Categories: Security

Trend Micro Signs National Crime Agency Partnership Deal

IT security firm Trend Micro said it has signed a Memorandum of Understanding with the National Crime Agency (NCA) that will see the formation of a closer working relationship with the law enforcement body.

The NCA leads the UK’s actions against serious and organised crime, and the deal is a sign of the increasing attention being paid to cyber-crime in the law enforcement world.

Virtual team

Under the terms of the agreement Trend and the NCA will form a cross-organisation virtual team that will work on new ways of addressing specific cyber-crime threats, and will share information on attacks. Trend’s Forward Looking Threat Research (FTR) team is to work with the NCA to share intelligence for potential law-enforcement action.

The two organisations already work together, but until now information-sharing has been on an informal, ad-hoc basis, Trend said.

“Nowadays law enforcement can’t always do cyber crime investigations on its own and neither can industry,” said Robert McArdle, EMEA manager for FTR at Trend Micro, in a statement. “We’re both parts of the same puzzle.”

The NCA said the agreement broadens the resources it can bring to tackling cyber-crime.

“Utilising and sharing the expertise of Trend Micro will allow us to further understand and respond to emerging and evolving cyber crime threats to the UK,” stated NCA head of intelligence and tasking Steven Heywood.

Interpol swoop

Under the agreement, the NCA will be able to draw on the expertise of Trend staff as well as its cloud-based threat data analytics platform.

Trend worked with Spanish law enforcement bodies in the arrest of Reveton ransomware gang members in 2013, and last year signed a three-year deal that will see it collaborate more closely with Interpol.

Trend said it participated in the Interpol industry collaboration that dismantled the Simda botnet in April.

The 9 April operation, organised by Interpol’s Global Complex for Innovation (IGCI) in Singapore, involved the seizure of 10 command-and-control servers in the Netherlands, in addition to servers targeted in the other countries. It was carried out in cooperation with police forces in the Netherlands, the US, Russia, Luxembourg and Poland.

Interpol, which didn’t disclose the operation until late on Monday, said it worked with Microsoft’s Digital Crimes Unit, which provided large-scale data analytics, as well as Kaspersky Lab, Trend and Japan’s Cyber Defence Institute. These organisations helped construct a “heat map” indicating the worldwide spread of Simda infections and pinpointing its command servers, Interpol said.

Are you a security pro? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago