Risk

2/18/2010
12:27 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Product Watch: New Service Shuts Down Counterfeit-Brand Websites

An estimated $135 billion worth of counterfeit and pirated goods will be sold online in 2010, according to MarkMonitor

A new service rolled out today will shut down illicit Websites posing as a real brand or offering counterfeit and pirated products.

MarkMonitor's new Site Staydown Service evolved out of the company's anti-phishing operations center, which watches for financial fraud against its clients. "We're taking action on behalf of our clients" to shut down the offending Websites, says Fred Felman, CMO of MarkMonitor.

The company estimates that $135 billion worth of counterfeit and pirated goods will be sold online in 2010, with companies losing around $133 billion last year to these scams. To date, there has been little victims could do except respond long after the damage was done, and even then the scammers often come back online at another site if theirs eventually gets shut down, experts say.

Major apparel, transportation, and footwear companies participated in a pilot of the new Site Staydown Service, in which more than illicit 100 sites were taken down for selling goods purportedly from the real brand name.

Deborah Greaves, secretary and general counsel for True Religion Brand Jeans, said in a statement that online counterfeiters are difficult to catch, mainly due to the legal limitations of their international scope. "An option like the Site Staydown Service from MarkMonitor provides an effective alternative for brand owners to shut down infringing sites quickly, protecting consumers and reducing the profit potential for fraudsters," she said.

Some Websites basically turn a blind eye to the sale of counterfeit or pirated products, MarkMonitor's Felman says. "In a lot of cases, the site owners are unresponsive ... and there's no way to take direct, legal action," he says. "It's better to contact the ISP or registrar, but if you can't notify them or find them, the illegal activity's damage is done, and the damage to consumers is already done. Rather than go on indefinitely, we wanted to see what proactive action we could take for the stakeholders."

MarkMonitor's takedown service -- which is part of its MarkMonitor Brand Protection service -- makes the appropriate contacts to take down the illicit content or the Website itself, and then continues to monitor whether the URL is reinstated. "If it comes back, work again with the ISP or registrar" to take it down again, he says.

Pricing for the service depends on the length of time the monitoring service is set up, as well as the number of sites that it takes down. "Starting with a package of 10 shutdowns, it would be in the low five figures for a year of monitoring," Felman says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.