach was discovered. Comodo also stated that it was actively looking into ways to improve the security of its affiliates.<ref>{{Cite news|url=https://www.bbc.com/news/technology-12847072 |title=Iran accused in 'dire' net security attack |work=BBC News |date=24 March 2011 |access-date=23 December 2016}}</ref> |
|||
In an update on March |
In an update on 31 March 2011, Comodo stated that it detected and thwarted an intrusion into a reseller user account on 26 March 2011. The new controls implemented by Comodo following the incident on 15 March 2011, removed any risk of the fraudulent issue of certificates. Comodo believed the attack was from the same perpetrator as the incident on 15 March 2011.<ref>{{Cite web|url=https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html |title=Update 31-MAR-2011 |access-date=23 December 2016}}</ref> |
||
In regards to this second incident, Comodo stated, "Our CA infrastructure was not compromised. Our keys in our HSMs were not compromised. No certificates have been fraudulently issued. The attempt to fraudulently access the certificate ordering platform to issue a certificate failed." |
In regards to this second incident, Comodo stated, "Our CA infrastructure was not compromised. Our keys in our HSMs were not compromised. No certificates have been fraudulently issued. The attempt to fraudulently access the certificate ordering platform to issue a certificate failed."<ref>{{Cite web|url=https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html |title=Update 31-Mar-2011 |access-date=23 December 2016}}</ref> |
||
On March |
On 26 March 2011, a person under the username "ComodoHacker" verified that they were the attacker by posting the private keys online<ref>{{Cite web|url=https://blog.erratasec.com/2011/03/verifying-comodo-hackers-key.html|title=Verifying the Comodo Hacker's key|first=Robert|last=Graham}}</ref> and posted a series of messages detailing how poor Comodo's security is and bragging about his abilities:<ref>{{cite magazine|last=Bright|first=Peter|date=28 March 2011|title=Independent Iranian Hacker Claims Responsibility for Comodo Hack|magazine=Wired|format=WIRED|url=https://www.wired.com/threatlevel/2011/03/comodo_hack/|access-date=29 March 2011}}</ref><ref>{{cite web|title=ComodoHacker's Pastebin|url=http://pastebin.com/u/ComodoHacker|date=5 March 2011|publisher=Pastebin.com|access-date=30 March 2015}}</ref><blockquote>I hacked Comodo from InstantSSL.it, their CEO's e-mail address mfpenco@mfpenco.com |
||
Their Comodo username/password was: user: gtadmin password: globaltrust |
|||
Such issues have been widely reported, and have led to criticism of how certificates are issued and revoked.<ref>{{cite web|title=Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get?|url=https://www.eff.org/deeplinks/2011/03/iranian-hackers-obtain-fraudulent-https|first=Peter |last=Eckersley|date=March 23, 2011|accessdate=2011-03-24|work=EFF}}</ref><ref>{{cite news|title=Iran accused in 'dire' net security attack|url=http://www.bbc.co.uk/news/technology-12847072|date=March 24, 2011|format=BBC|accessdate=2011-03-24|work=BBC News}}</ref><ref>{{cite web|title=Detecting Certificate Authority compromises and web browser collusion |url=https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion|date=March 22, 2011|accessdate=2011-03-24|work=TOR}}</ref><ref>{{cite news|title=Google, Yahoo, Skype targeted in attack linked to Iran|url=http://news.cnet.com/8301-31921_3-20046340-281.html|date=March 23, 2011|author=Elinor Mills and Declan McCullagh|work=CNET|accessdate=2011-03-24}}</ref> As of 2016, all of the certificates remain revoked.<ref name="comodo inc1" /> Microsoft issued a security advisory and update to address the issue at the time of the event.<ref>{{cite web|title=Microsoft Security Advisory (2524375)|url=http://www.microsoft.com/technet/security/advisory/2524375.mspx|date=March 23, 2011|accessdate=2011-03-24|format=Microsoft}}</ref><ref>{{cite web|title=Microsoft Security Advisory: Fraudulent Digital Certificates could allow spoofing|url=http://support.microsoft.com/kb/2524375|date=March 23, 2011|accessdate=2011-03-24|work=Microsoft}}</ref> |
|||
Their DB name was: globaltrust and instantsslcms |
|||
Such attacks are not unique to Comodo - the specifics will vary from CA to CA, RA to RA, but there are so many of these entities, all of them trusted by default, that further holes are deemed to be inevitable.<ref>{{Cite web|url=https://www.wired.com/2011/03/comodo_hack/ |title=Independent Iranian Hacker Claims Responsibility for Comodo Hack |accessdate=23 Dec 2016}}</ref> |
|||
Enough said, huh? Yes, enough said, someone who should know already knows... |
|||
=== Association with PrivDog=== |
|||
In February 2015, Comodo was associated with a man-in-the-middle enabling tool known as PrivDog, which claims to protect users against malicious advertising.<ref>http://www.pcworld.com/article/2887632/secure-advertising-tool-privdog-compromises-https-security.html |title=PrivDog Security Advisory (Threat level: LOW) |accessdate=2016-12-30</ref> |
|||
Anyway, at first I should mention we have no relation to Iranian Cyber Army, we don't change DNSes, we |
|||
PrivDog issued a statement on February 23, 2015, saying, "A minor intermittent defect has been detected in a third party library used by the PrivDog standalone application which potentially affects a very small number of users. This potential issue is only present in PrivDog versions, 3.0.96.0 and 3.0.97.0. The otential issue is not present in the PrivDog plug-in that is distributed with Comodo Browsers, and Comodo has not distributed this version to its users. there are potentially a maximum of 6,294 users in the USA and 57,568 users globally that this could potentially impact. The third party library used by PrivDog is not the same third party library used by Superfish....The potential issue has already been corrected. There will be an update tomorrow which will automatically update all 57,568 users of these specific PrivDog versions." <ref>{{Cite web|url=http://privdog.com/advisory.htm |title=PrivDog Security Advisory (Threat level: LOW) |accessdate=23 Dec 2016}}</ref> |
|||
just hack and own. |
|||
===Certificates issued to known malware=== |
|||
In 2009 Microsoft MVP Michael Burgess accused Comodo of issuing digital certificates to known malware.<ref>http://www.cnet.com/forums/discussions/comodo-continue-to-to-issue-certificates-to-known-malware-343022/</ref> |
|||
I see Comodo CEO and other wrote that it was a managed attack, it was a planned attack, a group of |
|||
Comodo responded when notified and revoked the issued certificates that contained the rogue malware.<ref>{{Cite web|url=http://blogs.msmvps.com/donna/2009/05/18/microsoft-mvp-mike-burgess-respond-to-comodo-s-ceo-on-comodo-certificates-issued-to-malware-distributors/|title=Microsoft MVP Mike Burgess Responds To Comodo’s CEO On Comodo Certificates Issued To Malware Distributors |accessdate=23 Dec 2016}}</ref> |
|||
cyber criminals did it, etc. |
|||
===Chromodo browser=== |
|||
Let me explain: |
|||
a) I'm not a group, I'm single hacker with experience of 1000 hacker, I'm single programmer with |
|||
experience of 1000 programmer, I'm single planner/project manager with experience of 1000 project |
|||
managers, so you are right, it's managed by 1000 hackers, but it was only I with experience of 1000 |
|||
hackers.</blockquote>Such issues have been widely reported, and have led to criticism of how certificates are issued and revoked.<ref>{{cite web|title=Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get?|url=https://www.eff.org/deeplinks/2011/03/iranian-hackers-obtain-fraudulent-https|first=Peter |last=Eckersley|date=23 March 2011|access-date=24 March 2011|work=EFF}}</ref><ref>{{cite news|title=Iran accused in 'dire' net security attack|url=https://www.bbc.co.uk/news/technology-12847072|date=24 March 2011|format=BBC|access-date=24 March 2011|work=BBC News}}</ref><ref>{{cite web|title=Detecting Certificate Authority compromises and web browser collusion |url=https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion|date=22 March 2011|access-date=24 March 2011|work=TOR}}</ref><ref>{{cite news|title=Google, Yahoo, Skype targeted in attack linked to Iran|url=http://news.cnet.com/8301-31921_3-20046340-281.html|date=23 March 2011|author=Elinor Mills and Declan McCullagh|work=CNET|access-date=24 March 2011|archive-date=25 March 2011|archive-url=https://web.archive.org/web/20110325050334/http://news.cnet.com/8301-31921_3-20046340-281.html|url-status=dead}}</ref> As of 2016, all of the certificates remain revoked.<ref name="comodo inc1" /> Microsoft issued a security advisory and update to address the issue at the time of the event.<ref>{{cite web|title=Microsoft Security Advisory (2524375)|website=[[Microsoft]] |url=http://www.microsoft.com/technet/security/advisory/2524375.mspx|date=23 March 2011|access-date=24 March 2011|format=Microsoft}}</ref><ref>{{cite web|title=Microsoft Security Advisory: Fraudulent Digital Certificates could allow spoofing|url=http://support.microsoft.com/kb/2524375|date=23 March 2011|access-date=24 March 2011|work=Microsoft}}</ref> |
|||
For Comodo's lacking response on the issue computer security researcher [[Moxie Marlinspike]] called the whole event extremely embarrassing for Comodo and rethinking [[Secure Sockets Layer|SSL]] security. It was also implied that the attacker followed an online video tutorial and searched for basic [[opsec]]<ref name=":0" /> |
|||
Such attacks are not unique to Comodo – the specifics will vary from CA to CA, RA to RA, but there are so many of these entities, all of them trusted by default, that further holes are deemed to be inevitable.<ref>{{Cite magazine |date=2011-03-28 |title=Independent Iranian Hacker Claims Responsibility for Comodo Hack |url=https://www.wired.com/2011/03/comodo_hack/ |archive-url=https://web.archive.org/web/20160324172823/https://www.wired.com/2011/03/comodo_hack/ |archive-date=2016-03-24 |access-date=23 December 2016 |magazine=Wired}}</ref> |
|||
=== Association with PrivDog === |
|||
In February 2015, Comodo was associated with a man-in-the-middle enabling tool known as PrivDog, which claims to protect users against malicious advertising.<ref>{{Cite magazine|last=Constantin|first=Lucian|url=http://www.pcworld.com/article/2887632/secure-advertising-tool-privdog-compromises-https-security.html |title=Worse than Superfish? Comodo-affiliated PrivDog compromises web security too|accessdate=24 July 2024|magazine=[[PC World]]}}</ref> |
|||
PrivDog issued a statement on 23 February 2015, saying, "A minor intermittent defect has been detected in a third party library used by the PrivDog standalone application which potentially affects a very small number of users. This potential issue is only present in PrivDog versions, 3.0.96.0 and 3.0.97.0. The potential issue is not present in the PrivDog plug-in that is distributed with Comodo Browsers, and Comodo has not distributed this version to its users. there are potentially a maximum of 6,294 users in the USA and 57,568 users globally that this could potentially impact. The third party library used by PrivDog is not the same third party library used by Superfish....The potential issue has already been corrected. There will be an update tomorrow which will automatically update all 57,568 users of these specific PrivDog versions."<ref>{{Cite web |url=http://privdog.com/advisory.htm |title=PrivDog Security Advisory (Threat level: LOW) |access-date=23 December 2016 }}{{Dead link|date=November 2019 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> |
|||
===Certificates issued to known malware distributors=== |
|||
In 2009 Microsoft MVP Michael Burgess accused Comodo of issuing digital certificates to known malware distributors.<ref>{{Cite web | url=https://www.cnet.com/forums/discussions/comodo-continue-to-to-issue-certificates-to-known-malware-343022/ | title=Comodo continue to to[sic] issue certificates to known Malware - May 2009 - Forums}}</ref> Comodo responded when notified and revoked the certificates in question, which were used to sign the known malware.<ref>{{Cite web|url=http://blogs.msmvps.com/donna/2009/05/18/microsoft-mvp-mike-burgess-respond-to-comodo-s-ceo-on-comodo-certificates-issued-to-malware-distributors/|title=Microsoft MVP Mike Burgess Responds To Comodo's CEO On Comodo Certificates Issued To Malware Distributors |access-date=23 December 2016}}</ref> |
|||
=== Chromodo browser, ACL, no ASLR, VNC weak authentication === |
|||
In January 2016, [[Tavis Ormandy]] reported that Comodo's Chromodo browser exhibited a number of vulnerabilities, including disabling of the [[same-origin policy]].<ref>https://code.google.com/p/google-security-research/issues/detail?id=704 |title=Comodo "Chromodo" Browser disables same origin policy, Effectively turning off web security</ref> |
In January 2016, [[Tavis Ormandy]] reported that Comodo's Chromodo browser exhibited a number of vulnerabilities, including disabling of the [[same-origin policy]].<ref>https://code.google.com/p/google-security-research/issues/detail?id=704 |title=Comodo "Chromodo" Browser disables same origin policy, Effectively turning off web security</ref> |
||
The vulnerability wasn't in the browser itself |
The vulnerability wasn't in the browser itself. Rather, the issue was with an add-on. As soon as Comodo became aware of the issue in early February 2016, the company released a statement and a fix: "As an industry, software in general is always being updated, patched, fixed, addressed, improved – it goes hand in hand with any development cycle...What is critical in software development is how companies address an issue if a certain vulnerability is found – ensuring it never puts the customer at risk." Those using Chromodo immediately received an update.<ref>{{Cite web|url=http://www.pcworld.com/article/3029690/security/comodo-to-fix-major-flaw-in-knock-off-chrome-browser.html |title=Comodo will fix major flaw in knock-off Chrome browser |date=4 February 2016 |access-date=23 December 2016}}</ref> The Chromodo browser was subsequently discontinued by Comodo. |
||
Ormandy noted that Comodo received a "Excellence in Information Security Testing" award from Verizon despite the vulnerability in its browser, despite having its VNC delivered with a default of weak authentication, despite not enabling address space layout randomization (ASLR), and despite using access control lists (ACLs) throughout its product. Ormandy has the opinion that Verizon's certification methodology is at fault here.<ref>[https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/why-antivirus-standards-of-certification-need-to-change/ Why Antivirus Standards of Certification Need to Change], tripwire, 23 March 2016.</ref> |
|||
=== Let's Encrypt trademark registration application === |
=== Let's Encrypt trademark registration application === |
||
In October 2015, Comodo applied for "Let's Encrypt", "Comodo Let's Encrypt", and "Let's Encrypt with Comodo" trademarks.<ref>{{Cite web|url=http://tsdr.uspto.gov/#caseNumber=86790719&caseType=SERIAL_NO&searchType=statusSearch|title=Trademark Status & Document Retrieval|website=tsdr.uspto.gov|access-date= |
In October 2015, Comodo applied for "Let's Encrypt", "Comodo Let's Encrypt", and "Let's Encrypt with Comodo" trademarks.<ref>{{Cite web|url=http://tsdr.uspto.gov/#caseNumber=86790719&caseType=SERIAL_NO&searchType=statusSearch|title=Trademark Status & Document Retrieval|website=tsdr.uspto.gov|access-date=23 June 2016}}</ref><ref>{{Cite web|url=http://tsdr.uspto.gov/#caseNumber=86790789&caseType=SERIAL_NO&searchType=statusSearch|title=Trademark Status & Document Retrieval|website=tsdr.uspto.gov|access-date=23 June 2016}}</ref><ref>{{Cite web|url=http://tsdr.uspto.gov/#caseNumber=86790812&caseType=SERIAL_NO&searchType=statusSearch|title=Trademark Status & Document Retrieval|website=tsdr.uspto.gov|access-date=23 June 2016}}</ref> These trademark applications were filed almost a year after the Internet Security Research Group, parent organization of [[Let's Encrypt]], started using the name Let's Encrypt publicly in November 2014,<ref>{{Cite web|url=http://www.crn.com/news/cloud/300074840/lets-encrypt-a-free-and-automated-certificate-authority-comes-out-of-stealth-mode.htm|title=Let's Encrypt, A Free And Automated Certificate Authority, Comes Out Of Stealth Mode|last=Tsidulko |first=Joseph |website=CRN |date=19 November 2014|access-date=23 June 2016}}</ref> and despite the fact Comodo's "intent to use" trademark filings acknowledge that it has never used "Let's Encrypt" as a brand. |
||
On June |
On 24 June 2016, Comodo publicly posted in its forum that it had filed for "express abandonment" of their trademark applications.<ref>{{Cite web|url=https://forums.comodo.com/general-discussion-off-topic-anything-and-everything/trademark-registration-t115968.0.html;msg837505#msg837505|title=Topic: Trademark registration|access-date=24 June 2016|archive-date=8 November 2020|archive-url=https://web.archive.org/web/20201108141457/https://forums.comodo.com/general-discussion-off-topic-anything-and-everything/trademark-registration-t115968.0.html;msg837505#msg837505|url-status=dead}}</ref> |
||
Comodo's Chief Technical Officer Robin Alden said, "Comodo has filed for express abandonment of the trademark applications at this time instead of waiting and allowing them to lapse. Following collaboration between Let's Encrypt and Comodo, the trademark issue is now resolved and behind us, and we'd like to thank the Let's Encrypt team for helping to bring it to a resolution." |
Comodo's Chief Technical Officer Robin Alden said, "Comodo has filed for express abandonment of the trademark applications at this time instead of waiting and allowing them to lapse. Following collaboration between Let's Encrypt and Comodo, the trademark issue is now resolved and behind us, and we'd like to thank the Let's Encrypt team for helping to bring it to a resolution."<ref>{{Cite web|url=https://www.grahamcluley.com/comodo-stands-trademark-tussle-lets-encrypt/ |title=Comodo Stands Down From Trademark Tussle with Let's Encrypt |date=27 June 2016 |access-date=23 December 2016}}</ref> |
||
=== Dangling markup injection vulnerability === |
=== Dangling markup injection vulnerability === |
||
On July |
On 25 July 2016, Matthew Bryant showed that Comodo's website is vulnerable to dangling markup injection attacks and can send emails to system administrators from Comodo's servers to approve a wildcard certificate issue request which can be used to issue arbitrary wildcard certificates via Comodo's 30-Day PositiveSSL product.<ref>{{Cite web|url=https://thehackerblog.com/keeping-positive-obtaining-arbitrary-wildcard-ssl-certificates-from-comodo-via-dangling-markup-injection/index.html |title=Keeping Positive – Obtaining Arbitrary Wildcard SSL Certificates from Comodo via Dangling Markup Injection |website=thehackerblog.com |date=25 July 2016 |access-date=29 July 2016}}</ref> |
||
Bryant reached out in June 2016, and on July |
Bryant reached out in June 2016, and on 25 July 2016, Comodo's Chief Technical Officer Robin Alden confirmed a fix was put in place, within the responsible disclosure date per industry standards.<ref>{{Cite web|url=https://thehackerblog.com/keeping-positive-obtaining-arbitrary-wildcard-ssl-certificates-from-comodo-via-dangling-markup-injection/index.html |title=Keeping Positive – Obtaining Arbitrary Wildcard SSL Certificates from Comodo via Dangling Markup Injection |date=25 July 2016 |access-date=23 December 2016}}</ref> |
||
==See also== |
==See also== |
||
Line 140: | Line 155: | ||
* [[Comparison of computer viruses]] |
* [[Comparison of computer viruses]] |
||
* [[Internet Security]] |
* [[Internet Security]] |
||
* [[Antivirus software]] |
|||
* [[Comparison of firewalls]] |
* [[Comparison of firewalls]] |
||
{{Portalbar |
{{Portalbar|Companies|United States}} |
||
==References== |
==References== |
||
{{ |
{{reflist}} |
||
==External links== |
==External links== |
||
*{{Official website |
*{{Official website}} |
||
{{Authority control}} |
|||
{{Antivirus}} |
|||
[[Category:Computer network security]] |
|||
[[Category:Web security exploits]] |
|||
[[Category:Computer security organizations]] |
|||
[[Category:Software companies established in 1998]] |
[[Category:Software companies established in 1998]] |
||
[[Category:Certificate authorities]] |
[[Category:Certificate authorities]] |
||
[[Category:Computer security software companies]] |
[[Category:Computer security software companies]] |
||
[[Category:Computer companies of the United States]] |
|||
[[Category:Comodo Group]] |
|||
[[Category:Computer security companies]] |
|||
[[Category:International information technology consulting firms]] |
[[Category:International information technology consulting firms]] |
||
[[Category:Software companies based in New Jersey]] |
|||
[[Category:Software companies of the United Kingdom]] |
|||
[[Category:1998 establishments in the United Kingdom]] |
|||
[[Category:Companies based in Passaic County, New Jersey]] |
|||
[[Category:Clifton, New Jersey]] |
|||
[[Category:Software companies of the United States]] |
Latest revision as of 15:24, 4 January 2025
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Formerly | Comodo Security Solutions, Inc. |
---|---|
Company type | Private |
Industry | Computer software |
Founded | United Kingdom (1998 )[1] |
Headquarters | , United States |
Area served | Worldwide |
Key people | Melih Abdulhayoğlu (President and Chairman) |
Number of employees | 1,200+[citation needed] |
Website | www |
Comodo Security Solutions, Inc., is a cybersecurity company headquartered in Bloomfield, New Jersey. Under the brand Sectigo, the company acts as a web Certificate authority (CA) and issues SSL/TLS certificates.
History
[edit]The company was founded in 1998 in the United Kingdom[1] by Melih Abdulhayoğlu. The company relocated to the United States in 2004. Its products are focused on computer and internet security. The firm operates a certificate authority that issues SSL certificates. The company also helped on setting standards by contributing to the IETF (Internet Engineering Task Force) DNS Certification Authority Authorization (CAA) Resource Record.[2]
In October 2017, Francisco Partners acquired Comodo Certification Authority (Comodo CA) from Comodo Security Solutions, Inc. Francisco Partners rebranded Comodo CA in November 2018 to Sectigo.[3][4]
On June 28, 2018, the new organization announced that it was expanding from TLS/SSL certificates into IoT security with the announcement of its IoT device security platform.[5] The company announced its new headquarters in Roseland, New Jersey on July 3, 2018[6] and its acquisition of CodeGuard, a website maintenance and disaster recovery company, on August 16, 2018.[7]
On June 29, 2020, Comodo announced their strategic partnership with the company CyberSecOp.[citation needed] The firm has partnered with Comodo in the past, and seeks to provide a range of cybersecurity products and consulting services.
Companies
[edit]- Comodo CA Limited (Sectigo): Based in the City of Salford, Greater Manchester, UK,[8] is a digital certificate authority that issues SSL and other digital certificates. In November 2018, Francisco Partners announced that Comodo Certificate Authority (Comodo CA) is rebranding as Sectigo.[9]
- Comodo Security Solutions, Inc: Based in Clifton, New Jersey, US, develops security software for commercial and consumer use.[10]
- DNS.com: Based in Louisville, Kentucky, US, the company provides managed DNS services.[11]
Industry affiliations
[edit]Comodo is a member of the following industry organizations:
- Certificate Authority Security Council (CASC): In February 2013, Comodo became a founding member of this industry advocacy organization dedicated to addressing industry issues and educating the public on internet security.[12][13]
- Common Computing Security Standards Forum (CCSF): In 2009 Comodo was a founding member of the CCSF, an industry organization that promotes industry standards that protect end users. Comodo CEO Melih Abdulhayoğlu is considered the founder of the CCSF.[14]
- CA/Browser Forum: In 2005, Comodo was a founding member of a new consortium of certificate authorities and web browser vendors dedicated to promoting industry standards and baseline requirements for internet security.[15][16] Melih Abdulhayoğlu invited top browser providers and certification authorities to a round table to discuss the creation of a central authority responsible for delivering digital certificate issuance best practice guidelines.[17]
Products
[edit]- Comodo Dragon (web browser)
- Comodo Ice Dragon (web browser)
- Comodo Internet Security
- Comodo System Utilities
- Comodo Mobile Security
- Comodo Endpoint Protection
- Xcitium EDR[18]
Controversies
[edit]Symantec
[edit]In response to Symantec's comment asserting paid antivirus is superior to free antivirus, the CEO of Comodo Group, Melih Abdulhayoğlu had challenged Symantec on 18 September 2010 to see whether paid or free products can better defend the consumer against malware.[19] GCN'S John Breeden understood Comodo's stance on free Antivirus software and challenging Symantec: "This is actually a pretty smart move based on previous reviews of AV performance we've done in the GCN Lab. Our most recent AV review this year showed no functional difference between free and paid programs in terms of stopping viruses, and it's been that way for many years. In fact you have to go all the way back to 2006 to find an AV roundup where viruses were missed by some companies."[20]
Symantec responded saying that if Comodo is interested they should have their product included in tests by independent reviewers.[21]
Comodo volunteered to a Symantec vs. Comodo independent review.[22] Though this showdown did not take place, Comodo has since been included in multiple independent reviews with AV-Test,[23] PC World,[24] Best Antivirus Reviews,[25] AV-Comparatives,[26] and PC Mag.[27]
Certificate hacking
[edit]On 23 March 2011, Comodo posted a report that 8 days earlier, on 15 March 2011, a user account with an affiliate registration authority had been compromised and was used to create a new user account that issued nine certificate signing requests.[28] Nine certificates for seven domains were issued.[28] The attack was traced to IP address 212.95.136.18, which originates in Tehran, Iran.[28] Moxie Marlinspike analyzed the IP address on his website the next day and found it to have English localization and Windows operating system.[29] Though the firm initially reported that the breach was the result of a "state-driven attack", it subsequently stated that the origin of the attack may be the "result of an attacker attempting to lay a false trail.".[28][30]
Comodo revoked all of the bogus certificates shortly after the breach was discovered. Comodo also stated that it was actively looking into ways to improve the security of its affiliates.[31]
In an update on 31 March 2011, Comodo stated that it detected and thwarted an intrusion into a reseller user account on 26 March 2011. The new controls implemented by Comodo following the incident on 15 March 2011, removed any risk of the fraudulent issue of certificates. Comodo believed the attack was from the same perpetrator as the incident on 15 March 2011.[32]
In regards to this second incident, Comodo stated, "Our CA infrastructure was not compromised. Our keys in our HSMs were not compromised. No certificates have been fraudulently issued. The attempt to fraudulently access the certificate ordering platform to issue a certificate failed."[33]
On 26 March 2011, a person under the username "ComodoHacker" verified that they were the attacker by posting the private keys online[34] and posted a series of messages detailing how poor Comodo's security is and bragging about his abilities:[35][36]
I hacked Comodo from InstantSSL.it, their CEO's e-mail address mfpenco@mfpenco.com
Their Comodo username/password was: user: gtadmin password: globaltrust
Their DB name was: globaltrust and instantsslcms
Enough said, huh? Yes, enough said, someone who should know already knows...
Anyway, at first I should mention we have no relation to Iranian Cyber Army, we don't change DNSes, we
just hack and own.
I see Comodo CEO and other wrote that it was a managed attack, it was a planned attack, a group of
cyber criminals did it, etc.
Let me explain:
a) I'm not a group, I'm single hacker with experience of 1000 hacker, I'm single programmer with
experience of 1000 programmer, I'm single planner/project manager with experience of 1000 project
managers, so you are right, it's managed by 1000 hackers, but it was only I with experience of 1000
hackers.
Such issues have been widely reported, and have led to criticism of how certificates are issued and revoked.[37][38][39][40] As of 2016, all of the certificates remain revoked.[28] Microsoft issued a security advisory and update to address the issue at the time of the event.[41][42]
For Comodo's lacking response on the issue computer security researcher Moxie Marlinspike called the whole event extremely embarrassing for Comodo and rethinking SSL security. It was also implied that the attacker followed an online video tutorial and searched for basic opsec[29]
Such attacks are not unique to Comodo – the specifics will vary from CA to CA, RA to RA, but there are so many of these entities, all of them trusted by default, that further holes are deemed to be inevitable.[43]
Association with PrivDog
[edit]In February 2015, Comodo was associated with a man-in-the-middle enabling tool known as PrivDog, which claims to protect users against malicious advertising.[44]
PrivDog issued a statement on 23 February 2015, saying, "A minor intermittent defect has been detected in a third party library used by the PrivDog standalone application which potentially affects a very small number of users. This potential issue is only present in PrivDog versions, 3.0.96.0 and 3.0.97.0. The potential issue is not present in the PrivDog plug-in that is distributed with Comodo Browsers, and Comodo has not distributed this version to its users. there are potentially a maximum of 6,294 users in the USA and 57,568 users globally that this could potentially impact. The third party library used by PrivDog is not the same third party library used by Superfish....The potential issue has already been corrected. There will be an update tomorrow which will automatically update all 57,568 users of these specific PrivDog versions."[45]
Certificates issued to known malware distributors
[edit]In 2009 Microsoft MVP Michael Burgess accused Comodo of issuing digital certificates to known malware distributors.[46] Comodo responded when notified and revoked the certificates in question, which were used to sign the known malware.[47]
Chromodo browser, ACL, no ASLR, VNC weak authentication
[edit]In January 2016, Tavis Ormandy reported that Comodo's Chromodo browser exhibited a number of vulnerabilities, including disabling of the same-origin policy.[48]
The vulnerability wasn't in the browser itself. Rather, the issue was with an add-on. As soon as Comodo became aware of the issue in early February 2016, the company released a statement and a fix: "As an industry, software in general is always being updated, patched, fixed, addressed, improved – it goes hand in hand with any development cycle...What is critical in software development is how companies address an issue if a certain vulnerability is found – ensuring it never puts the customer at risk." Those using Chromodo immediately received an update.[49] The Chromodo browser was subsequently discontinued by Comodo.
Ormandy noted that Comodo received a "Excellence in Information Security Testing" award from Verizon despite the vulnerability in its browser, despite having its VNC delivered with a default of weak authentication, despite not enabling address space layout randomization (ASLR), and despite using access control lists (ACLs) throughout its product. Ormandy has the opinion that Verizon's certification methodology is at fault here.[50]
Let's Encrypt trademark registration application
[edit]In October 2015, Comodo applied for "Let's Encrypt", "Comodo Let's Encrypt", and "Let's Encrypt with Comodo" trademarks.[51][52][53] These trademark applications were filed almost a year after the Internet Security Research Group, parent organization of Let's Encrypt, started using the name Let's Encrypt publicly in November 2014,[54] and despite the fact Comodo's "intent to use" trademark filings acknowledge that it has never used "Let's Encrypt" as a brand.
On 24 June 2016, Comodo publicly posted in its forum that it had filed for "express abandonment" of their trademark applications.[55]
Comodo's Chief Technical Officer Robin Alden said, "Comodo has filed for express abandonment of the trademark applications at this time instead of waiting and allowing them to lapse. Following collaboration between Let's Encrypt and Comodo, the trademark issue is now resolved and behind us, and we'd like to thank the Let's Encrypt team for helping to bring it to a resolution."[56]
Dangling markup injection vulnerability
[edit]On 25 July 2016, Matthew Bryant showed that Comodo's website is vulnerable to dangling markup injection attacks and can send emails to system administrators from Comodo's servers to approve a wildcard certificate issue request which can be used to issue arbitrary wildcard certificates via Comodo's 30-Day PositiveSSL product.[57]
Bryant reached out in June 2016, and on 25 July 2016, Comodo's Chief Technical Officer Robin Alden confirmed a fix was put in place, within the responsible disclosure date per industry standards.[58]
See also
[edit]- Comparison of antivirus software
- Comparison of computer viruses
- Internet Security
- Comparison of firewalls
References
[edit]- ^ a b "How US entrepreneur's global internet security firm started life in Bradford". Telegraph & Argus. 3 September 2014. Retrieved 3 September 2014.
- ^ Hallam-Baker, P.; Stradling, R. (2013). "DNS Certification Authority Authorization – Comodo". doi:10.17487/RFC6844. S2CID 46132708. Retrieved 14 January 2013.
- ^ "Comodo Sells Certificate Business to Private Equity Firm | SecurityWeek.Com". www.securityweek.com. 31 October 2017. Retrieved 29 October 2019.
- ^ Murphy, Ian (2 November 2018). "Comodo CA becomes Sectigo and expands to cover IoT -". Enterprise Times. Retrieved 21 November 2019.
- ^ "Comodo CA launches IoT security platform". BetaNews. 28 June 2018. Retrieved 29 October 2019.
- ^ Perry, Jessica (3 July 2018). "Comodo CA global HQ coming to Roseland". NJBIZ. Retrieved 29 October 2019.
- ^ Novinson, Michael (16 August 2018). "Comodo CA Buys Website Disaster Recovery Startup CodeGuard". CRN. Retrieved 29 October 2019.
- ^ "Comodo – Contact Us".
- ^ "Comodo CA Rebrands as Sectigo". Sectigo® Official. Retrieved 18 June 2024.
- ^ "Comodo Security Solutions, Inc". Icsalabs.com. Retrieved 30 March 2015.
- ^ Joe Callan. "Domainers Magazine – DNS.com : The Next Geo-Targeting Solution – Jul–Aug (Issue 22)". Domainersmagazine.com. Archived from the original on 12 April 2015. Retrieved 30 March 2015.
- ^ Ellen Messmer (14 February 2013). "Multivendor power council formed to address digital certificate issues". Network World. Archived from the original on 28 July 2013.
- ^ "Authentication Security News, Analysis, Discussion, & Community". Darkreading.com. Archived from the original on 10 April 2013. Retrieved 30 March 2015.
- ^ "SecurityPark". Archived from the original on 2 April 2015. Retrieved 30 March 2015.
- ^ "CA/Browser Forum". Cabforum.org. Retrieved 23 April 2013.
- ^ Wilson, Wilson. "CA/Browser Forum History" (PDF). DigiCert. Retrieved 23 April 2013.
- ^ "Industry Round Table May 17th 2005 – New York" (PDF). Retrieved 17 May 2005.
- ^ "Xcitium EDR".
- ^ Abdulhayoğlu, Melih (18 September 2010). "Challenge to Symantec from Comodo CEO". Comodo Group. Archived from the original on 25 January 2011. Retrieved 22 September 2010.
- ^ John Breeden II (27 September 2010). "Is free virus protection inferior?". gcn.com. Retrieved 23 December 2016.
- ^ Rubenking, Neil J. (22 September 2010). "Comodo Challenges Symantec to Antivirus Showdown". PC Magazine. Ziff Davis, Inc. Retrieved 22 September 2010.
- ^ "Challenge to Symantec from Comodo CEO!". Archived from the original on 15 August 2016. Retrieved 23 December 2016.
- ^ Ms. Smith. "AV-test Lab tests 16 Linux antivirus products against Windows and Linux malware". www.networkworld.com. Archived from the original on 7 October 2015. Retrieved 23 December 2016.
- ^ Erik Larkin (24 August 2009). "Comodo Internet Security Free Antivirus Software". www.pcworld.com. Retrieved 23 December 2016.
- ^ Daniele P. "Comodo 2016 Review: Malware Protection & Online Security". www.bestantivirus.com. Archived from the original on 28 December 2016. Retrieved 23 December 2016.
- ^ "Independent Tests of Anti-Virus Software". www.av-comparatives.org. Retrieved 23 December 2016.
- ^ Neil P. Rubenking. "The Best Free Antivirus Protection of 2016". www.pcmag.com. Retrieved 23 December 2016.[permanent dead link ]
- ^ a b c d e "Report of incident on 15-MAR-2011: Update 31-MAR-2011". Comodo group. Retrieved 24 March 2011.
- ^ a b "DEF CON 19 - Moxie Marlinspike - SSL And The Future Of Authenticity - YouTube". www.youtube.com. 2 November 2013. Archived from the original on 13 December 2021. Retrieved 13 January 2021.
- ^ Hallam-Baker, Phillip (23 March 2011). "The Recent RA Compromise". Comodo Blog. Retrieved 24 March 2011.[permanent dead link ]
- ^ "Iran accused in 'dire' net security attack". BBC News. 24 March 2011. Retrieved 23 December 2016.
- ^ "Update 31-MAR-2011". Retrieved 23 December 2016.
- ^ "Update 31-Mar-2011". Retrieved 23 December 2016.
- ^ Graham, Robert. "Verifying the Comodo Hacker's key".
- ^ Bright, Peter (28 March 2011). "Independent Iranian Hacker Claims Responsibility for Comodo Hack" (WIRED). Wired. Retrieved 29 March 2011.
- ^ "ComodoHacker's Pastebin". Pastebin.com. 5 March 2011. Retrieved 30 March 2015.
- ^ Eckersley, Peter (23 March 2011). "Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get?". EFF. Retrieved 24 March 2011.
- ^ "Iran accused in 'dire' net security attack" (BBC). BBC News. 24 March 2011. Retrieved 24 March 2011.
- ^ "Detecting Certificate Authority compromises and web browser collusion". TOR. 22 March 2011. Retrieved 24 March 2011.
- ^ Elinor Mills and Declan McCullagh (23 March 2011). "Google, Yahoo, Skype targeted in attack linked to Iran". CNET. Archived from the original on 25 March 2011. Retrieved 24 March 2011.
- ^ "Microsoft Security Advisory (2524375)" (Microsoft). Microsoft. 23 March 2011. Retrieved 24 March 2011.
- ^ "Microsoft Security Advisory: Fraudulent Digital Certificates could allow spoofing". Microsoft. 23 March 2011. Retrieved 24 March 2011.
- ^ "Independent Iranian Hacker Claims Responsibility for Comodo Hack". Wired. 28 March 2011. Archived from the original on 24 March 2016. Retrieved 23 December 2016.
- ^ Constantin, Lucian. "Worse than Superfish? Comodo-affiliated PrivDog compromises web security too". PC World. Retrieved 24 July 2024.
- ^ "PrivDog Security Advisory (Threat level: LOW)". Retrieved 23 December 2016.[permanent dead link ]
- ^ "Comodo continue to to[sic] issue certificates to known Malware - May 2009 - Forums".
- ^ "Microsoft MVP Mike Burgess Responds To Comodo's CEO On Comodo Certificates Issued To Malware Distributors". Retrieved 23 December 2016.
- ^ https://code.google.com/p/google-security-research/issues/detail?id=704 |title=Comodo "Chromodo" Browser disables same origin policy, Effectively turning off web security
- ^ "Comodo will fix major flaw in knock-off Chrome browser". 4 February 2016. Retrieved 23 December 2016.
- ^ Why Antivirus Standards of Certification Need to Change, tripwire, 23 March 2016.
- ^ "Trademark Status & Document Retrieval". tsdr.uspto.gov. Retrieved 23 June 2016.
- ^ "Trademark Status & Document Retrieval". tsdr.uspto.gov. Retrieved 23 June 2016.
- ^ "Trademark Status & Document Retrieval". tsdr.uspto.gov. Retrieved 23 June 2016.
- ^ Tsidulko, Joseph (19 November 2014). "Let's Encrypt, A Free And Automated Certificate Authority, Comes Out Of Stealth Mode". CRN. Retrieved 23 June 2016.
- ^ "Topic: Trademark registration". Archived from the original on 8 November 2020. Retrieved 24 June 2016.
- ^ "Comodo Stands Down From Trademark Tussle with Let's Encrypt". 27 June 2016. Retrieved 23 December 2016.
- ^ "Keeping Positive – Obtaining Arbitrary Wildcard SSL Certificates from Comodo via Dangling Markup Injection". thehackerblog.com. 25 July 2016. Retrieved 29 July 2016.
- ^ "Keeping Positive – Obtaining Arbitrary Wildcard SSL Certificates from Comodo via Dangling Markup Injection". 25 July 2016. Retrieved 23 December 2016.
External links
[edit]- Software companies established in 1998
- Certificate authorities
- Computer security software companies
- International information technology consulting firms
- Software companies based in New Jersey
- Software companies of the United Kingdom
- 1998 establishments in the United Kingdom
- Companies based in Passaic County, New Jersey
- Clifton, New Jersey
- Software companies of the United States