Feeds

UK police take down fake designer goods sites

Del Boys swept out of .co.uk domains

Build a business case: developing custom apps

UK police have completed a massive take-down operation, after targeting scam websites selling fake designer goods.

More than 1,200 counterfeit-slinging UK-registered websites were grounded as part of Operation Papworth - an operation led by the Metropolitan Police's Central e-Crime Unit (PCeU) - which targeted scam websites in the run-up to Christmas.

The sites claimed to offer designer goods - including Ugg Australia Boots, ghd hair straighteners, and jewellery from Tiffany - at discount prices, while actually offering only poor quality counterfeit kit, at best.

Innocent shoppers using the websites were also handing over payment card details that might later be used for credit card fraud. Police reckon many would-be bargain hunters received no goods for their payments.

Consumer Direct, Trading Standards, the Office of Fair Trading and manufacturers helped to identify the fraudulent web sites. Intelligence showed that the vast majority of the sites were registered from Asia, despite their UK domain names. Many were registered using false or misleading details.

The fake registration ploy made it almost impossible for victims to complain, while acting as an obstacle for action by Trading Standards or law enforcement agencies.

The PCeU worked in partnership with UK domain name registrar Nominet to take down fraudulent websites and prevent their re-registration.

The newly-established cybercop squad are working with Nominet and other top domain name registrars to prevent the future fraudulent site registrations. The Office of Fair Trading has also been brought on board to monitor and clamp down on similar scams in future.

Punters who purchased goods from one of the fraudulent sites are advised to contact Consumer Direct for advice. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?