Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

03:20 PM
Connect Directly

U.N. Agency: Cybersquatting On The Rise

New data from the World Intellectual Property Organization, as well as from MarkMonitor, highlights problem of brand abuse online

The number of cybersquatting reports rose nearly 10 percent last year, according to a United Nations agency charged with protecting intellectual property worldwide.

The World Intellectual Property Organization (WIPO) said on Monday that a record-breaking 2,329 complaints of cybersquatting were filed with the agency in 2008 -- an 8 percent increase from 2007. Nearly half of the complaints came from U.S. organizations.

Among the industries hit most by cybersquatting were biotechnology and pharmaceuticals, which accounted for 9.9 percent of the complaints to WIPO; banking and finance, 9.4 percent; Internet and IT, 8.8 percent; retail, 8.1 percent; food, beverage, and restaurants, 7.2 percent; entertainment, 6.5 percent; media and publishing, 6.3 percent; fashion, 6.0 percent; and hotels and travel, 6.0 percent.

"Cybersquatting remains a serious issue for trademark holders. Supported especially by registrar and registry stakeholders, the sale and broad expansion of new top level domains in the open market, if not properly managed, will provide abundant opportunities for cybersquatters to seize old ground in new domains," said Francis Gurry, WIPO director general, in a statement.

WIPO's report jibes with a recently released study by MarkMonitor, which examined abuse of the top 30 brands and found that most of the same ones still get spoofed online. In its Annual Brandjacking Index for 2008, MarkMonitor found 80 percent of sites it first discovered in the first quarter of 2007 abusing brands were still alive and well in 2008. The abuse ranges from using a famous brand name just to drive traffic to the misrepresented site, to infecting visitors, according to MarkMonitor.

The WIPO report only scratches the surface of all of the ongoing abuse, according to MarkMonitor. "The rise in [WIPO] filings highlights how online brand abuse is a growth industry. However, the 2,300 UDRP [Uniform Domain Name Dispute Resolution Policy] filings in 2008 [to WIPO] are only a drop in the bucket when compared to the real scope of the problem of cybersquatting and other abuses of the domain name system," says Te Smith, vice president of communications for MarkMonitor. "In our latest Brandjacking Index, we saw on average 15,000 abuses per brand."

According to MarkMonitor's findings, the fourth quarter saw more than 440,000 cybersquatting incidents, 86,837 cases of false association, and 33,614 cases of pay-per-click abuse. And blended-abuse attacks, where cybersquatting is combined with malware and other abuses, are on the rise.

"In addition to the brand [abuse] component is a really scary component of...shoving brand names in metatags to [raise search engine optimization standings of a malicious] Web page to draw users there and get them infected," says Blake Hayward, vice president of product marketing for MarkMonitor.

Both the WIPO and MarkMonitor reports indicate that English-speaking countries are the biggest target of abuse. "While we didn't track the language being used on the abuse Web sites, the Brandjacking Index did note that English-speaking countries account for almost 80 percent of the top 15 countries hosting abuse sites, with the U.S. at 69 percent, the U.K. at 4 percent, Canada at 3 percent, and Australia at 2 percent," MarkMonitor's Smith says. "However, this could be a function of a robust Internet infrastructure in these countries."

Meanwhile, well-known brand names remain prime targets of abuse due to their familiarity and ability to drive traffic. "Ultimately, consumers pay the price for online brand abuse, as they are misled to sites that range from the annoying to the truly dangerous, with counterfeit goods, identity theft scams, or malware downloads," Smith says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-16
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.19), Mendix Applications using Mendix 8 (All versions < V8.17.0), Mendix Applications using Mendix 8 (V8.12) (All versions < V8.12.5), Mendix Applications using Mendix 8 (V8.6) (All versions <...
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to to plant custom binaries and execute them with System permissions. Exploitation of this issue requires user interaction.
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Improper Access control vulnerability when handling symbolic links. An unauthenticated attacker could exploit this to elevate privileges in the context of the current user.
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction.
PUBLISHED: 2021-04-16
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.