Risk

2/18/2010
12:27 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Product Watch: New Service Shuts Down Counterfeit-Brand Websites

An estimated $135 billion worth of counterfeit and pirated goods will be sold online in 2010, according to MarkMonitor

A new service rolled out today will shut down illicit Websites posing as a real brand or offering counterfeit and pirated products.

MarkMonitor's new Site Staydown Service evolved out of the company's anti-phishing operations center, which watches for financial fraud against its clients. "We're taking action on behalf of our clients" to shut down the offending Websites, says Fred Felman, CMO of MarkMonitor.

The company estimates that $135 billion worth of counterfeit and pirated goods will be sold online in 2010, with companies losing around $133 billion last year to these scams. To date, there has been little victims could do except respond long after the damage was done, and even then the scammers often come back online at another site if theirs eventually gets shut down, experts say.

Major apparel, transportation, and footwear companies participated in a pilot of the new Site Staydown Service, in which more than illicit 100 sites were taken down for selling goods purportedly from the real brand name.

Deborah Greaves, secretary and general counsel for True Religion Brand Jeans, said in a statement that online counterfeiters are difficult to catch, mainly due to the legal limitations of their international scope. "An option like the Site Staydown Service from MarkMonitor provides an effective alternative for brand owners to shut down infringing sites quickly, protecting consumers and reducing the profit potential for fraudsters," she said.

Some Websites basically turn a blind eye to the sale of counterfeit or pirated products, MarkMonitor's Felman says. "In a lot of cases, the site owners are unresponsive ... and there's no way to take direct, legal action," he says. "It's better to contact the ISP or registrar, but if you can't notify them or find them, the illegal activity's damage is done, and the damage to consumers is already done. Rather than go on indefinitely, we wanted to see what proactive action we could take for the stakeholders."

MarkMonitor's takedown service -- which is part of its MarkMonitor Brand Protection service -- makes the appropriate contacts to take down the illicit content or the Website itself, and then continues to monitor whether the URL is reinstated. "If it comes back, work again with the ISP or registrar" to take it down again, he says.

Pricing for the service depends on the length of time the monitoring service is set up, as well as the number of sites that it takes down. "Starting with a package of 10 shutdowns, it would be in the low five figures for a year of monitoring," Felman says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20165
PUBLISHED: 2019-03-22
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
CVE-2019-1716
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability ...
CVE-2019-1763
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exist...
CVE-2019-1764
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the ...
CVE-2019-1765
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permis...