The PolySwarm Blog

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

How to buy PolySwarm Nectar using Uniswap

Mar 24, 2021 10:32:06 AM / by Blake Reyes posted in Explained, PolySwarm, Blockchain



Read More

Notice of coming changes for Engine developers

Feb 22, 2021 4:14:11 PM / by Nick Davis COO posted in Explained, Engine


Hello engine developers,

We are putting the finishing touches on the new backend systems used to manage engines/arbiters and handle bounties. Our goal is to release these changes into production in late March.


Our primary goal with these changes is to greatly simplify how engines are built, tested and run. And to change how they communicate with PolySwarm to be more in line with current industry standards for remote distributed services.

For those of you with existing engines connected to the marketplace, this will be a breaking change. We will provide instructions for how to update your engine to work with the new system. We are trying to make it as simple as possible.

For those who want to start a new engine, or even convert your engine to the new simpler engine framework, we will provide documentation and instructions to do so.

For any engines hosted by PolySwarm, we will update them to continue operating using the parameters they are currently configured with.

We will share a lot more information and more specific details very soon.

The following are more in-depth details for those who are interested.

Backend Changes

The first major difference is a change to a Webhook-based system to send bounties to engines. This means that engines need to run a HTTP service on a publicly available IP address/port for the webhook to communicate. The Webhook message will contain all of the information the engine needs to process a bounty, download the artifact, and return the result.

The second major difference is a change to remove the ETH wallet from the engine itself and into a PolySwarm-hosted wallet management system. We have received many complaints about the difficulty and problems with managing a wallet inside an engine, so we are separating them. This will function similarly to how a web-based crypto-currency exchange hosts a wallet for your account.

User Interface Changes

From the user interface perspective, we are adding administrative functionality to user and team accounts on to configure and manage engines, wallets, and webhooks. We will provide an example web service plus engine along with our documentation.

For each engine, you will be able to define an engine configuration. The following are some example configuration settings:
  • engine name, description, owner's website, tags
  • artifact type(s) supported
  • mimetype(s) supported
  • max file size supported
  • rate limit
  • webhook

For each account, you will be able to create an ETH wallet, which can then be used by your engine/arbiter. It will provide basic transfer functionality:
  • transfer NCT/ETH into the wallet
  • withdraw NCT/ETH from the wallet

For each account, you will be able to add one or more webhooks, which can then be used by your engines/arbiters. It will provide the standard webhook functionality:
  • create, test, delete the webhook

Marketplace Changes

From the marketplace perspective, PolySwarm will use engine configurations to determine which engines are sent a webhook for each bounty. PolySwarm will use responses to webhooks and bounties to track the status of each Engine. Engines can still choose not to process a bounty, by returning an “Unknown” verdict with no bid.

We will continue to use fake ETH/NCT (rinkeby) for the first month or two after these changes are released. We need thorough testing to ensure everything is working reliably, and then we can go to Mainnet.

Read More

Video: How to use PolySwarm's free command line interface to get intel on malware

Jan 23, 2020 11:18:09 AM / by PolySwarm Tech Team posted in Explained, Product



Read More

Latest samples of ZeroCleare, Iranian state-sponsored malware, available on PolySwarm

Jan 9, 2020 11:09:01 AM / by PolySwarm Tech Team posted in Insider, Explained, PolySwarm, Threat Hunting, Research


Today, PolySwarm, a threat intelligence platform used to detect new and emerging malware, releases information about a new variant of ZeroCleare (a destructive malware attributed to Iran). PolySwarm Community (free) and Enterprise users were able access to the full content of this sample before it appeared on VirusTotal.

Read More

Ginp banking Trojan actively targeting banks: here's what you need to know, plus free malware samples

Nov 22, 2019 9:11:52 AM / by PolySwarm Tech Team posted in Explained, PolySwarm, Research


Ginp is a banking Trojan that is actively being used to impersonate targeted banking apps. The malware brings up a screen on the victims phone and displays a window that mimics the real banking app. First, one is prompted to login with their credentials. The second screen steals the victim's credit card details.  

Read More

Get better threat intelligence with Metadata Searching in PolySwarm

Sep 10, 2019 9:07:38 AM / by PolySwarm Team posted in Explained, PolySwarm, Product



Read More

Latest phishing scam uses sneaky Google Calendar invite to bait potential victims with promise of iPhone

Sep 5, 2019 9:04:38 AM / by PolySwarm Team posted in Explained, PolySwarm, Product, Research


Do you ever see a mysterious calendar invite appear on your Google Calendar? If the answer is yes, there’s a good chance you are the victim of a calendar invite phishing scam. 

Read More

URL Scanning now available in PolySwarm

Aug 29, 2019 10:07:20 AM / by PolySwarm Team posted in Explained, PolySwarm, Product, Threat Bounty


The PolySwarm marketplace launched earlier this year, giving users the ability to gain intelligence on files from a competitive network of crowdsourced scanning engines from around the world. Now, PolySwarm users also have access to real-time information on suspect URLs, domains, and IPs.

Read More