Speak to one of our experts
Find out how Corsearch can help you establish, monitor, and protect your brand with confidence.
Gain visibility of threats to your brand and IP instantly
Save hours of manual review time
Enforce hundreds of threats in an instant
Proactively protect your brand and prove the value to your business
“Speed is a crucial thing. The tool needs to be easy to implement, user-friendly and logical from our standpoint.”
Axel Rahnberg
Legal Counsel at H&M
Speak to one of our experts
Find out how Corsearch can help you establish, monitor, and protect your brand with confidence.
Request a 15 minute personalized demo
Demo our technology to see why Corsearch is the right choice for you.
Gain visibility of threats to your brand and IP instantly
Save hours of manual review time
Enforce hundreds of threats in an instant
Proactively protect your brand and prove the value to your business
“Speed is a crucial thing. The tool needs to be easy to implement, user-friendly and logical from our standpoint.”
Axel Rahnberg
Legal Counsel at H&M
Request a 15 minute personalized demo
Demo our technology to see why Corsearch is the right choice for you.
Speak to one of our experts
Find out how Corsearch can help you establish, monitor, and protect your brand with confidence.
Gain visibility of threats to your brand and IP instantly
Save hours of manual review time
Enforce hundreds of threats in an instant
Proactively protect your brand and prove the value to your business
“Speed is a crucial thing. The tool needs to be easy to implement, user-friendly and logical from our standpoint.”
Axel Rahnberg
Legal Counsel at H&M
Speak to one of our experts
Find out how Corsearch can help you establish, monitor, and protect your brand with confidence.
Brand Protection
Blogs

How to Discover and Dismantle Bad Actors’ Business Models

Corsearch

The business models and tactics deployed to hijack businesses' digital channels have become increasingly sophisticated – it’s critical that your team is equipped with the tools and knowledge to remain one step ahead.

In a poll of Brand Protection professionals 69% stated that when planning their strategy, they either haven’t considered the business models of bad actors or find it hard to understand / get visibility of them.

By building an understanding of bad actors' operating models and uncovering their online networks, brands can maintain consumer trust and maximize the opportunity offered by e-commerce.

Part 1: The threats posed by bad actors online to your business and its consumers

The business models deployed by bad actors most often mimic those of legitimate businesses. Bad actors will also often share the same strategic considerations when they go to market and promote products, utilizing the same digital channels and tools.

The changing online and commercial environment changes the way they adapt, like any business. This is also true when enforcement activity changes their behavior.

Seasonal, trend, and enforcement-based changes in bad actors’ behavior

Bad actors’ behavior is constantly changing in response to events that can impact their sales and ability to operate.

“Changes I commonly observe can be based on similar things to legitimate business: seasons/holidays/trends in the social environment. Bad actors also change as a reaction to enforcement.”

Alex Shad, Brand Protection Team Lead, Corsearch

With Seasonal events such as Easter, Halloween, and Christmas, bad actors will emulate genuine brand behavior on social media, marketplaces, and websites. With cases of phishing, fraud, and impersonation, bad actors attempt to make their social posts and websites appear genuine to trick consumers. They will also combine this with the use of redirects and other entities that look legitimate to divert consumers.

Bad actors will also react to the social climate. For example, they started producing face masks during the coronavirus pandemic – as seen in this network example.

Enforcement is also a key driver, with behavior depending on issue type:

  • Fraud/impersonation – enforcement is more likely to scare bad actors into hiding. They will depopulate enforceable pages and then repopulate very quickly without notice to disseminate scams. They may also set up personal profiles to later populate if they are expecting enforcement on pages that are currently live.
  • Traditional trademark infringement – After enforcement, bad actors are more likely to change the way in which they infringe as opposed to changing their business model. The seller may blur over the infringing elements of images or appear to cease the sale of certain products.

Bad actors are often agile operators that adopt emerging platforms

Bad actors can be more dynamic than legitimate businesses at entering new markets and deploying new technology as they have lower barriers to entry. Counterfeiters, in particular, make use of new emerging platforms and have used influencer culture to their advantage.

TikTok, a user-generated content (UGC) platform that has enjoyed huge growth over the last year, is a good example – it has seen over 2 billion downloads in it’s first 4 years since launch, with Q1 2020 seeing over 315m downloads alone. TikTok’s primary audience is younger consumers, who are quicker to adopt newer media formats. Bad actors have latched onto this platform and often use influencers, who lend an aura of authenticity, to promote their goods to large swathes of consumers.

Bad actors are one step ahead in reacting to market trends

Bad actors will also often be one step ahead of legitimate companies in reacting to market trends. An example of this is product unboxing videos – bad actors sometimes enlist the help of prominent influencers on platforms such as TikTok, Instagram, and YouTube to unbox their counterfeit products, highlighting key features and build quality.

When reacting to wider market trends, they do not adhere to rules, regulations, or legal frameworks, meaning they can create and market new product lines far faster than legitimate companies.

Part 2: The models used to capture consumers, and how to disrupt them

We will look at 3 different types of network to illustrate how they are structured and how you can tackle them:

  1. Simple network: marketplace seller connected by WeChat
  2. Traditional counterfeiting network selling luxury watches
  3. Multichannel network selling flavored vaping liquids

1. Simple network – Shopee storefronts seller connected by WeChat

In this example, Corsearch analysts discovered a network selling counterfeit goods that pose a health risk to consumers.

Key features of the network:

  • Marketplace seller found to be offering infringing items which posed a health risk to consumers
  • WeChat ID connected the account to 32 other storefronts on the same platform
  • Auditing these connected storefronts could reveal further issues for the brand

The network is comprised of multiple Shopee storefronts all connected by one single WeChat account – without using Network Analysis technology, these storefronts would have been encountered one by one without the link ever being made, removing the possibility for coordinated enforcement causing max disruption.

Using this link, Corsearch analysts can search and ‘audit’ each linked storefront and screen these for similar infringements or references to the relevant brands. If other infringements are found, these can be collected for enforcement as one notice through the Shopee webform. An additional benefit of coordinated enforcement on individual sellers is the increased chance the platform would proactively deactivate the whole storefront.

2. Large-scale network selling counterfeit luxury watch network

In this example, Corsearch discovered a typical counterfeiting network offering luxury watches predominantly via websites. The network was multinational in nature, with a global supply chain which centered on China.

Key features of the network:

  • Large scale network containing 216 websites connected by 8 common email addresses (3 China-based and 5 international)
  • These networks primarily use traditional search methods to attract traffic
  • Targeted multiple brands owned by a number of different businesses, indicating a broad network (other brands targeted: Rolex, Breitling, Timberland, UGG)

Coordinated action against all of the entities within the network is one method to effectively disrupt its operation. With most of the network’s customers arriving via organic search, Google’s URL delisting tool could also come in to play to starve the network of its traffic source. Equally, due to the large scale of the network, offline action with legal partners would also be an effective strategy to tackle the perpetrators.

3. Multichannel Network selling vaping products

In this example, vaping liquid products were sold via websites and marketplaces with promotional pages on social media.

Key features of the network:

  • Complex network with multiple storefronts and websites
  • Domains connected by a company that supports website & online store set up and synchronization

Connections made by Network Analysis technology allow for all marketplace listings, social media posts, and domain URLs to be enforced at once, leaving the bad actor with no opportunity to change product listings. The Domains that are connected by the website set-up company can then be forwarded to the Investigations Services team to build further intelligence.

Corsearch Case Study: Offline action disrupting counterfeit jewelry network in China

One core avenue to dismantling bad actor networks is coordinated offline action in liaison with local authorities and law enforcement agencies.

In 2018, a counterfeiting ring that peddled high-value jewelry (average price $8,000) across popular online marketplaces was discovered by Corsearch’s analysts. Test-purchases were used to gather identifying information on the perpetrators, with the wider case being built using data gathered from Taobao, Weibo, and WeChat. Subsequent offline action led to over 50 arrests and seizure of products across seven addresses.

Multilateral action is key to more effective offline action. In China, the close relationship between CBBC (China Britain Business Council) and platforms such as Alibaba now make offline investigations easier to undertake.

Part 3: How Network Analysis technology can help you address these threats effectively

Network Analysis is a core module of Corsearch’s Brand Protection platform that powers a strategic approach to tackling networks. By connecting infringing entities across channels such as websites, marketplaces, and social media – and matching them against online and offline identifiers – Network Analysis gives you full visibility of the risks to your brands, prioritizes them by threat level, and provides you with the insights to act on them at scale.

There are four key components to Corsearch’s Network Analysis technology that enable you to tackle the most damaging threats to your business:

1. Good quality data = Meaningful networks

  • Processes for cleaning and validating data before networks are built
  • Algorithms to make networks more meaningful, e.g. take out nodes with too many links
  • All useful data points extracted, both structured and unstructured
  • Inferred links based on similarities – helps uncover potentially connected nodes

2. Contextualized threats in the 'universe' of networks

  • Threat score to prioritize and assess each network
  • Take into account popularity, action taken and the risk from the network’s component parts

3. Tools to search, manipulate and edit

  • Search and filter clusters on a wide variety of data points
  • Compare networks to understand the bigger picture
  • Add and remove nodes and links to build out your online and offline intelligence picture

4. Impactful inforcement from the network view

  • Identify key enablers to dismantle all or part of the network, as your strategy directs
  • Tackle the whole network and see how it responds

When to use Network Analysis within your workflow

The tool has the potential to be used as both a principal resource for online action and a supplementary resource for further enforcement. Brand owners can filter through high-risk networks and networks that include tagged objects. This includes checking connections made with official entities.

Brand owners can then screen, tag and enforce infringements outside of the tool and then filter for those tags and enforcements in Network Analysis. This can open the door to a possible string of previously unseen connections and sellers to be targeted.

This is beneficial if a team needs to focus on multiple online issues at any one time. It is also useful where issues are more ‘trends’ that spread across a number of sellers and are therefore not specific to a single bad actor.

For novel issues or issues where sellers are known to change their behavior quickly, the preferred workflow would be enforcing all infringing items in a network at once.

Request a demo

Network Analysis gives you insight into the different networks that are hijacking your brand and exploiting consumers. By building a full picture of these networks and prioritizing based on threat, we can drive enforcement and investigations in a more strategic, impactful way.

If you would like to find out more about our Network Analysis technology and how it can empower your team, request a demo below.

See how PharmaCheck™ accelerates name qualification

From early-stage screening to post-clearance checks, we help you move faster with confidence — while avoiding missteps new, and help you move forward — faster.

Meet Speakers

No items found.
resources

Tags
Criminal Networks
Resources

Similar resources

Blogs
Brand Protection
The Strategy of ‘Service Tracks’ in 2026
March 3rd, 2026
Blogs
Brand Protection
Corsearch Ranked “Highly Recommended” in Two Categories for WTR 1000 (2026)
February 24th, 2026
Blogs
Brand Protection
Dupe Culture in Toys & Games: How to Protect Your Brand
February 23rd, 2026
Blogs
Brand Protection
GLP-1s: The Good, The Bad, The Ugly
February 11th, 2026
Blogs
Brand Protection
Interview: CVAN - The Ultimate Solution for Online IP Protection
January 14th, 2026
Blogs
Brand Protection
Interview: Unlocking the Future of Brand Protection with Corsearch LABS
January 14th, 2026
Blogs
Brand Protection
How CONNETIX Levelled Up Their Brand Protection Strategy
January 4th, 2026
Blogs
Brand Protection
2025: The Year of Zeal 2.0 - How We Redefined Brand Protection for an AI-Native Era
December 18th, 2025
Blogs
Brand Protection
The Risk of Gray Trade: Product Safety and Post-Market Surveillance
November 23rd, 2025
Blogs
Brand Protection
Revenue Recovery & Schedule A Litigation: A High Impact, Scalable Way to Fight Counterfeits
September 12th, 2025
Blogs
Brand Protection
Revenue Recovery & Schedule A Litigation: A High Impact, Scalable Way to Fight Counterfeits
September 11th, 2025
Blogs
Brand Protection
The Brand Protection Blueprint for Today’s Fast-Moving Digital Threats
August 26th, 2025
Blogs
Brand Protection
Inside Corsearch Zeal 2.0’s Visual Detection Engine: Smarter, Scalable Brand Protection
August 13th, 2025
Blogs
Brand Protection
From Monitoring to Mastery: The Evolution of Online Brand Protection
July 21st, 2025
Blogs
Brand Protection
When Brand Protection Tools Miss the Mark: Claims Vs. Capability
July 6th, 2025
Blogs
Brand Protection
Trademark Solutions
The Next Layer of Brand Protection: Why Trademark Watching Matters
July 3rd, 2025
Blogs
Brand Protection
Trademark Solutions
Pairing Trademark Watching with Corsearch Zeal 2.0 for Full-Spectrum Brand Defense
July 3rd, 2025
Blogs
Brand Protection
When Counterfeits Go Viral: What Brands Can Learn from the Lafufu Craze
June 29th, 2025
Blogs
Brand Protection
Automation in Action: How Corsearch Zeal 2.0 Triples Analyst Productivity
June 18th, 2025
Blogs
Brand Protection
How the CHIPS Act is Quietly Revolutionizing Anti-Counterfeiting in Semiconductors
June 8th, 2025
Blogs
Brand Protection
An Invisible War: The Growth of Dupe Culture & Its Ramifications for Brands
June 5th, 2025
Blogs
Brand Protection
Corsearch Zeal 2.0: From Vanity Metrics to Tangible Brand Protection Impact
May 26th, 2025
Blogs
Brand Protection
From Volume to Value: How Corsearch Zeal 2.0 Redefines Brand Protection
May 11th, 2025
Blogs
Brand Protection
Tariffs & Supply Chain Monitoring: How to Remove Counterfeits & Prevent Leakages
April 24th, 2025
Blogs
Brand Protection
Don’t Let Tariffs Amplify Losses from Counterfeits
April 16th, 2025
Blogs
Brand Protection
How Brands Can Shift Gen Z Attitudes Toward Counterfeiting
March 18th, 2025
Blogs
Brand Protection
How to Combat Infringement Surges During the Holiday Season
January 30th, 2025
Blogs
Brand Protection
The Emergence of Counterfeit Haul Videos and How Brands Can Combat Them
December 9th, 2024
Blogs
Brand Protection
Brand Protection in Pharma: Combining Online Enforcement with Expert Investigations
November 14th, 2024
Blogs
Brand Protection
Pandabuy: How Corsearch Intelligence Helped Take Down a Global Counterfeiting Empire​
November 6th, 2024
Blogs
Brand Protection
Staying Ahead of Online Risks with Brand Intelligence Dashboards
November 5th, 2024
Blogs
Brand Protection
Investigate the Source: Uncover the People & Organizations Behind IP Infringement
October 7th, 2024
Blogs
Brand Protection
Removing Gray Market Threats Using Advanced AI and Human Expertise
August 28th, 2024
Blogs
Brand Protection
Corsearch Partners with Proof Authentication to Provide Top-Tier On-Product Brand Protection
August 28th, 2024
Blogs
Brand Protection
Combatting Counterfeits Using the Power of Advanced AI and Human Expertise
August 7th, 2024
Blogs
Brand Protection
Exploring the Threat Landscape: Counterfeits & Fakes
August 5th, 2024
Blogs
Brand Protection
Tackling Brand Impersonation Using the Power of Advanced AI and Human Expertise
June 12th, 2024
Blogs
Brand Protection
Exploring the Threat Landscape: Brand Impersonation
June 11th, 2024
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from Online Marketplaces
February 28th, 2024
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from X (Formerly Twitter)
February 14th, 2024
Blogs
Brand Protection
How Gray Is Your Market? Identifying Gray Market Issues and Strategies to Combat Them
January 22nd, 2024
Blogs
Brand Protection
The Growing Threat Posed by Phishing and Brand Impersonation
December 12th, 2023
Blogs
Brand Protection
The Competitor You've Never Heard of: The Modern-Day Counterfeiter
December 3rd, 2023
Blogs
Brand Protection
A Marketplaces Perspective to Bad Actor Seasonality
November 27th, 2023
Blogs
Brand Protection
Have You Properly Locked Your Domain Portfolio?
November 7th, 2023
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from Alibaba
September 27th, 2023
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from Facebook
August 23rd, 2023
Blogs
Brand Protection
Trademark Solutions
What’s the Difference Between Copyright and a Trademark?
August 15th, 2023
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from eBay
August 13th, 2023
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from Amazon
August 1st, 2023
Blogs
Brand Protection
The Dark Side of Luxury: Unveiling the Scale & Dangers of Counterfeits
July 31st, 2023
Blogs
Brand Protection
How To Combat the Hidden Dangers of Counterfeit Lipstick
July 28th, 2023
Blogs
Brand Protection
Instagram Threads: Consumers Exposed to Impersonation Profiles & Counterfeits
July 17th, 2023
Blogs
Brand Protection
Counterfeit Tequila: The Growing Threat to Consumers & Brands
July 10th, 2023
Blogs
Brand Protection
Fireside Chat with Deborah A. Hampton at Chemours: Career & Accolades in IP
March 7th, 2023
Blogs
Brand Protection
Trademark Solutions
Valentine’s Day: Trademark Filings & Tips to Protect Your IP
February 13th, 2023
Blogs
Brand Protection
Fireside Chat with Mike Sweeney: IPO & Thought Leadership
February 8th, 2023
Blogs
Brand Protection
Cloudflare & Rogue Website Enforcement: Q&A with Corsearch Experts
February 2nd, 2023
Blogs
Brand Protection
Why Brand Impersonation is Increasing on Twitter & How to Combat It
December 11th, 2022
Blogs
Brand Protection
Trademark Solutions
NFTs: Trademark Applications & Online Enforcement Insights
November 14th, 2022
Blogs
Brand Protection
Brand Protection in the Metaverse: What Brands Need to Know
November 14th, 2022
Blogs
Brand Protection
Trademark Solutions
NFTs: Friend or Foe for Brand Owners?
November 14th, 2022
Blogs
Brand Protection
Trademark Solutions
How to Create, Build, and Maintain Brand Strength
November 14th, 2022
Blogs
Brand Protection
Falsified Diabetes Medicines Threaten Patients & Manufacturers
November 13th, 2022
Blogs
Brand Protection
The Beatles File Lawsuit to Stop Counterfeits
November 8th, 2022
Blogs
Brand Protection
Brand Protection KPIs: How to Focus on Outcomes, Not Takedowns
August 3rd, 2022
Blogs
Brand Protection
How to Build a Winning Business Case for Brand Protection
August 3rd, 2022
Blogs
Brand Protection
Drive E-commerce Sales in Luxury & Fashion with Brand Protection
July 14th, 2022
Blogs
Brand Protection
Brand Protection & Social Media: Tackling Scams & Impersonation
May 19th, 2022
Blogs
Brand Protection
In Support of the US Domain Reform for Unlawful Drug Sellers Act
March 30th, 2022
Blogs
Brand Protection
What does the future of e-commerce mean for brand protection teams?
February 23rd, 2022
Blogs
Brand Protection
How Brands Can Successfully Navigate the Threat Landscape on Social Media
February 2nd, 2022
Blogs
Brand Protection
2022: Insights and actions at scale – to protect your brands and consumers online
January 12th, 2022
Blogs
Brand Protection
Top Priorities for Brand Protection Teams in 2022
January 9th, 2022
Blogs
Brand Protection
Brand Protection: 2021 in Review
December 19th, 2021
Blogs
Brand Protection
6 Things to Know About  Singles’ Day: Fakes, Apps, and Cyber Attacks
November 10th, 2021
Blogs
Brand Protection
Holiday Season Brand Protection Strategy
November 9th, 2021
Blogs
Brand Protection
Trademark Solutions
Online Brand Protection: Challenges and Solutions
November 3rd, 2021
Blogs
Brand Protection
Trademark Solutions
How To Claim a Trademark on the Top Six Social Media Platforms
October 28th, 2021
Blogs
Brand Protection
Trademark Solutions
What Is a Trademark and Why Are They Important?
October 28th, 2021
Blogs
Brand Protection
Trademark Solutions
Holiday Trademarks — Tricks and Treats
October 27th, 2021
Blogs
Brand Protection
INSYNC Virtual Summit November 2021 – Interview with Simon Baggs and Robert Stolk
October 26th, 2021
Blogs
Brand Protection
Brand Protection & Halloween: How to vanquish ghastly threats
October 19th, 2021
Blogs
Brand Protection
Round Table: Online Brand Protection in the Football Industry
October 9th, 2021
Blogs
Brand Protection
The INSYNC Community and Virtual Summit
September 22nd, 2021
Blogs
Brand Protection
The Shop Safe Act, the Inform Consumers Act & Potential for Platform Liability in the US
August 19th, 2021
Blogs
Brand Protection
Round Table: E-commerce Legislative Developments – What Changes Should Brands Push For?
August 19th, 2021
Blogs
Brand Protection
Round Table: How Media & Entertainment Brands Are Tackling Online Threats
August 8th, 2021
Blogs
Brand Protection
The Digital Services Act: What do Brand and Content Owners need?
August 2nd, 2021
Blogs
Brand Protection
Brand Protection & NFTs: Scams, Fakes & How to Mitigate Risks
July 1st, 2021
Blogs
Brand Protection
The Digital Services Act Unwrapped: Initial Implications for Platforms, Brands and Consumers
June 15th, 2021
Blogs
Brand Protection
Round Table: How Are Businesses Structured to Address the Evolving Brand Protection Landscape?
June 14th, 2021
Blogs
Brand Protection
Protect Online Consumer Experience: Audit and Control Your Brand’s Digital Footprint
May 12th, 2021
Blogs
Brand Protection
The Commercial Impact of Tackling Repeat Infringers on E-commerce Platforms
April 25th, 2021
Blogs
Brand Protection
Can the current regulatory landscape tackle growing brand misuse online?
April 19th, 2021
Blogs
Brand Protection
Platforms' key role in protecting consumers from fake vaccines and COVID-related scams
April 11th, 2021
Blogs
Brand Protection
How and Why Search Engines Must Take Responsibility for Tackling Counterfeiters
April 6th, 2021
Blogs
Brand Protection
Round Table: How to Deal with Problematic Sellers on Shopee and Tokopedia
March 29th, 2021
Blogs
Brand Protection
Brand Protection United: How Mondelēz International Put an End to Siloed Working
March 29th, 2021
Blogs
Brand Protection
How to Use Case Management: Examples from Anti-Counterfeiting and Brand Protection
March 23rd, 2021
Register to Webinar
Day: 
Time: 
 ET