{"id":41,"date":"2009-11-12T15:50:23","date_gmt":"2009-11-12T15:50:23","guid":{"rendered":"http:\/\/www.above.com\/blog\/?p=41"},"modified":"2013-10-17T20:55:59","modified_gmt":"2013-10-17T09:55:59","slug":"reverse-domain-hijacking","status":"publish","type":"post","link":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking","title":{"rendered":"Reverse domain hijacking"},"content":{"rendered":"<p>Domain hijacking is the process of transferring ownership of a domain name without the permission of the registrant (domain owner). This is usually done by hacking into their registrar account or tricking them into giving away their password, by pretending to be their registrar.<\/p>\n<p>Reverse domain hijacking is where someone tries to claim the rights to a domain and use legal threats or <a href=\"http:\/\/www.above.com\/blog\/2009\/11\/evicting-domain-cybersquaters.html\">UDRP<\/a> (Uniform Domain Name Resolution Policy)  action to have a domain transferred to them from the current owner who also has full right to own and the same domain.<\/p>\n<p><!--more--><\/p>\n<p>For example, windows.com. Microsoft has a trademark on the terms &#8220;windows&#8221;  yet a Windows (glass) manufacturer or a Construction Company that fits Window frames to buildings also have rights to use this domain legally&#8230; So if the glass manufacturer registered that domain first and Microsoft tried to get the domain off them using their trademark and going through UDRP or other forums, it would be classified as reverse domain hijacking.<\/p>\n<p>Reverse domain hijacking cases are most often performed by a bigger company trying take a domain name from a smaller company, who also has a legitimate reason for owning the domain. They will usually start off with Cease and Desist letters and then launch a UDRP dispute, in the hope that they will intimidate the smaller company. It is argued that UDRP services will usually favor the complainant (person launching the dispute, and paying for it). So, often the larger company will be awarded the domain name, without opposition.<\/p>\n<p>The smaller company does then have the option to dispute this in court, but this can be a very costly process, which most smaller businesses cannot afford.<\/p>\n<p>So if you feel you have a legitimate claim on a domain, make sure to put in a response via the UDRP process, as by doing so, you are making it that much harder for the Reverse domain hijacker to get your domain name!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Domain hijacking is the process of transferring ownership of a domain name without the permission of the registrant (domain owner). This is usually done by &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Reverse domain hijacking\" class=\"read-more button\" href=\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking#more-41\" aria-label=\"More on Reverse domain hijacking\">Read more&#8230;<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[9],"tags":[56,55,36,35,37],"class_list":["post-41","post","type-post","status-publish","format-standard","hentry","category-trademarks-and-legal","tag-domain-hijacking","tag-reverse-domain-hijacking","tag-tradmarks","tag-udrp","tag-uniform-domain-name-resolution-policy","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Reverse domain hijacking - Above<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reverse domain hijacking - Above\" \/>\n<meta property=\"og:description\" content=\"Domain hijacking is the process of transferring ownership of a domain name without the permission of the registrant (domain owner). This is usually done by ... Read more...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking\" \/>\n<meta property=\"og:site_name\" content=\"Above\" \/>\n<meta property=\"article:published_time\" content=\"2009-11-12T15:50:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-10-17T09:55:59+00:00\" \/>\n<meta name=\"author\" content=\"nicholas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nicholas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking\"},\"author\":{\"name\":\"nicholas\",\"@id\":\"https:\/\/www.above.com\/blog\/#\/schema\/person\/a313023e1d857a4f054886171ba31819\"},\"headline\":\"Reverse domain hijacking\",\"datePublished\":\"2009-11-12T15:50:23+00:00\",\"dateModified\":\"2013-10-17T09:55:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking\"},\"wordCount\":326,\"publisher\":{\"@id\":\"https:\/\/www.above.com\/blog\/#organization\"},\"keywords\":[\"domain hijacking\",\"Reverse domain hijacking\",\"tradmarks\",\"udrp\",\"Uniform Domain Name Resolution Policy\"],\"articleSection\":[\"TradeMarks and Legal\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking\",\"url\":\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking\",\"name\":\"Reverse domain hijacking - Above\",\"isPartOf\":{\"@id\":\"https:\/\/www.above.com\/blog\/#website\"},\"datePublished\":\"2009-11-12T15:50:23+00:00\",\"dateModified\":\"2013-10-17T09:55:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.above.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Reverse domain hijacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.above.com\/blog\/#website\",\"url\":\"https:\/\/www.above.com\/blog\/\",\"name\":\"Above\",\"description\":\"Domain News and Events\",\"publisher\":{\"@id\":\"https:\/\/www.above.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.above.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.above.com\/blog\/#organization\",\"name\":\"Above\",\"url\":\"https:\/\/www.above.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.above.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.above.com\/blog\/wp-content\/uploads\/2023\/01\/above-logo-1.png\",\"contentUrl\":\"https:\/\/www.above.com\/blog\/wp-content\/uploads\/2023\/01\/above-logo-1.png\",\"width\":466,\"height\":88,\"caption\":\"Above\"},\"image\":{\"@id\":\"https:\/\/www.above.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.above.com\/blog\/#\/schema\/person\/a313023e1d857a4f054886171ba31819\",\"name\":\"nicholas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.above.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"nicholas\"},\"url\":\"https:\/\/beta.above.com\/blog\/author\/nicholas\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reverse domain hijacking - Above","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking","og_locale":"en_US","og_type":"article","og_title":"Reverse domain hijacking - Above","og_description":"Domain hijacking is the process of transferring ownership of a domain name without the permission of the registrant (domain owner). This is usually done by ... Read more...","og_url":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking","og_site_name":"Above","article_published_time":"2009-11-12T15:50:23+00:00","article_modified_time":"2013-10-17T09:55:59+00:00","author":"nicholas","twitter_card":"summary_large_image","twitter_misc":{"Written by":"nicholas","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking#article","isPartOf":{"@id":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking"},"author":{"name":"nicholas","@id":"https:\/\/www.above.com\/blog\/#\/schema\/person\/a313023e1d857a4f054886171ba31819"},"headline":"Reverse domain hijacking","datePublished":"2009-11-12T15:50:23+00:00","dateModified":"2013-10-17T09:55:59+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking"},"wordCount":326,"publisher":{"@id":"https:\/\/www.above.com\/blog\/#organization"},"keywords":["domain hijacking","Reverse domain hijacking","tradmarks","udrp","Uniform Domain Name Resolution Policy"],"articleSection":["TradeMarks and Legal"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking","url":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking","name":"Reverse domain hijacking - Above","isPartOf":{"@id":"https:\/\/www.above.com\/blog\/#website"},"datePublished":"2009-11-12T15:50:23+00:00","dateModified":"2013-10-17T09:55:59+00:00","breadcrumb":{"@id":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.above.com\/blog\/reverse-domain-hijacking"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/beta.above.com\/blog\/reverse-domain-hijacking#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.above.com\/blog"},{"@type":"ListItem","position":2,"name":"Reverse domain hijacking"}]},{"@type":"WebSite","@id":"https:\/\/www.above.com\/blog\/#website","url":"https:\/\/www.above.com\/blog\/","name":"Above","description":"Domain News and Events","publisher":{"@id":"https:\/\/www.above.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.above.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.above.com\/blog\/#organization","name":"Above","url":"https:\/\/www.above.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.above.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.above.com\/blog\/wp-content\/uploads\/2023\/01\/above-logo-1.png","contentUrl":"https:\/\/www.above.com\/blog\/wp-content\/uploads\/2023\/01\/above-logo-1.png","width":466,"height":88,"caption":"Above"},"image":{"@id":"https:\/\/www.above.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.above.com\/blog\/#\/schema\/person\/a313023e1d857a4f054886171ba31819","name":"nicholas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.above.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"nicholas"},"url":"https:\/\/beta.above.com\/blog\/author\/nicholas"}]}},"_links":{"self":[{"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/posts\/41","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/comments?post=41"}],"version-history":[{"count":0,"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/posts\/41\/revisions"}],"wp:attachment":[{"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/media?parent=41"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/categories?post=41"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.above.com\/blog\/wp-json\/wp\/v2\/tags?post=41"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}