Risk

11/19/2008
07:33 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LegitScript Shuts Down 500 No-Prescription-Required Online Pharmacies

Web sites fueling prescription drug abuse, selling non-FDA approved drugs taken offline

ARLINGTON, Va., Nov. 18 /PRNewswire/ -- LegitScript, an online pharmacy certification program, announced today that it has succeeded in getting nearly 500 "rogue" Internet pharmacy websites shut down.

The sites had been selling prescription drugs or steroids without requiring a prescription, a practice that is illegal and considered unsafe by medical authorities. In most cases, the drugs were sold from outside of the United States.

"The Internet is a safer place today because these illicit prescription drug websites have been terminated," said John Horton, LegitScript's President.

Among the domain name registrars to take the lead in shuttering the rogue Internet pharmacies was Directi. Horton praised the domain name registrars that terminated the rogue Internet pharmacies. "Directi, in particular, has been a leader in fighting rogue Internet pharmacies, and has steadily demonstrated its commitment to Internet safety by refusing to sponsor websites engaged in spam, malware, the illicit sale of prescription or other drugs, or similar activities."

The takedown also won praise from Internet safety proponents and prescription drug abuse experts. Susan Foster, Vice President at The National Center on Addiction and Substance Abuse at Columbia University (CASA), said, "CASA congratulates LegitScript for its successful shut down of hundreds of illegal Internet prescription drug trafficking sites. This work, done in cooperation with website registrars like Directi, provides a model that all website registrars should immediately adopt."

The websites were members of "online pharmacy affiliate programs" that allow people without any training as a pharmacist to operate their own online pharmacy and share in profits from the sale of prescription drugs without a valid prescription.

"Our family applauds the termination of these rogue online pharmacies," said Dan Pearson, whose son, Justin Pearson, overdosed and died after ordering drugs from a rogue Internet pharmacy. "Directi and other registrars that are taking a stand against these illicit Internet pharmacy affiliate networks are helping prevent future tragedies."

LegitScript is the largest online pharmacy verification service in the United States and has approved 185 online pharmacies as having met its baseline standards for legitimacy and safety. LegitScript does not accept payment or funding from the online pharmacies it reviews and approves.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12538
PUBLISHED: 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage...
CVE-2018-12684
PUBLISHED: 2018-06-22
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
CVE-2018-12687
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.
CVE-2018-12688
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has a segmentation fault in the wav2Decode function.
CVE-2018-10002
PUBLISHED: 2018-06-22
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.