content writer
  • Containment
1 Star2 Stars3 Stars4 Stars5 Stars

CryptoWall vs Comodo Containment

CryptoWall vs Comodo Containment

CryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads.

comodo containment

Here’s how it works:

1. CryptoWall installs itself on your computer.

2. CryptoWall phones home by contacting the server belonging to CyberCrooks.

3. The CyberCrook server creates two keys: one for your computer, and the other is kept by CyberCrooks.

4. CryptoWall locks every file it can on your computer, including documents and images.

5. CryptoWall displays a ransom screen, demanding hundreds of dollars to unlock your files.

But, when CryptoWall meets Comodo’s Containment technology, any new and unknown file goes into Containment—and the results are devastating to CryptoWall:

1. CryptoWall tries to install itself on your computer.

2. CryptoWall FAILS miserably…because, with Comodo Containment, malware can’t alter hard disk data—it is isolated within a virtual space which Comodo provides you.

3. Another safe and secure Comodo user

Comodo is the only antivirus company that brings battle tested, proven containment technology to enterprise.

Check out how the World’s First Automatic Containment Technology works


Stay in the loop

Sign up to our cyber security newsletter