Category: RxINT

Eli Lilly Obtains Transfer Order of Hundreds of Revenue Domains Registered Using Compromised Identities

online protectionIn Eli Lilly and Company v Grace Beaumont et. al. (Claim Number FA1504001615093), represented by Stephanie A. Gumm of Faegre Baker Daniels, LLP, Eli Lilly succeeded in consolidating 392 domain names registered across several registrars, and using multiple aliases, in a single UDRP proceeding. The domains were all ordered to be transferred to Eli Lilly. In arguing for consolidation of Respondents, Complainant relied on testimony from Maccabim.com’s CEO Jonathan Matkowsky that the disputed domain names are under the control of a criminal network that uses false contact information to register domains, including compromised identities of innocent third persons. Maccabim’s testimony was supported by email correspondence received by the NATIONAL ARBITRATION FORUM from various named registrants of the disputed domain names who denied having registered the domain names.

DISCLAIMER: THE OPINIONS AND CHARACTERIZATION OF THE ELI LILLY DECISION REPRESENTS SOLELY THE VIEWS OF MACCABIM.COM LTD., AND SHOULD NOT BE CONSTRUED TO REFLECT THE VIEWS OR OPINIONS OF ELI LILLY OR ITS COUNSEL IN ANY WAY.

153 Roche Domains Registered with Stolen Identities Transferred in a Single Proceeding

 

 

Maccabim has been tracking down through OS-INT/CYBER-INT, the specific people on the ground that are responsible for operating the largest criminal network damaging  branded medicines and devices through the Internet. 

Without getting into the specifics  of our ongoing operation, we believe it is important to share developments in this area.

Maccabim recently supported F. Hoffmann-La Roche AG (Roche) in gathering the evidence used to demonstrate in a WIPO UDRP that 153 rogue online pharmacy sites exploiting Roche’s proprietary brands —all registered in the name of at least 90 nominally distinct different identities, including proxy and privacy services–are under common control or ownership. This allowed the domains to be consolidated into a single proceeding. To protect victims whose identities were stolen for trafficking in hazardous revenue domains, the Panel agreed to take the extraordinary step of redacting certain names from the published decision to protect innocent persons, notwithstanding that the domains were all ordered to be transferred.

Disclaimer: The opinions and characterization of the Roche decision represents solely the views of Maccabim.com Ltd., and should not be construed to reflect the views or opinions of Roche in any way.

 

Rogue Online Pharmacies Operating Behind Spoofed HTTP Status Codes

By Jonathan Matkowsky, Founder & CEO

GettyImages_84474325Government agencies and brand owners may believe they have successfully taken down sites, but it is critical to remember that HTTP status codes can be spoofed.  Moreover, the criminal networks operate from behind spoofed HTTP status codes. So the site looks down, but it’s actually in full operation visible only to those the criminals target.

At Yahoo!, we developed a “paranoid” mentality that comes in handy for online brand enforcement.  If your brand enforcement strategy does not seriously take  into account the possibility of spoofing HTTP status codes , then the worst criminal networks attacking your brand assets may actually be evading your initiatives. Worse, you may be paying vendors for successfully taking down sites that are up and running.  The criminals resort to stealth innovation to avoid disruption to their criminal activities.

We are not talking about the Dark Net here! We are talking about the open Internet! And the worst part about it is that while the site looks down, it looks completely different to the targeted audience.

To make matters worse, whether there is commercial use of your brand assets is actually often a legal factor that can influence the merits of a proceeding. If brand owners are not aware of how to go about detecting spoofed HTTP status codes, there may be serious legal consequences that are not only undeserved, but letting the worst criminal actors get away.

Rogue online pharmacies are not the only criminal networks operating from behind spoofed HTTP status codes. First of all, rogue online pharmacies often are involved in other criminal activities, ranging from fraudulent payday loans to complicated international money laundering schemes.  Second, any online criminal network exploiting your brand assets in any industry can operate from behind spoofed HTTP status codes. I would expect this practice is pervasive in industries ranging from footwear to apparel, from luxury goods to electronic accessories, just to name a few.

Maccabim develops cybercrime solutions to protect your brand & IP assets in an expansive digital world. To audit whether criminal networks are operating to exploit your brand from behind spoofed HTTP status codes, contactMaccabim today.

Photo Credit:  Olivier Auriol/Video Creatas/Getty Images

New Research Links Terrorist Activities and Product Counterfeiting

Three team members from Center for Anti-Counterfeiting and Product Protection, Michigan State University (A-CAPP) recently concluded and co-authored research examining the link between terrorist activities and product counterfeiting.   A-CAPP reported they uncovered ten prosecuted cases involving product counterfeiting that were linked to Jihadi or far-right extremists between 1996-2013. Apparently the impact for five of the schemes was over US$95 million. The vast majority of the cases originated with Hezbollah.

A backgrounder on the article is available here.