Hey Guys!
Here is the latest version of CyberLock that has implemented the new Attack Chains feature. Please keep in mind the Attack Chains feature is very new and there are tons of really cool features we will add soon. You will see colored arrows in the Attack Chain list. These are based on rules that we need to finish defining, so the colored arrows do not necessarily represent what actions CyberLock is going to take at each link of the chain. We have written most of the basic rules, but we need to tweak the rules a little and add a few more.
Ultimately, hopefully within a month or so, the colored arrows and rules will match CyberLock’s actions, and then we will be able to fully implement this new feature. It is actually going to be quite easy and fun to do, and we are a lot further along than I thought we would be. And if things go right, we might even be able to do away with the command lines feature altogether, and instead of having a Whitelist, we will have an App list, Web App list, Vulnerable App list, etc. It is difficult to explain, but it is going to be very cool. We will also be able to eliminate most of the remaining unwanted blocks.
Some of the rules for the new attack chain feature are already implemented and auto allowing items that would otherwise be blocked. You can search the developer log for “RuleID: 77” to see these items.
So we have a little more work to do, but I wanted you guys to see what the new attack chains feature is all about, because trust me, there are going to be tons of really cool things we can do with it.
It takes an hour or so to start really building up the attack chain list in CyberLock Settings. In fact, if you restart your computer after installing the new version, it will add a lot of them pretty quick.
This version is completely stable, but it is labeled a beta because there is a super small chance that one of the rules that are already implemented is not correct, so I just want you guys to be aware of this so you can be extra careful until we have the rules where we want them.
You guys will understand pretty quickly how this new feature works, but basically, if you see a red arrow, that means CyberLock should block the attack chain at that point. Like I was saying, the rules are not 100% right yet, so if you see any attack chains that do not seem correct, please let me know and we can fix it. Once they are all fixed, we will fully implement the rules so that CyberLock will block the attack chains at the red arrows. BTW, if you see any white arrows, please let me know, that means that none of the rules were applied to the arrow.
Green arrows: System Processes
Blue arrows: Allow / Benign / Safe
Red arrows: Block / Malicious / Not Safe
CyberLock 7.53 beta
SHA-256: 6edee845df7afdfa09db64e7491bb5ac3378c31bc99ee0f7d96342cb8b6e20d0
View attachment 279407
Have a great weekend!
Dan