Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:27 PM
Connect Directly

Product Watch: New Service Shuts Down Counterfeit-Brand Websites

An estimated $135 billion worth of counterfeit and pirated goods will be sold online in 2010, according to MarkMonitor

A new service rolled out today will shut down illicit Websites posing as a real brand or offering counterfeit and pirated products.

MarkMonitor's new Site Staydown Service evolved out of the company's anti-phishing operations center, which watches for financial fraud against its clients. "We're taking action on behalf of our clients" to shut down the offending Websites, says Fred Felman, CMO of MarkMonitor.

The company estimates that $135 billion worth of counterfeit and pirated goods will be sold online in 2010, with companies losing around $133 billion last year to these scams. To date, there has been little victims could do except respond long after the damage was done, and even then the scammers often come back online at another site if theirs eventually gets shut down, experts say.

Major apparel, transportation, and footwear companies participated in a pilot of the new Site Staydown Service, in which more than illicit 100 sites were taken down for selling goods purportedly from the real brand name.

Deborah Greaves, secretary and general counsel for True Religion Brand Jeans, said in a statement that online counterfeiters are difficult to catch, mainly due to the legal limitations of their international scope. "An option like the Site Staydown Service from MarkMonitor provides an effective alternative for brand owners to shut down infringing sites quickly, protecting consumers and reducing the profit potential for fraudsters," she said.

Some Websites basically turn a blind eye to the sale of counterfeit or pirated products, MarkMonitor's Felman says. "In a lot of cases, the site owners are unresponsive ... and there's no way to take direct, legal action," he says. "It's better to contact the ISP or registrar, but if you can't notify them or find them, the illegal activity's damage is done, and the damage to consumers is already done. Rather than go on indefinitely, we wanted to see what proactive action we could take for the stakeholders."

MarkMonitor's takedown service -- which is part of its MarkMonitor Brand Protection service -- makes the appropriate contacts to take down the illicit content or the Website itself, and then continues to monitor whether the URL is reinstated. "If it comes back, work again with the ISP or registrar" to take it down again, he says.

Pricing for the service depends on the length of time the monitoring service is set up, as well as the number of sites that it takes down. "Starting with a package of 10 shutdowns, it would be in the low five figures for a year of monitoring," Felman says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-26
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, [email protected]-----------------------------------------------------------!.
PUBLISHED: 2020-11-26
This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.
PUBLISHED: 2020-11-26
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
PUBLISHED: 2020-11-26
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.
PUBLISHED: 2020-11-26
A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.