I wonder whether comodo containment technology will be able to prevent this threat.
Wasn’t really that much information in that article but assuming that it uses a vulnerability to put an executable on the victim’s computer and then run it then yes the sandbox should contain the malicious executable… But that’s assuming it uses an executable, I don’t know how it actually works.