Domain Name Wire

Domain Name Wire

Displaying posts under "Policy & Law"

  • WIPO panel denies UDRP on WUP.com

    1. BY - Dec 19, 2014
    2. Policy & Law
    3. 2 Comments

    Complainant probably didn’t exist when domain name was registered.

    A World Intellectual Property Organization panel has denied a UDRP attempt on the three letter domain name WUP.com.

    The complaint was filed by Wengenroth & Partner, an German SEO and online marketing firm. It appears the company didn’t even exist when the respondent register the domain name in 2008.

    The single member panel found that the complainant did not prove a lack of rights or legitimate interests, nor did it prove the domain name was registered in bad faith.

    It’s worth noting that the complainant uses wengenroth-und-partner.de as its website, not even WUP.de.

    The panel didn’t consider the issue of reverse domain name hijacking. I suspect the respondent didn’t ask for it (he was self-represented), but the panelist still should have considered it.

  • Union Bank loses cases against gripe websites

    1. BY - Dec 18, 2014
    2. Policy & Law
    3. 2 Comments

    Former customer registered ten domain names to air grievances about the bank.

    Union BankUnion Bank has lost three domain name arbitration cases involving an upset former customer.

    The bank filed three separate actions covering UnionBank.me, unionbancal.co, unionbank.cc, union-bank.co, mufgunionbankna.com, unionbancalcorp.com, unionbancal.net, unionbancal.org, unionbankna.com and unionbanks.net.

    The domain names were all registered by William Bookout. At one point, his company had a Small Business Administration Loan with the bank. His loan went into default and he later filed bankruptcy, according to the decision. He was upset with how the bank handled his loan, so he created a number of gripe sites. Click here to continue reading…

  • ICANN hacked, zone file system among victims

    1. BY - Dec 17, 2014
    2. Policy & Law
    3. 2 Comments

    Hackers phished ICANN employees to gain access to systems.

    ICANN revealed today that its systems were compromised by a phishing attack.

    The attack involved emails designed to look like they came from ICANN’s own domain name being sent to members of its staff. Email credentials of several ICANN staff members were obtained.

    It appears the biggest system to be accessed as a result of the security breach was The Centralized Zone Data System (CZDS). This system is a repository for zone files from each registry, updated daily. Many bloggers use this system to download zone file data.

    According to ICANN, the attacker gained access copies of the zone files in the system, as well as information entered by users such as name, postal address, email address, fax and telephone numbers, username and password. It says the passwords were stored as salted cryptographic hashes, but it has reset all passwords as a precaution.

    Was CZDS the target of the attack, or was it just one of the few systems the attackers could access with the obtained credentials?

    Given the current struggle over the transition of certain internet management functions away from the U.S. government, ICANN could become a target for future politically-motivated attacks. There could certainly be Sony-like emails that people would like to get their hands on.

    The attack occurred in November, and ICANN discovered that the compromised credentials were used to access the CZDS in December. ICANN says notice of the issue was not delayed as a result of a law enforcement investigation.

  • See all 152 trademark apps filed by the Trademark King (at a cost of $50k!)

    1. BY - Dec 16, 2014
    2. Policy & Law
    3. 13 Comments

    Guy spends nearly $50,000 on application fees to try to trademark terms such as Google.com, NCAA Final Four and Elvis.com.

    I’ve written a couple times about Trademark King Inc, an Indiana business that filed a lot of trademark applications matching mostly famous names and common terms.

    The company has filed 152 applications, according to a search on Trademark247. Most were filed around Thanksgiving, and many of them exactly match a celebrity name or famous brand (or its domain name). Many of the others are for common terms related to commerce. Only a handful have anything to do with Trademark King’s business.

    The scale of the filings is really quite ridiculous. At $325 per application, it comes out to almost $50,000 in trademark application fees.

    As best I can tell, Trademark King didn’t submit a specimen showing use in commerce for any of the applications. They all list goods and services of “Brand development and evaluation services in the field of trademarks, trade names, and domain names.; Creating trademarks for others”.

    What is Trademark King up to? You can get a hint in this previous post. I called the owner of the company (which was formed October 30) to get further comment after seeing his flurry of filings, but he hasn’t called me back.

    Here’s the list: Click here to continue reading…

  • Best fake name used in a domain name scam. Ever.

    1. BY - Dec 15, 2014
    2. Policy & Law
    3. 4 Comments

    I don’t think think this scammer meant to be so funny.

    By now, pretty much everyone has seen the Fake Trademark Protection domain name scam, sometimes called the Asian Domain Scam.

    Here’s how it works: A scammer, typically pretending to be an Asian domain name registrar, sends an email to the owner of a domain name and says that someone else is trying to register domain names using the same brand. The scammer says they’re reaching out as a courtesy. If the recipient doesn’t respond, the scammer says it will go forward with registering the domain names. The con is to try to get you to register the domains as a preventative measure.

    Most of these scam emails identify the name of the purported company trying to register the “brand” in various ccTLDs. My wife got one of these emails over the weekend, and the name of the purported company is, well, quite hilarious. Click to continue reading…