Categories: Security

Trend Micro Signs National Crime Agency Partnership Deal

IT security firm Trend Micro said it has signed a Memorandum of Understanding with the National Crime Agency (NCA) that will see the formation of a closer working relationship with the law enforcement body.

The NCA leads the UK’s actions against serious and organised crime, and the deal is a sign of the increasing attention being paid to cyber-crime in the law enforcement world.

Virtual team

Under the terms of the agreement Trend and the NCA will form a cross-organisation virtual team that will work on new ways of addressing specific cyber-crime threats, and will share information on attacks. Trend’s Forward Looking Threat Research (FTR) team is to work with the NCA to share intelligence for potential law-enforcement action.

The two organisations already work together, but until now information-sharing has been on an informal, ad-hoc basis, Trend said.

“Nowadays law enforcement can’t always do cyber crime investigations on its own and neither can industry,” said Robert McArdle, EMEA manager for FTR at Trend Micro, in a statement. “We’re both parts of the same puzzle.”

The NCA said the agreement broadens the resources it can bring to tackling cyber-crime.

“Utilising and sharing the expertise of Trend Micro will allow us to further understand and respond to emerging and evolving cyber crime threats to the UK,” stated NCA head of intelligence and tasking Steven Heywood.

Interpol swoop

Under the agreement, the NCA will be able to draw on the expertise of Trend staff as well as its cloud-based threat data analytics platform.

Trend worked with Spanish law enforcement bodies in the arrest of Reveton ransomware gang members in 2013, and last year signed a three-year deal that will see it collaborate more closely with Interpol.

Trend said it participated in the Interpol industry collaboration that dismantled the Simda botnet in April.

The 9 April operation, organised by Interpol’s Global Complex for Innovation (IGCI) in Singapore, involved the seizure of 10 command-and-control servers in the Netherlands, in addition to servers targeted in the other countries. It was carried out in cooperation with police forces in the Netherlands, the US, Russia, Luxembourg and Poland.

Interpol, which didn’t disclose the operation until late on Monday, said it worked with Microsoft’s Digital Crimes Unit, which provided large-scale data analytics, as well as Kaspersky Lab, Trend and Japan’s Cyber Defence Institute. These organisations helped construct a “heat map” indicating the worldwide spread of Simda infections and pinpointing its command servers, Interpol said.

Are you a security pro? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

The State of Quantum Security

No longer a technology on the distant horizon, quantum computing brings with it security challenges…

8 hours ago

US Carmakers Warn Over Upcoming Electric Vehicle Incentives

Climate and tax bill worth $430bn passed by US Congress last week could immediately eliminate…

9 hours ago

Mercedes-Benz And CATL To Build Massive EV Battery Plant In Hungary

Mercedes-Benz and world's biggest EV battery maker CATL to build 7.3bn euro battery plant in…

9 hours ago

ESA In Talks With SpaceX Over Launches To Replace Soyuz

European Space Agency confirms it is in talks with SpaceX over using Falcon 9 as…

10 hours ago

Disney Brings Ads To Streaming Platform As It Surpasses Netflix

Disney to introduce ad-supported version of Disney+ in December along with price hikes, as it…

10 hours ago

Meta Gathers AI Data As Chatbot Calls Zuckerberg ‘Creepy’

Facebook parent Meta gathers data from user interactions with latest chatbot as BlenderBot 3 criticises…

11 hours ago