CryptoWall vs Comodo Containment

August 17, 2015 | By Editor
1 Star2 Stars3 Stars4 Stars5 Stars

CryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads.

comodo containment

Here’s how it works:

1. CryptoWall installs itself on your computer.

2. CryptoWall phones home by contacting the server belonging to CyberCrooks.

3. The CyberCrook server creates two keys: one for your computer, and the other is kept by CyberCrooks.

4. CryptoWall locks every file it can on your computer, including documents and images.

5. CryptoWall displays a ransom screen, demanding hundreds of dollars to unlock your files.

But, when CryptoWall meets Comodo’s Containment technology, any new and unknown file goes into Containment—and the results are devastating to CryptoWall:

1. CryptoWall tries to install itself on your computer.

2. CryptoWall FAILS miserably…because, with Comodo Containment, malware can’t alter hard disk data—it is isolated within a virtual space which Comodo provides you.

3. Another safe and secure Comodo user

Comodo is the only antivirus company that brings battle tested, proven containment technology to enterprise.

Check out how the World’s First Automatic Containment Technology works

Be Sociable, Share!

    Add new comment

    Your name

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


    What Hidden Threats LurkOn Your Endpoints?

    Get complete security from known and unknown threats from Comodo Endpoint Protection

    free threat scan