Met outfits cyber crime unit with real-time malware analysis tools

FALCON will deploy Bromium's virtualisation tools to trace malware attacks

The London Metropolitan Police Service is set to provide its cybercrime taskforce with new real-time forensic analysis tools, the force announced today.

The Met has tapped cyber security firm Bromium to provide the new capabilities, and its FALCON (Fraud And Linked Crime Online) cybercrime division will soon be using the company's micro-virtualisation technology to analyse malware samples in a fast, secure manner.

"The Met is committed to fighting cybercrime and works hard every day to catch and convict cybercriminals and support victims," said detective superintendent Neil Ballard. "Speed is an advantage when investigating these kinds of crime."

Bromium provides an advantage in this regard, the company's EMEA CTO Fraser Kyne told IT Pro, because running malware samples within Bromium generates forensic reports in near-real time.

"When you detonate malware inside a micro-VM, as soon as the micro-VM is closed, those forensics are instantly available," he said. "It really just takes away that triage thing and it jumps you straight from the point of the malware executing to giving you a visibility of what actually happened in the micro-VM."

Another touted benefit is that, because Bromium's virtualised environments are built with just the minimum amount of code needed to run malware samples, the signal-to-noise ratio is much better than with general purpose hypervisors. This allows officers and investigators to identify anomalies much more quickly.

"Like biological evidence, cyber evidence degrades over time," said the Met's Ballard. "Websites are taken down and the trail goes cold. Bromium can be used to instantly analyse and gather evidence. The victim can then be immediately advised how to mitigate the threat. Evidence collected can then be used to track down the criminal and secure convictions."

Kyne also pointed out that the virtualisation element of Bromium's product also means that the Met can safely run malware without the risk of infecting the rest of its network - which still includes thousands of Windows XP machines.

"When you're interacting with things that are of this nature, they are by their very nature unsafe to use, so we give them that protective bubble to be able to safely analyse the malware and to very quickly extract useful forensic information out of it," he said.

The news demonstrates the Met's attempts to get to grips with cyber crime, which has hit one in 10 Britons, according to ONS data. Including 5.8 million cyber offences in ONS figures for the first time last year led to England and Wales' crime rate doubling for 2016.

FALCON, launched in 2014, comprises 500 officers tasked with tackling cyber crimes that lead to financial loss - so malware, DDoS attacks and network intrusion crimes.

Think tank Reform recommended that police forces should be able to sack officers who don't have the skills to tackle cyber crime, in a report released in August.

Picture: Bigstock

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

Bank-targeting malware disguises itself as video conferencing software
Security

Bank-targeting malware disguises itself as video conferencing software

19 Oct 2020
What is hacktivism?
hacking

What is hacktivism?

13 Oct 2020
Microsoft: Iranian hackers are exploiting ZeroLogon flaw
Security

Microsoft: Iranian hackers are exploiting ZeroLogon flaw

6 Oct 2020
Your essential guide to internet security
Security

Your essential guide to internet security

23 Sep 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020