From memory, still waking up this morning, a lot of programs use cmd scripts and when it was enabled in CIS/CF it blocked a lot of those falsely but as
@Andy Ful already reminded me, it was also the case for any of the other hundreds of LOLbins using the same type of an attack. Andy's tools protect system services and block the likes of cmd with administrative privileges from accessing those. In the case of CyberLock, it's a behaviour detection. The point is that a file needs to be downloaded/installed and allowed to run that script whether it be legitamate or not and I can't recall an example of this attack being used so it is rare. Right, I have to get to work.