Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
What is WannaCry 2.0 Ransomware?
WannaCry malware also referred to as WannaCrypt, WanaCrypt0r 2.0 or Wanna Decryptor, is a virus that combines a ransomware and a worm.
The WannaCry attack is considered to be the most widespread cyber attack in history. This unprecedented worldwide attack, with malware that encrypts data and demands a ransom of $300 in Bitcoins for the decrypting software, has been successful in infecting over 200,000 machines in 150 countries. The full extent of the infection is not known, yet.
The unprecedented outbreak was stopped from its routing run by a young British computer expert, Marcus Hutchins, who is pretty modest and states that he was just doing his job in stopping botnets. Hutchins, who had not wish to be named earlier, is considered to be a savior and he has in fact saved governments and organizations millions and millions of dollars, and an immeasurable amount of data.
How does it affect systems in a network?
The initial infection could have occurred by phishing or spearphishing attacks that tempt victims to click on links (malicious) or open attachments. Once this malware infects a machine or system it can quickly spread to other connected systems on the network, as well as random unconnected computers – using the EternalBlue exploit and DoublePulsar backdoor malware tools that had been developed by the NSA. EternalBlue is a remote code execution attack that exploits the SMBv1 vulnerability in Windows. Hutchins had discovered the “kill switch” when he was analyzing the malicious code. He became suspicious of a link to an unregistered web address. Based on his experience in blocking bots, he registered the web address and this triggered the kill switch.
A significant reduction in the spread of the infection was observed, but as cyber security experts warned, new variants of the malware were expected. As feared, WannaCry 2.0 ransomware arrived with no kill-switch. But, as it had a corrupted payload, it did not cause damage. It may not take long for improved variations to be released.
The WannaCry exploits vulnerabilities in Windows operating systems. The flaw is a vulnerability in the Windows Server Message Block (SMB) service which is used by Windows computers for sharing files and printers within a network.
The Microsoft Security Response Center has stated: “we are taking the highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003. Customers running Windows 10 were not targeted by the attack today.” Microsoft had earlier (much before the attack) released a patch for Windows 10 systems.
Who Are All Affected
U.K.’s National Health Service (NHS), NHS Scotland, Spain’s Telefonica, FedEx, Deutsche Bahn, LATAM Airlines, Renault, Nissan Motor Manufacturing, Chinese public security bureau, PetroChina, Ministry of Internal Affairs of the Russian Federation, Ministry of Foreign Affairs (Romania), Deutsche Bahn, Lakeridge Health, Russian Railways, Andhra Pradesh Police (India), and many others. The extent of infection is coming in.
How Comodo Advanced Endpoint Protection Prevents WannaCry Infection?
Comodo’s Advanced Endpoint Protection prevents WannaCry ransomware infections through its Containment technology. Comodo’s unique technology creates a completely virtual environment with virtual hard drive, virtual registry, and virtual COM interfaces. The malware will be able to perform all activities that it desires only to duplicate files in the virtual environment. All original files and data on the computer remain safe and intact. Whether it is ransomware or any other form of malware, Comodo’s Containment technology will prevent any type of infection.
Check out this video on how Comodo prevents WannaCry infection.https://www.youtube.com/watch?v=TVIhXwFJXMg&feature=youtu.be
Related Resources:
Antivirus
Ransomware Attack
Ransomware Protection Software
IT Tracking Software
Tags: Endpoint Protection,Endpoint security,wannacry ransomware
Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks, many companies today are looking for greater protection of their decentralized computing work environments from their Managed Service Providers (MSPs). As a result, MSPs need to deliver firewall solutions that are designed…
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is increasingly true for EU member states and the organizations that are based in or operate from these countries. The number of cyber-attacks targeting EU member states has risen. The…
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as that of a pandemic. This means that a building doesn’t necessarily have to be demolished or lives have to be lost for an unforeseen event to completely…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP