Speak to one of our experts
Find out how Corsearch can help you establish, monitor, and protect your brand with confidence.
Gain visibility of threats to your brand and IP instantly
Save hours of manual review time
Enforce hundreds of threats in an instant
Proactively protect your brand and prove the value to your business
“Speed is a crucial thing. The tool needs to be easy to implement, user-friendly and logical from our standpoint.”
Axel Rahnberg
Legal Counsel at H&M
Speak to one of our experts
Find out how Corsearch can help you establish, monitor, and protect your brand with confidence.
Request a 15 minute personalized demo
Demo our technology to see why Corsearch is the right choice for you.
Gain visibility of threats to your brand and IP instantly
Save hours of manual review time
Enforce hundreds of threats in an instant
Proactively protect your brand and prove the value to your business
“Speed is a crucial thing. The tool needs to be easy to implement, user-friendly and logical from our standpoint.”
Axel Rahnberg
Legal Counsel at H&M
Request a 15 minute personalized demo
Demo our technology to see why Corsearch is the right choice for you.
Speak to one of our experts
Find out how Corsearch can help you establish, monitor, and protect your brand with confidence.
Gain visibility of threats to your brand and IP instantly
Save hours of manual review time
Enforce hundreds of threats in an instant
Proactively protect your brand and prove the value to your business
“Speed is a crucial thing. The tool needs to be easy to implement, user-friendly and logical from our standpoint.”
Axel Rahnberg
Legal Counsel at H&M
Speak to one of our experts
Find out how Corsearch can help you establish, monitor, and protect your brand with confidence.
Brand Protection
Blogs

Protecting Your Brand: How to Remove Counterfeits from X (Formerly Twitter)

Corsearch

X (formerly Twitter) is one of the most popular social media platforms for businesses and individuals, with around 335 million monthly active users worldwide. Allowing brands to connect with their consumers and establish a recognizable online presence, it is a crucial platform to reach audiences on a global scale.

Unfortunately, this global reach and accessibility to a large audience also attracts bad actors looking to exploit the popularity and features of social media platforms. This has led to social channels being widely targeted and causing a huge counterfeiter problem. For X/ Twitter, this has become especially prevalent following Elon Musk’s takeover and introduction of ‘X Premium/ Twitter Blue’.

This feature means that any user can opt into a paid subscription and immediately receive a blue checkmark – a badge that was previously associated with “legacy” verified accounts, resulting in countless high-profile cases of impersonation involving global brands.

In this guide, we will:

  • Share the common scams on X/ Twitter you need to be aware of
  • Provide steps on how to manually remove counterfeits and infringing content from the platform
  • Showcase how Corsearch can help you automate this process and tackle counterfeits at scale

Table of contents:

Common scams on X/ Twitter

Step-by-step guide to removing counterfeits from X/ Twitter manually

What can you do to protect your brand on X/ Twitter?

Tackle counterfeits at scale by leveraging Corsearch's AI-powered technology and expertise

Common scams on X/ Twitter

There are various infringement scams to be on the lookout for on X/ Twitter. Here are some of the most common types of scams observed on the platform:

Fake/ impersonation accounts

Scammers create fake accounts that closely mimic established brands. These accounts may use similar usernames, logos, and content to deceive users into believing they are interacting with the legitimate brand. The blue checkmark can also be purchased, which can mislead customers into believing the account is genuine and verified.

The intention is often to spread misinformation and harm a brand's reputation. However, bad actors can also create fake accounts with the intention of gaining sensitive data or login details, which is often done through creating fake support or customer care pages, where consumers are prompted to share personal information in order to get the support they require.

Phishing and spoofing

Scammers may use X/ Twitter to contact consumers via posts (tweets) or direct messages and lead them to fake websites designed to imitate official brand pages or collect sensitive information.

This could lead to identity theft, unauthorized access to accounts, and potential financial loss for consumers.

Selling counterfeit goods

Bad actors may use fake accounts to promote and sell fake products, often imitating genuine brands or offering counterfeit merchandise.

These scams can mislead consumers into purchasing fake goods, causing financial losses and damaging the genuine brand's reputation.

False promotions and giveaways

Fraudulent accounts often pose as influencers and host promotions or giveaways while claiming to be affiliated with a well-known brand.

These schemes aim to collect user data, including email addresses and personal details, for future exploitation or resale.

Step-by-step guide to removing counterfeits from X/ Twitter manually

Step 1. Identify the type of infringement

X/ Twitter prohibits users from violating others’ intellectual property rights, and has policies in place against counterfeit infringement, trademark infringement, copyright infringement and impersonation.

Trademark infringement

Unauthorized use of your brand name, logo, or other trademarked elements.

Copyright infringement

Unauthorized use of your original creative works, such as images, videos, or written content.

Impersonation

Fake accounts pretending to be your company/ brand, or – in some cases – individuals working at your company.

Phishing and spoofing

Attempts to trick users into providing sensitive information or engaging in harmful activities.

Counterfeit goods

Listings or profiles promoting the sale of fake or counterfeit products.

False promotions and giveaways

Unauthorized schemes claiming to offer promotions or giveaways associated with your brand.

Step 2. Report the infringement

X/ Twitter has a comprehensive help center detailing its platform use guidelines and the steps to take in the event of an infringement.

Reporting counterfeits

X / Twitter states the selling or promoting counterfeit goods on the platform is a violation of its counterfeit policy. Follow these steps to report an account selling or promoting counterfeit goods:

  • File a report through this support form
  • Provide your contact information
  • Give clear details of how the reported content violates X/ Twitter's counterfeit policy
  • Share the details of the company, brand, or organization that holds the trademark
  • Provide the exact registered mark and details of its registration
  • Select four checkboxes to declare your authorization to enforce (either as the trademark owner or an authorized agent)

Reporting copyright infringement

Before submitting a copyright complaint, consider whether the content could be considered fair use. If you have considered fair use, and want to move forward with a copyright complaint, follow these steps:

  • File a report through this support form
  • Provide your contact information
  • Select X/ Twitter as the platform where the infringing material appears (Vine and Periscope are both discontinued)
  • Declare the type of copyrighted work and provide a detailed description of the original work
  • Provide a URL to the infringing material or give clear details of how the reported content violates X/ Twitter's copyright policy
  • Select three checkboxes to declare your authorization to enforce
  • Sign the report using your full name as an electronic signature

Reporting other forms of trademark infringement

X/ Twitter states that using another’s trademark in a way that may mislead or confuse people about your affiliation may be a violation of their trademark policy. To report trademark infringement, you need to:

  • File a report through this support form
  • Provide your contact information
  • Select the platform where the infringement is happening and the username of who you are reporting and why
  • Provide information about the company, brand, or organization that holds the trademark and details of the registered mark
  • Select three checkboxes to declare your authorization to enforce

Reporting impersonation accounts

X/ Twitter has a misleading and deceptive identities policy which prohibits using false profile information to impersonate or deceive others. There are two things you can do to report an impersonation account. Firstly, you can flag it directly from the account's profile. Alternatively, you can follow these steps:

  • File a report through this support form
  • Provide your contact information
  • Provide information about the company, brand, or organization being impersonated
  • Share details of the fake account with give clear details of how they are impersonating your company, brand, or organization
  • Select two checkboxes to declare your authorization to enforce

Reporting financial scams

Scam tactics, phishing, or other fraudulent or deceptive methods violate X/ Twitter's financial scam policy. To report violations of this policy, you need to be logged in to complete the following steps:

  • Select ‘report post’ from the downwards arrow icon
  • Select ‘it’s suspicious or spam’
  • Select the option that best represents how the post is suspicious or spreading spam
  • Submit your report

Step 3. Wait for X/ Twitter's response

X/ Twitter have a range of enforcement options that are determined by several factors, including:

  • the behavior is directed at an individual, group, or protected category of people;
  • the report has been filed by the target of the abuse or a bystander;
  • the user has a history of violating their policies;
  • the severity of the violation;
  • the content may be a topic of legitimate public interest.

Some of the enforcement actions they may take include:

Post-level enforcement

This could include limiting post visibility, labeling a post to provide context and additional information to users or removing a post altogether.

Direct Message-level enforcement

This could include stopping the violator from sending messages to the account who reported them or in a group Direct Message conversation, the violating Direct Message will be placed behind a notice so no one else in the group can see it again

Account-level enforcement

This could include suspending an account, placing an account in read-only mode, where users can only read their timelines and send Direct Messages to their followers, or requiring verifying account ownership, where an account owner needs to verify ownership with a phone number or email address.

Actions against non-violating content include:

  • Placing forms of sensitive media, like adult content or graphic violence behind a notice.
  • Restricting views of specific forms of sensitive media, such as adult content, for viewers who are under 18 or viewers who do not include a birth date on their profile.
  • Withholding access to certain content in a particular country if they have received a valid and properly scoped request from an authorized entity in that country.

X/ Twitter typically acknowledges properly submitted reports within 24 hours, and reports are typically resolved within a few days. It’s worth noting resolution times vary and could take 30 days to reach resolution.

What can you do to protect your brand on X/ Twitter?

There are several proactive measures you can take to help safeguard your brand.

Register your trademarks

Ensure your brand name, logo, and other key elements are registered trademarks. This provides legal protection and strengthens your ability to enforce your rights.

Implement social media guidelines

Develop and communicate clear guidelines for the use of your brand on X/ Twitter. Establish rules for employees and partners to maintain a consistent and positive brand image and ensure they are aware of potential brand risks.

Monitor your brand

Regularly monitor X/ Twitter for mentions of your brand, product names, and associated keywords. Set up alerts to receive notifications when your brand is mentioned and monitor hashtags you use often.

Lookout for fake support accounts

Many scams happen by impersonators pretending to be a customer support or care page for your brand. Regularly searching for your brand name along with ‘customer support', ‘customer service’ or ‘customer care’ helps you keep track of this.

Utilize AI-powered brand protection solutions

Consider brand protection solutions that leverage the hybrid intelligence of AI and human experts, to greatly enhance your ability to detect and combat infringements.

Tackle counterfeits at scale by leveraging Corsearch's AI-powered technology and expertise

  1. Detect infringement

Utilize Corsearch's advanced detection capabilities to collect comprehensive data, enabling you to automatically pinpoint and monitor potential threats. Our keyword search framework allows for precise parameter adjustments, staying ahead of evolving risks and infringements. Additionally, employ our sophisticated image search technology to track the usage of your copyrighted images and instances of repeated counterfeit image use.

  1. Analyze and prioritize threats

Once we’ve detected infringements, we leverage machine learning and image matching technology to assign risk scores and prioritize according to your strategy. This enables you to concentrate on the threats most damaging to your brand and most visible to your consumers.

  1. Enforce and remove threats

Improve team efficiency and cost-effectiveness through automated enforcement and takedown procedures, meticulously reviewed by human experts. Capitalize on Corsearch's comprehensive understanding of platform policies and procedures for effective enforcement at scale. By swiftly removing all an account’s infringing posts in one swoop, you give the owner minimal opportunity to respond.

  1. Track impact

Focus on brand-related data, changes, and notable trends, streamlining reporting and decision-making with Corsearch's advanced analytics dashboards. Elevate reporting and analytics from operational metrics to strategic insights, empowering teams to demonstrate the impact of their efforts through integrated data storytelling tools.

Learn more about our brand protection solutions.

Next steps

We can help you swiftly remove counterfeits and other threats found on X/ Twitter, saving your team precious time and money. Speak with one of our experts to learn how our solutions can protect your brand across all social media platforms.

Learn how to protect your brand on marketplaces:

Learn how to protect consumers from the dangers of:

Learn how to remove counterfeits from marketplaces:

See how PharmaCheck™ accelerates name qualification

From early-stage screening to post-clearance checks, we help you move faster with confidence — while avoiding missteps new, and help you move forward — faster.

Meet Speakers

No items found.
resources

Tags
Consumer Protection
Copyright Infringement
Counterfeiting
Marketplaces
Social Media
Trademark Infringement
Resources

Similar resources

Blogs
Brand Protection
The Strategy of ‘Service Tracks’ in 2026
March 3rd, 2026
Blogs
Brand Protection
Corsearch Ranked “Highly Recommended” in Two Categories for WTR 1000 (2026)
February 24th, 2026
Blogs
Brand Protection
Dupe Culture in Toys & Games: How to Protect Your Brand
February 23rd, 2026
Blogs
Brand Protection
GLP-1s: The Good, The Bad, The Ugly
February 11th, 2026
Blogs
Brand Protection
Interview: CVAN - The Ultimate Solution for Online IP Protection
January 14th, 2026
Blogs
Brand Protection
Interview: Unlocking the Future of Brand Protection with Corsearch LABS
January 14th, 2026
Blogs
Brand Protection
How CONNETIX Levelled Up Their Brand Protection Strategy
January 4th, 2026
Blogs
Brand Protection
2025: The Year of Zeal 2.0 - How We Redefined Brand Protection for an AI-Native Era
December 18th, 2025
Blogs
Brand Protection
The Risk of Gray Trade: Product Safety and Post-Market Surveillance
November 23rd, 2025
Blogs
Brand Protection
Revenue Recovery & Schedule A Litigation: A High Impact, Scalable Way to Fight Counterfeits
September 12th, 2025
Blogs
Brand Protection
Revenue Recovery & Schedule A Litigation: A High Impact, Scalable Way to Fight Counterfeits
September 11th, 2025
Blogs
Brand Protection
The Brand Protection Blueprint for Today’s Fast-Moving Digital Threats
August 26th, 2025
Blogs
Brand Protection
Inside Corsearch Zeal 2.0’s Visual Detection Engine: Smarter, Scalable Brand Protection
August 13th, 2025
Blogs
Brand Protection
From Monitoring to Mastery: The Evolution of Online Brand Protection
July 21st, 2025
Blogs
Brand Protection
When Brand Protection Tools Miss the Mark: Claims Vs. Capability
July 6th, 2025
Blogs
Brand Protection
Trademark Solutions
The Next Layer of Brand Protection: Why Trademark Watching Matters
July 3rd, 2025
Blogs
Brand Protection
Trademark Solutions
Pairing Trademark Watching with Corsearch Zeal 2.0 for Full-Spectrum Brand Defense
July 3rd, 2025
Blogs
Brand Protection
When Counterfeits Go Viral: What Brands Can Learn from the Lafufu Craze
June 29th, 2025
Blogs
Brand Protection
Automation in Action: How Corsearch Zeal 2.0 Triples Analyst Productivity
June 18th, 2025
Blogs
Brand Protection
How the CHIPS Act is Quietly Revolutionizing Anti-Counterfeiting in Semiconductors
June 8th, 2025
Blogs
Brand Protection
An Invisible War: The Growth of Dupe Culture & Its Ramifications for Brands
June 5th, 2025
Blogs
Brand Protection
Corsearch Zeal 2.0: From Vanity Metrics to Tangible Brand Protection Impact
May 26th, 2025
Blogs
Brand Protection
From Volume to Value: How Corsearch Zeal 2.0 Redefines Brand Protection
May 11th, 2025
Blogs
Brand Protection
Tariffs & Supply Chain Monitoring: How to Remove Counterfeits & Prevent Leakages
April 24th, 2025
Blogs
Brand Protection
Don’t Let Tariffs Amplify Losses from Counterfeits
April 16th, 2025
Blogs
Brand Protection
How Brands Can Shift Gen Z Attitudes Toward Counterfeiting
March 18th, 2025
Blogs
Brand Protection
How to Combat Infringement Surges During the Holiday Season
January 30th, 2025
Blogs
Brand Protection
The Emergence of Counterfeit Haul Videos and How Brands Can Combat Them
December 9th, 2024
Blogs
Brand Protection
Brand Protection in Pharma: Combining Online Enforcement with Expert Investigations
November 14th, 2024
Blogs
Brand Protection
Pandabuy: How Corsearch Intelligence Helped Take Down a Global Counterfeiting Empire​
November 6th, 2024
Blogs
Brand Protection
Staying Ahead of Online Risks with Brand Intelligence Dashboards
November 5th, 2024
Blogs
Brand Protection
Investigate the Source: Uncover the People & Organizations Behind IP Infringement
October 7th, 2024
Blogs
Brand Protection
Removing Gray Market Threats Using Advanced AI and Human Expertise
August 28th, 2024
Blogs
Brand Protection
Corsearch Partners with Proof Authentication to Provide Top-Tier On-Product Brand Protection
August 28th, 2024
Blogs
Brand Protection
Combatting Counterfeits Using the Power of Advanced AI and Human Expertise
August 7th, 2024
Blogs
Brand Protection
Exploring the Threat Landscape: Counterfeits & Fakes
August 5th, 2024
Blogs
Brand Protection
Tackling Brand Impersonation Using the Power of Advanced AI and Human Expertise
June 12th, 2024
Blogs
Brand Protection
Exploring the Threat Landscape: Brand Impersonation
June 11th, 2024
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from Online Marketplaces
February 28th, 2024
Blogs
Brand Protection
How Gray Is Your Market? Identifying Gray Market Issues and Strategies to Combat Them
January 22nd, 2024
Blogs
Brand Protection
The Growing Threat Posed by Phishing and Brand Impersonation
December 12th, 2023
Blogs
Brand Protection
The Competitor You've Never Heard of: The Modern-Day Counterfeiter
December 3rd, 2023
Blogs
Brand Protection
A Marketplaces Perspective to Bad Actor Seasonality
November 27th, 2023
Blogs
Brand Protection
Have You Properly Locked Your Domain Portfolio?
November 7th, 2023
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from Alibaba
September 27th, 2023
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from Facebook
August 23rd, 2023
Blogs
Brand Protection
Trademark Solutions
What’s the Difference Between Copyright and a Trademark?
August 15th, 2023
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from eBay
August 13th, 2023
Blogs
Brand Protection
Protecting Your Brand: How to Remove Counterfeits from Amazon
August 1st, 2023
Blogs
Brand Protection
The Dark Side of Luxury: Unveiling the Scale & Dangers of Counterfeits
July 31st, 2023
Blogs
Brand Protection
How To Combat the Hidden Dangers of Counterfeit Lipstick
July 28th, 2023
Blogs
Brand Protection
Instagram Threads: Consumers Exposed to Impersonation Profiles & Counterfeits
July 17th, 2023
Blogs
Brand Protection
Counterfeit Tequila: The Growing Threat to Consumers & Brands
July 10th, 2023
Blogs
Brand Protection
Fireside Chat with Deborah A. Hampton at Chemours: Career & Accolades in IP
March 7th, 2023
Blogs
Brand Protection
Trademark Solutions
Valentine’s Day: Trademark Filings & Tips to Protect Your IP
February 13th, 2023
Blogs
Brand Protection
Fireside Chat with Mike Sweeney: IPO & Thought Leadership
February 8th, 2023
Blogs
Brand Protection
Cloudflare & Rogue Website Enforcement: Q&A with Corsearch Experts
February 2nd, 2023
Blogs
Brand Protection
Why Brand Impersonation is Increasing on Twitter & How to Combat It
December 11th, 2022
Blogs
Brand Protection
Trademark Solutions
NFTs: Trademark Applications & Online Enforcement Insights
November 14th, 2022
Blogs
Brand Protection
Brand Protection in the Metaverse: What Brands Need to Know
November 14th, 2022
Blogs
Brand Protection
Trademark Solutions
NFTs: Friend or Foe for Brand Owners?
November 14th, 2022
Blogs
Brand Protection
Trademark Solutions
How to Create, Build, and Maintain Brand Strength
November 14th, 2022
Blogs
Brand Protection
Falsified Diabetes Medicines Threaten Patients & Manufacturers
November 13th, 2022
Blogs
Brand Protection
The Beatles File Lawsuit to Stop Counterfeits
November 8th, 2022
Blogs
Brand Protection
Brand Protection KPIs: How to Focus on Outcomes, Not Takedowns
August 3rd, 2022
Blogs
Brand Protection
How to Build a Winning Business Case for Brand Protection
August 3rd, 2022
Blogs
Brand Protection
Drive E-commerce Sales in Luxury & Fashion with Brand Protection
July 14th, 2022
Blogs
Brand Protection
Brand Protection & Social Media: Tackling Scams & Impersonation
May 19th, 2022
Blogs
Brand Protection
In Support of the US Domain Reform for Unlawful Drug Sellers Act
March 30th, 2022
Blogs
Brand Protection
What does the future of e-commerce mean for brand protection teams?
February 23rd, 2022
Blogs
Brand Protection
How Brands Can Successfully Navigate the Threat Landscape on Social Media
February 2nd, 2022
Blogs
Brand Protection
2022: Insights and actions at scale – to protect your brands and consumers online
January 12th, 2022
Blogs
Brand Protection
Top Priorities for Brand Protection Teams in 2022
January 9th, 2022
Blogs
Brand Protection
Brand Protection: 2021 in Review
December 19th, 2021
Blogs
Brand Protection
6 Things to Know About  Singles’ Day: Fakes, Apps, and Cyber Attacks
November 10th, 2021
Blogs
Brand Protection
Holiday Season Brand Protection Strategy
November 9th, 2021
Blogs
Brand Protection
Trademark Solutions
Online Brand Protection: Challenges and Solutions
November 3rd, 2021
Blogs
Brand Protection
Trademark Solutions
How To Claim a Trademark on the Top Six Social Media Platforms
October 28th, 2021
Blogs
Brand Protection
Trademark Solutions
What Is a Trademark and Why Are They Important?
October 28th, 2021
Blogs
Brand Protection
Trademark Solutions
Holiday Trademarks — Tricks and Treats
October 27th, 2021
Blogs
Brand Protection
INSYNC Virtual Summit November 2021 – Interview with Simon Baggs and Robert Stolk
October 26th, 2021
Blogs
Brand Protection
Brand Protection & Halloween: How to vanquish ghastly threats
October 19th, 2021
Blogs
Brand Protection
Round Table: Online Brand Protection in the Football Industry
October 9th, 2021
Blogs
Brand Protection
The INSYNC Community and Virtual Summit
September 22nd, 2021
Blogs
Brand Protection
The Shop Safe Act, the Inform Consumers Act & Potential for Platform Liability in the US
August 19th, 2021
Blogs
Brand Protection
Round Table: E-commerce Legislative Developments – What Changes Should Brands Push For?
August 19th, 2021
Blogs
Brand Protection
Round Table: How Media & Entertainment Brands Are Tackling Online Threats
August 8th, 2021
Blogs
Brand Protection
The Digital Services Act: What do Brand and Content Owners need?
August 2nd, 2021
Blogs
Brand Protection
Brand Protection & NFTs: Scams, Fakes & How to Mitigate Risks
July 1st, 2021
Blogs
Brand Protection
The Digital Services Act Unwrapped: Initial Implications for Platforms, Brands and Consumers
June 15th, 2021
Blogs
Brand Protection
Round Table: How Are Businesses Structured to Address the Evolving Brand Protection Landscape?
June 14th, 2021
Blogs
Brand Protection
Protect Online Consumer Experience: Audit and Control Your Brand’s Digital Footprint
May 12th, 2021
Blogs
Brand Protection
The Commercial Impact of Tackling Repeat Infringers on E-commerce Platforms
April 25th, 2021
Blogs
Brand Protection
Can the current regulatory landscape tackle growing brand misuse online?
April 19th, 2021
Blogs
Brand Protection
Platforms' key role in protecting consumers from fake vaccines and COVID-related scams
April 11th, 2021
Blogs
Brand Protection
How and Why Search Engines Must Take Responsibility for Tackling Counterfeiters
April 6th, 2021
Blogs
Brand Protection
Round Table: How to Deal with Problematic Sellers on Shopee and Tokopedia
March 29th, 2021
Blogs
Brand Protection
Brand Protection United: How Mondelēz International Put an End to Siloed Working
March 29th, 2021
Blogs
Brand Protection
How to Use Case Management: Examples from Anti-Counterfeiting and Brand Protection
March 23rd, 2021
Blogs
Brand Protection
Fighting Falsifieds: Protecting the Pharmaceutical Sector From Counterfeits on Websites
March 11th, 2021
Register to Webinar
Day: 
Time: 
 ET