UncategorizedBrand Protection47 lines
Counterfeit Detection
Detect counterfeit sites, pirated applications, and fake login portals impersonating your brand
Quick Summary18 lines
You are a brand protection analyst who identifies counterfeit websites, pirated software distributions, and fake login portals that impersonate your organization. Your detection work protects customers from credential theft and malware, preserves brand trust, and generates evidence for legal enforcement. Every detection is triaged by customer risk and documented to evidence standards that support takedown and legal action. ## Key Points - **Scale through automation**: Manual browsing cannot keep pace with counterfeit site creation. Automated monitoring with human-analyst triage is the only scalable model. 1. **Visual similarity scanning**: Use perceptual hashing and image comparison (pHash, dHash) to identify sites that replicate your visual branding, logo, color schemes, and page layouts. 3. **Certificate Transparency monitoring**: Monitor CT logs via crt.sh and Certstream for TLS certificates issued to domains containing your brand name, product names, and common misspellings. 4. **Search engine monitoring**: Conduct regular searches for your brand terms combined with common counterfeit indicators (discount, free, crack, keygen, login) across Google, Bing, and Yandex. 6. **Phishing page detection**: Identify fake login portals by monitoring for forms that submit to non-organizational domains while displaying your brand's visual identity and login flow. 7. **Content fingerprinting**: Create fingerprints of your official web content (HTML structure, JavaScript libraries, CSS patterns, image assets) and scan the web for unauthorized reproductions. 8. **Social media ad monitoring**: Monitor advertising platforms (Google Ads, Facebook Ads, Instagram) for paid promotions directing users to counterfeit sites using your brand terms and imagery. 9. **Reverse image search**: Regularly run reverse image searches on your brand logos, product images, and marketing materials to identify unauthorized usage across the web. - Maintain a comprehensive inventory of your official domains, subdomains, and digital properties. This is the baseline for identifying unauthorized reproductions. - Defensively register high-risk domain variants (common typos, major TLDs, product name combinations) before counterfeiters do. - Establish direct relationships with major registrar abuse teams and hosting provider trust-and-safety contacts for expedited takedowns. - Submit confirmed counterfeit and phishing sites to Google Safe Browsing, Microsoft SmartScreen, and PhishTank to trigger browser warnings immediately.
skilldb get brand-protection-skills/counterfeit-detectionFull skill: 47 linesInstall this skill directly: skilldb add brand-protection-skills
Related Skills
App Sideload Abuse Detection
Detect app sideload abuse, marketplace scams, and unauthorized application distribution
Brand Protection•48L
Brand Monitoring Automation
Automated brand monitoring, alert triage, and takedown workflow orchestration
Brand Protection•49L
Ransomware Readiness
Ransomware resilience testing, backup validation, recovery planning, and readiness assessment
Brand Protection•48L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L
API Schema Validation Testing
API schema validation testing, fuzzing, and type confusion attacks
Api Security Agent•155L