Finding a scam page using your business name is a gut-punch. Whether you run a small local shop or manage a niche blog on WordPress, brand impersonation isn't just an annoyance; it’s a direct threat to your reputation and your revenue. Over the last decade of moderating forums and cleaning up scraped content for clients, I’ve seen everything from simple content theft to sophisticated phishing operations.
Here is the reality: "Just contact support" is garbage advice. Most support tickets go into a black hole. To take down a scam page effectively, you need a systematic, evidence-based approach. Put down the "fight back" fantasies—getting into a public Twitter war with a scammer only gives them more oxygen. You want them gone, not engaged.

Before you click a single link or send an email, do this: Screenshot everything. Every page, every URL, every piece of contact info, and every time-stamped interaction. If the site goes down tomorrow, you lose the proof you need for legal or domain registrar complaints.
Step 1: Assessing the Risk Level
Not all scam pages are created equal. You need to categorize the threat before you act. Use this table to decide your escalation path.
Threat Type Risk Level Primary Action Scraped Content (SEO spam) Low DMCA Takedown Request Fake "Official" Support Page High Google Report + Domain Registrar Complaint Phishing / Payment Fraud Critical ISP/Hosting Abuse Report + Law EnforcementStep 2: Collect Your Evidence (The "Paper Trail")
Do not report a site until you have a packet of proof. If you don't have this, don't bother sending the email. You need:
- Full URLs: Not just the homepage, but the specific subpages impersonating your brand. Screenshots: Use tools like GoFullPage or native OS screenshots. Ensure the URL bar and system clock are visible in the capture. Whois Data: Run the domain through a tool like ICANN WHOIS. Note the registrar (e.g., GoDaddy, Namecheap) and the hosting provider. Comparison Evidence: A side-by-side document showing your legitimate assets versus the stolen ones.
Step 3: The Takedown Workflow
Once you have your evidence, follow this order of operations. Do not skip steps.
1. Report to Google
If the site is ranking for your brand name, you need to neutralize it in search. Use the Google "Report a phishing page" tool. If they are stealing your unique content, file a formal DMCA takedown request through the Google Search Console. This tells Google to de-index the specific pages, effectively killing the scammer's traffic source.
2. Target the Hosting Provider
Scammers rarely own their own servers. They pay for hosting. If you find the hosting provider (usually listed in the Whois data), search for their "Abuse" email address. Do not use a generic "contact us" form. Send a clear, concise email:
Subject: Formal Complaint: Trademark Infringement and Phishing - [Domain Name]
Body: "I am the owner of [Your Business Name]. The domain [Scam Domain] is actively impersonating my brand to deceive customers. Please find the attached evidence and the DMCA takedown notice. This site violates your Acceptable Use Policy regarding fraud. Please terminate the account immediately."
3. File a Registrar Complaint
If the host ignores you, go to the registrar (the company that sold them the domain name). Registrars are terrified of liability regarding phishing. Mentioning "Trademark Complaint" and "Consumer Fraud" usually gets a quicker response than simply saying "they stole my name."
Step 4: Securing Your WordPress Site
If you are a WordPress user, you need to make sure the scammer isn't leveraging your site's reputation. Sometimes, scammers scrape your XML sitemaps to gain authority. If you find your site being scraped, use these immediate fixes:
- Disable Hotlinking: Stop them from stealing your bandwidth and images by adding a rewrite rule to your .htaccess file. Update your Robots.txt: Ensure you aren't leaking sensitive directories that scammers could use to map your infrastructure. Check for Plugin Vulnerabilities: Sometimes, a scam page isn't just stealing your name—it's trying to exploit a known vulnerability in an outdated theme or plugin. Keep your WordPress core and plugins updated.
Step 5: When to Call the Professionals
There is a point where the DIY approach fails. If the site is a high-traffic e-commerce clone taking money from your customers, stop the emails and talk to a lawyer specializing in intellectual property. Small businesses often feel they can't afford legal help, but a single "Cease and Desist" on official letterhead can often do what ten emails couldn't.

Also, keep an eye on sites like 99techpost. They often provide updated lists of known malicious actors and hosting providers that are notorious for ignoring abuse reports. Staying informed about where these scammers congregate helps you spot the next wave before it hits your brand.
Common Pitfalls to Avoid
- Don't email the scammer: They are not reasonable people. You are only confirming that your email address is active and that your brand is bothered by them. Silence is your best weapon. Avoid "Viral Outrage": I see businesses tweet their frustration, asking for "shares" to get the site taken down. This creates more backlinks to the scam site and hurts your own SEO. Watch for Fake "Takedown" Services: Any company that promises to "clean your web reputation" for a flat fee without explaining the technical process is likely a scam themselves.
Final Checklist: Your Immediate Next Actions
Archive: Save PDF versions of the scam site and all relevant pages. Identify: Use WHOIS to find the hosting provider and the domain registrar. Report: Submit a DMCA notice to Google via the proper legal portal. Notify: Send a formal abuse report to the hosting provider's email. Monitor: Set up a Google Alert for your brand name to catch future iterations before they gain traction.Protecting your brand is a technical task, not an emotional one. Be formal, be diligent, and stay the course. By targeting the infrastructure that keeps their site alive—the host and the follow this link search engine—you turn the tide in your favor without feeding the trolls.