From the Comodo Think Tank: SpyEye Malware versus Comodo Containment

The engineers of Comodo today outlined how Comodo’s containment technology keeps computers safe from SpyEye, a type of malware which cybercriminals use to steal online banking credentials, credit card data, passwords, and other personal information.

SpyEye has infected more than 1.4 million computers globally, and its silent attack means it is delivering confidential information straight to criminals.

The SpyEye malware works like this:

  1. SpyEye uses in-memory injection, a technique used for running unauthorized code within computer processes
  2. SpyEye’s injected code then “hooks” into textboxes and collects all of the information are person would type: login credentials, passwords, credit card information, and any other type of confidential information
  3. The malware delivers the sensitive information straight to the cybercriminals

But when SpyEye meets computers and IT infrastructures armed with Comodo’s patent pending containment technology, the results are devastating for SpyEye

  1. SpyEye tries to inject its malicious code
  2. SpyEye FAILS—miserably. With Comodo containment technology, malware simply cannot inject code into other processes
  3. With SpyEye’s failure, another happy and secure Comodo customer

How does Skylock Malware stack up against Comodo containment: Shylock vs Comodo Containment

What happens when Cryptolocker meets up with Comodo containment: Cryptolocker vs Comodo’s Containment Technology