Glossary
Key terms used across our site and services.
A
- Abandoned Domain
- A registered domain that the brand owner no longer uses or monitors, which may be hijacked or repurposed by impersonators.
- Abuse Report
- A structured report submitted to a registrar, hosting provider, platform, or service to request investigation or removal of malicious or impersonating content.
- Account Takeover (ATO)
- When a third party gains unauthorized access to a legitimate user or brand account (social, email, app) and uses it to impersonate the brand or defraud victims.
- Affiliate Compliance
- A framework within which third‐party partners or affiliates must operate in connection with a brand, enabling the company to control how its brand is used and ensure safe affiliate marketing practices.
- Alternate Text-Based Impersonation
- Use of look‐alike characters, homoglyphs, or Unicode substitutions in domains or names to mimic the brand and fool users.
- Anti-Counterfeiting
- Proactive use of technology, processes and tools to detect and remove counterfeit goods or services that misuse a brand, either online or offline.
- App Store Fraud
- Malicious or impersonated mobile applications submitted to app marketplaces bearing the brand’s identity to mislead users or distribute malware.
- Attack Surface Management (ASM)
- The practice of discovering, monitoring and managing the full set of externally-facing digital assets (domains, apps, cloud services, social-profiles) that present potential risks to a brand’s digital presence.
B
- Brand Abuse
- The exploitation of a brand by third parties for illegal or unauthorised purposes — for example phishing, typosquatting, fake social profiles, counterfeit goods.
- Brand Asset Misuse
- Unauthorized use of a brand’s trademarked logos, slogans, imagery, or other visual identity in digital channels to mislead or impersonate.
- Brand Asset Registry
- A central repository of the brand’s legitimate digital assets (domains, social profiles, apps, logos) used to validate authenticity and compare suspicious entities.
- Brand Authentication Technology
- Technologies (such as blockchain, digital watermarks, verifiable credentials) used to verify that a digital asset or transaction genuinely originates from the brand.
- Brand Damage Susceptibility
- A metric or score reflecting how vulnerable a brand is to online impersonation, misuse, or reputation-harm from external digital threats.
- Brand Dilution
- Erosion of a brand’s distinctiveness and value due to unauthorized uses, confusing look-alikes or deceptive associations.
- Brand Gating
- Restricting or controlling the usage of a brand’s name, assets, or identifiers on third‐party platforms or channels to reduce impersonation risk.
- Brand Hijack
- When an attacker takes control of or abuses the brand’s legitimate digital property (e.g., social profile, domain, app store listing) and uses it for fraudulent ends.
- Brand Impersonation
- When a malicious actor pretends to be a legitimate brand (or uses a closely similar identity) to deceive users or exploit the brand’s trust.
- Brand Intelligence
- Collection and analysis of data about how a brand is being used or mis-used across digital channels (websites, apps, social media, dark web) to identify abuse and drive response.
- Brand Mapping
- The process of inventorying and visualising where a brand appears online (domains, apps, social channels, marketplaces) including third-party channels where it might be impersonated.
- Brand Monitoring
- The continuous tracking of brand-related keywords, brand assets, digital channels and third-party platforms to detect misuse or impersonation.
- Brand Protection
- The ongoing work of detecting, investigating, and responding to misuse of a brand across domains, websites, marketplaces, social channels, and other digital assets.
- Brand Reputation Attack
- Deliberate attempt by impersonators or counterfeiters to hijack, distort or degrade perception of a brand through negative associations or false claims.
- Brand Reputation Monitoring
- Tracking of brand perception, sentiment and mentions across digital channels to detect trends that may signal impersonation, abuse or reputation-threats.
- Brand Risk Management
- The holistic discipline of identifying, assessing, monitoring and mitigating risks to a brand’s integrity, reputation and digital footprint.
- Brand Safe Advertising
- Ensuring advertising placements and digital campaigns do not appear adjacent to or connected with content that undermines the brand’s reputation or could facilitate impersonation.
- Brand Threat Intelligence
- Gathering and analysing data specific to threats targeting a brand (fake domains, fake apps, impersonation campaigns, counterfeit listings) to drive response.
- Brandjacking
- A specific form of brand impersonation or identity theft where the online identity of a brand (or a prominent individual) is taken over or mis-used for malicious ends.
- Bulk Registration Detection
- Technique to identify when many domains, sub-domains or app listings with slight variations of the brand name are registered rapidly, signalling a possible impersonation campaign.
C
- Channel Monitoring
- Continuous surveillance of digital interaction points (social media, app stores, web forums, marketplaces) to detect fake or fraudulent representation of the brand.
- Charity Impersonation
- Fraudulent campaign where attackers use the brand’s name (or a look-alike) in the name of charity or relief appeals to exploit trust and collect funds illegitimately.
- Closure Reporting
- The status and evidence provided after remediation work is completed, showing what was removed, when action was taken, and whether access was verified as closed.
- Cloud Asset Exposure
- When brand-owned assets (APIs, sub-domains, storage buckets) are exposed publicly or unmanaged and used by impersonators to mislead or brand-jack.
- Compromised Brand Channel
- When a brand-managed channel (social account, official app, website) is taken over by an attacker and used to impersonate or defraud customers.
- Counterfeit Goods
- Unauthorised or illicit products using the brand’s trademark or identity to mislead customers — often sold online through marketplaces or grey-channels.
- Credential Capture Page
- A phishing or fraudulent web page designed to collect usernames, passwords, MFA codes, or other login details from victims.
- Credential Exposure
- The presence of usernames, passwords, tokens, or other account data in leaked datasets, criminal marketplaces, or attacker-controlled infrastructure.
- Credential Leak Scanner
- Tool or service that monitors for the brand’s credentials, employee credentials or customer credentials appearing in public or dark-web leaks that could be used for impersonation.
- Cybersquatting
- The registration, use or trafficking of domain names that imitate or are confusingly similar to a brand’s domain with bad-faith intent to profit from the brand’s goodwill.
D
- Dark-Web Monitoring
- Scanning of hidden or less-regulated parts of the internet (e.g., dark web forums, marketplaces) for mentions of the brand, credentials, or illicit activity that may lead to impersonation or abuse.
- Deep Link Hijacking
- When malicious apps or sites use deep links to brand’s legitimate mobile app behaviour to impersonate or intercept brand’s user flows.
- Deepfake Impersonation
- Use of AI-generated or manipulated audio, video or imagery to pose as the brand or its executives, for fraudulent or reputational attacks.
- Digital Certificate Abuse
- Issuance or use of SSL/TLS certificates for domains or sub-domains mimicking the brand to lend false credibility to fraudulent sites.
- Digital Footprint Rediscovery
- Periodic process of scanning the internet to rediscover forgotten, abandoned, or rogue digital assets (domains, apps, sub-domains) that may expose the brand to abuse.
- Digital Risk Protection Service (DRPS)
- A service or platform that monitors digital channels (domains, apps, social media, dark web) and provides alerting and remediation for brand threats.
- Domain Bounce Attack
- Use of a domain resembling the brand’s domain to redirect traffic temporarily to a malicious site then drop it, confusing tracking and evading detection.
- Domain Hijacking
- When an attacker takes control of a brand-owned domain (via registrar compromise) and uses it to impersonate the brand or host fraudulent content.
- Domain Takedown
- Process of suspending, closing or seizing a malicious or infringing domain (that is impersonating the brand) through registrar, registry or hosting provider action.
- Domain Typosquatting
- Registration of domain names that are slight miss-spellings or look-alikes of the brand’s legitimate domains, used to trick users or launch fraud campaigns.
E
- Evidence Collection
- The process of gathering URLs, screenshots, timestamps, headers, and related context so an incident can be validated, reported, and escalated effectively.
- Executive Impersonation
- Targeted form of brand abuse where threat actors pretend to be C-suite or leadership figures within the brand to request internal actions, wire transfers or leak data.
- Exposure Monitoring
- Continuous tracking for leaked credentials, stolen data, impersonation indicators, or threat chatter that may signal increased risk to an organisation.
F
- Fake App
- A mobile or desktop application that mimics the legitimate brand or uses its identity without authorisation, often to phish users or distribute malware.
- Fake Customer Support Portal
- A fraudulent website or chat service using the brand’s identity to impersonate support, collect credentials or payment data from users.
- Fake Review Flooding
- Large volume of inauthentic reviews posted on eCommerce or marketplace platforms posing as customers of the brand to distort sentiment or damage trust.
- Fake Storefront
- A fraudulent ecommerce or checkout experience that impersonates a legitimate seller or brand in order to steal payments, credentials, or personal data.
- Fraudulent Domain
- A domain name registered to imitate or misuse a brand for malicious or deceptive purposes.
G
- Geo-targeted Impersonation
- When attackers create fake brand channels or domains targeting a specific region or country using localised language, TLDs or promotion to maximise credibility.
H
- Hosting Provider
- The company or service responsible for serving a website or application online, often one of the parties contacted during phishing and malicious website takedowns.
I
- Impersonation Campaign
- A coordinated set of actions by threat actors that use the brand’s identity (domains, apps, profiles) to carry out fraud, phishing or fake-offer schemes.
- Incident Reporting
- The formal process of documenting and submitting malicious activity, security events, or phishing infrastructure to the right internal teams and external providers.
- Incident Response
- The coordinated set of actions taken to investigate, contain, remediate, and recover from a security event or active threat affecting an organisation.
L
- Lookalike Domain
- A domain that imitates the brand’s legitimate domain in appearance (using character substitutions, unicode homographs or added words) to mislead users.
M
- Malicious Website
- A website used to deceive users, distribute malware, steal credentials, impersonate a brand, or support other harmful or fraudulent activity.
- Marketplace Abuse
- When third parties or bad actors misuse online marketplaces (e.g., listings, reviews, counterfeit goods) to impersonate a brand or damage its reputation.
- Mis-/Disinformation Proxy
- A fake website, social-profile or communication channel impersonating the brand to spread false information, mislead customers or damage brand reputation.
- Multi-Channel Hijacking
- Simultaneous impersonation of the brand across multiple digital channels (email, social, domain, app) to increase legitimacy of the fraud or attack.
O
- On-Premise Asset Mapping
- Identification and inventory of all digital assets (domains, cloud services, APIs, apps) owned by the brand so that unmanaged or unknown assets cannot be exploited by impersonators.
- Online Brand Protection
- A strategic discipline combining monitoring, detection, enforcement and remediation to safeguard a brand’s online identity, reputation and assets from abuse.
P
- Phishing Domain
- A domain created by threat actors to appear like the brand’s legitimate site (often via typosquatting or look-alikes) to collect credentials or sensitive data from victims.
- Phishing Kit
- A reusable package of files, templates, and scripts that attackers deploy to create phishing pages quickly and imitate trusted login or payment experiences.
- Phishing Takedown
- The process of identifying, validating, reporting, and removing phishing infrastructure such as domains, pages, and supporting services.
- Proxy Domain Registration
- Use of anonymous or privacy-masked registrations by impersonators to register brand-look-alike domains, making legal takedowns more complex.
R
- Referral Spoofing
- Manipulating referral tracking or partner links so that an impersonated brand appears to have referred traffic or transactions which it did not.
- Registrar
- The organisation through which a domain name is registered and managed; registrars are often involved when abusive or fraudulent domains need to be investigated or suspended.
- Remediation Workflow
- Pre-defined process or play-book through which detected impersonation or brand-abuse incidents are responded to — including takedown requests, domain seizures, legal actions, and communications.
- Reseller Channel Monitoring
- Monitoring authorised and unauthorised resellers of the brand across digital marketplaces to detect and shut down impersonated listings or counterfeit goods.
- Reverse Domain Mapping
- Technique of mapping known rogue domains back through hosting, registrar and DNS data to identify clusters of impersonation campaigns targeting the brand.
S
- SDK Impersonation
- When malicious software development kits (SDKs) in mobile apps misuse the brand’s identity (via icon, name) to impersonate legitimate brand apps or services.
- Social-Media Impersonation
- Creation of fake or misleading social-media accounts posing as the brand, its executives or its affiliates in order to deceive users or spread fraud.
- Spoofing
- The act of falsifying identity data (like sender address, domain, or social-account name) to appear trustworthy and linked to a legitimate brand.
T
- Takedown Automation
- Use of software or platforms to automatically generate and submit removal or suspension requests for detected brand-abuse entities (domains, apps, listings, profiles) to speed response.
- Threat Feed
- Stream or dataset of signals (e.g., newly registered domains, reported phishing URLs, fake apps) used by brand-protection teams to identify brand-impersonation risks in near-real-time.
- Threat Takedown Escalation
- Procedure that prioritises high-severity brand impersonation incidents and escalates them through manual human review and legal or enforcement action.
- Threat Validation
- The process of confirming that a suspicious signal, page, domain, or alert is genuinely malicious and merits escalation or remediation.
- Token Squatting
- Registration or listing of cryptocurrency tokens with names resembling the brand to defraud or mis-lead investors or users into thinking they are affiliated with the brand.
- Trademark Squatting
- Registration of trademarks (or service marks) in bad faith by third parties to exploit a brand’s reputation, block legitimate use, or force negotiation.
- Triage
- The prioritisation of alerts or incidents based on severity, business impact, and likelihood so teams can focus attention where it is most needed.
U
- URL Analysis
- Reviewing the full structure of a URL, including domain, subdomain, path, and parameters, to identify deception, impersonation, or malicious intent.
V
- Virtual Brand Discovery
- Technique of using automated scanning and crawlers to discover un-registered or rogue assets (domains, apps, sub-domains) that are impersonating or mis-using the brand’s identity.
W
- Web Harvesting Detection
- Detection of scraping or harvesting of brand’s digital content (logos, trademarks, assets) for reuse in impersonation campaigns.
- Website Defacement
- Unauthorised alteration of a website’s content or appearance, often used to spread messages, damage trust, or signal compromise.
- Website Malware Monitoring
- Continuous monitoring for malicious scripts, injected content, suspicious page changes, and other indicators that a website may be compromised or abused.
- Website Threat Detection
- The identification of suspicious or malicious activity affecting a website, such as phishing pages, malware, unauthorised changes, or linked abuse infrastructure.