Malware Intelligence Software Provides Tokens for Information Sharing
The sharing of data will aid in the development of anti-malware programs, similar to “an Internet-wide neighbourhood watch.”
Cybersecurity marketplace PolySwarm has released a browser extension that enables clients to earn native token nectar (NCT) while browsing the web.
Polyswarm utilises crowdsourcing to discover dangers for its commercial clients, such as Microsoft, Verizon, and eBay. The new plug-in will provide PolySwarm access to client data, which can subsequently be used to develop malware-prevention solutions.
PolySwarm’s creator and CEO, Steve Bassi, told Blockworks that he and other security specialists built the cybersecurity marketplace to generate “more cash from detection technologies that were previously going underused.”
The most recent NectarNet addition requests that users donate their unique Internet vantage points to the 500k-1m malware samples that PolySwarm currently creates. The plugin is compatible with Chrome, Brave, and Firefox, and users are required to register it with their PolySwarm account.
According to Bassi, the gathered data may be used to establish what malicious domain name and IP address were associated within a particular region and at a certain time.
According to him, “this data may reveal a great deal more about the attack network behind a particular malware infection to the cybersecurity professional.” By reporting this DNS data while a NectarNet user surfs the Internet, they function as a type of Internet-wide neighbourhood watch.
Only large organisations, like Comcast, CloudFare, and Google, are already collecting this sort of information.
At the time of writing, the NCT token of PolySwarm has a market value of around $28 million and is trading at $0.018.
“Users should be ecstatic since this is the first time we’ve ever compensated regular Internet users for their cyber security-relevant data,” Bassi added. Access to passive DNS data sets is becoming more difficult as large firms consolidate them and/or make them prohibitively costly for small to mid-sized cybersecurity teams.