CryptoWall vs Comodo Containment

August 17, 2015 | By Editor

CryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads.

Here’s how it works:

1. CryptoWall installs itself on your computer.

2. CryptoWall phones home by contacting the server belonging to CyberCrooks.

3. The CyberCrook server creates two keys: one for your computer, and the other is kept by CyberCrooks.

4. CryptoWall locks every file it can on your computer, including documents and images.

5. CryptoWall displays a ransom screen, demanding hundreds of dollars to unlock your files.

But, when CryptoWall meets Comodo’s Containment technology, any new and unknown file goes into Containment—and the results are devastating to CryptoWall:

1. CryptoWall tries to install itself on your computer.

2. CryptoWall FAILS miserably…because, with Comodo Containment, malware can’t alter hard disk data—it is isolated within a virtual space which Comodo provides you.

3. Another safe and secure Comodo user

Comodo is the only antivirus company that brings battle tested, proven containment technology to enterprise.

Check out how the World’s First Automatic Containment Technology works

Be Sociable, Share!

    Add new comment

    Your name
    Comment

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>