FWIW, while I’ve actually never before heard the phrase “combosquatting,” WIPO’s newest “Overview” of the UDRP (updated earlier this year) makes clear that such domain names fall within the UDRP’s “confusingly similar” test.  The Overview says: “While each case is judged on its own merits, in cases where a domain name incorporates the entirety of a trademark, or where at least a dominant feature of the relevant mark is recognizable in the domain name, the domain name will normally be considered confusingly similar to that mark for purposes of UDRP standing.”  That is, inclusion of another word in a domain name that contains a trademark normally means that the domain name is confusingly similar to the trademark (and, therefore, satisfies the first of the UDRP’s three tests).

 

This has been going on for so long that I would not have thought it was getting worse, but I look forward to reading the study.

 

Douglas M. Isenberg

Attorney at Law

Phone: 1-404-348-0368

Email: Doug@Giga.Law

Website: Giga.Law

 

 

 

 

 

From: gnso-rpm-wg [mailto:gnso-rpm-wg-bounces@icann.org] On Behalf Of icannlists
Sent: Thursday, November 16, 2017 10:29 AM
To: gnso-rpm-wg@icann.org
Subject: [gnso-rpm-wg] Article on Combo-squatting study conducted by Georgia Instutute of Technology and Stony Brook University affecting our discussion of Trademark + Industry Terms in the TMCH, Sunrise and Claims (among other RPMs that it may also implicate)

 

http://www.worldtrademarkreview.com/Blog/detail.aspx?g=cf4bc6c3-272f-4ccd-8555-59c97b932598

 

A few quotes from the article for those with less time:

 

 

Here is a link to the Full Study:  http://iisp.gatech.edu/sites/default/files/images/hiding_in_plain_sight-_a_longitudinal_study_of_combosquatting_abuse.pdf

 

Here is the Conclusion Section (I’ve taken the liberty of highlighting a few phrases):

 

“In this paper, we study a type of domain squatting termed “combosquatting,” which has yet to be extensively studied by the security community. By registering domains that include popular trademarks (e.g., paypal-members[.]com), attackers are able to capitalize on a trademark’s recognition to perform social engineering, phishing, affiliate abuse, trademark abuse, and even targeted attacks. We performed the first large-scale, empirical study of combosquatting using 468 billion DNS records from both active and passive DNS datasets, which were collected over an almost six year time period. Lexical analysis of combosquatting domains revealed that, while there is an almost infinite pool of potential combosquatting domains, most instances add only a single token to the original combosquatted domain. Furthermore, the chosen tokens were often specifically targeted to a particular business category. These results can help brands limit the potential search space for combosquatting domains. Additionally, our results show that most combosquatting domains were not remediated for extended periods of times—up to 1,000 days in many cases. Furthermore, many instances of combosquatting abuse were seen active significantly before they were discovered by public blacklists or malware feeds. Consequently, our findings suggests that current protections do not do a good job at addressing the threat of combosquatting. This is particularly concerning because our results also show that combosquatting is becoming more prevalent year over year. Lastly, we found numerous instances of combosquatting abuse in the real world by crawling 1.3 million combosquatting domains and manually analyzing the results. Based on our findings we discuss the role of different parties in the domain name ecosystem and how each party can help tackle the overall combosquatting problem. Ultimately, our results suggest that combosquatting is a real and growing threat, and the security community needs to develop better protections to defend against it.”

 

I’m asking Staff to enter this study into the record of this WG

 

Actual, growing problem identified and verified by external research: Let’s get down to business solving it by enhancing the RPMs to address it in order to protect end users of the Internet.  I don’t think we need to wait for the rest of the studies to come back to get underway.  It is laid out pretty plainly in the Georgia Tech Study.

 

Best,

Paul

 

 

 

 


The contents of this message may be privileged and confidential. If this message has been received in error, please delete it without reading it. Your receipt of this message is not intended to waive any applicable privilege. Please do not disseminate this message without the permission of the author. Any tax advice contained in this email was not intended to be used, and cannot be used, by you (or any other taxpayer) to avoid penalties under applicable tax laws and regulations.