Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

Posted on November 7, 2025November 7, 2025 By CWS

Nov 07, 2025Ravie LakshmananData Safety / Malware
Google on Thursday stated it is rolling out a devoted kind to permit companies listed on Google Maps to report extortion makes an attempt made by risk actors who submit inauthentic unhealthy opinions on the platform and demand ransoms to take away the unfavourable feedback.
The method is designed to deal with a typical apply referred to as overview bombing, the place on-line customers deliberately submit unfavourable person opinions in an try and hurt a product, a service, or a enterprise.
“Dangerous actors attempt to circumvent our moderation programs and flood a enterprise’s profile with faux one-star opinions,” Laurie Richardson, vice chairman of Belief & Security at Google, stated. “Following this preliminary assault, the scammers straight contact the enterprise proprietor, usually via third-party messaging apps, to demand fee.”
The risk actors warn of additional escalation ought to the sufferer fail to pay the price, risking potential injury to their public score and popularity. These ploys are seen as an try and coerce retailers into paying the extortion demand.

Google has additionally warned customers of other forms of scams which are prevalent at the moment –

On-line job scams, the place fraudsters impersonate reputable job boards to focus on folks on the lookout for employment utilizing faux postings and recruiter profiles to trick them into offering delicate information underneath the pretext of filling faux software kinds and video interviews, or downloading malware like distant entry trojans (RATs) or data stealers.
AI product impersonation scams, which contain capitalizing on the recognition surrounding synthetic intelligence (AI) instruments to impersonate and promote fashionable AI companies utilizing malvertising, hijacked social media accounts, and trojanized open-source repositories that promise “free” or “unique” entry with a purpose to entice victims into downloading malicious cellular and desktop apps, “fleeceware” apps with hidden subscriptions, and bogus browser extensions.
Malicious VPN apps and extensions, the place risk actors distribute malicious functions disguised as reputable VPN companies throughout platforms utilizing social engineering lures that leverage geopolitical occasions to ensnare victims who’re looking for safe web entry. As soon as put in, these apps can act as a conduit for different payloads like data stealers, RATs, and banking malware that may steal information and drain funds from cryptocurrency wallets.
Fraud restoration scams, which contain focusing on people who’ve already been scammed by posing as asset restoration brokers related to trusted entities like legislation companies and authorities businesses, solely to rip-off them a second time. It is value noting that the U.S. Federal Bureau of Investigation (FBI) issued a bulletin about this risk again in August 2025.
Seasonal vacation scams, the place risk actors exploit main vacation and buying durations to deceive unsuspecting buyers with counterfeit provides on social media platforms that result in monetary fraud and information theft.

To counter these schemes, customers are suggested to be cautious of surprising supply texts or emails that demand a price, train warning when approached by individuals who declare they’ll get well funds, obtain apps solely from trusted sources and bonafide builders, and be vigilant when requested to fill out delicate private data.

The event coincides with a report from Reuters, which discovered that Meta is making billions of {dollars} yearly from advert advertising and marketing scams and unlawful merchandise on its platform. Citing an inner December 2024 doc, the British information company stated the rip-off adverts might account for as a lot as 10.1% of its total income, or roughly $16 billion.
Meta allowed “excessive worth accounts” to “accrue greater than 500 strikes with out Meta shutting them down,” Reuters reported, including “a small advertiser must get flagged for selling monetary fraud not less than eight instances earlier than Meta blocked it.”
As well as, the corporate is claimed to have charged unhealthy actors increased charges extra to run adverts as a penalty, as they accrued extra strikes, solely banning advertisers if its automated programs predict they’re 95% sure to be committing fraud. On common, Meta is estimated to have served its platforms’ customers an estimated 15 billion “increased threat” rip-off ads every single day.
In response, Meta stated the ten.1% estimate was tough and overly-inclusive, and that it has eliminated greater than 134 million items of rip-off advert content material up to now in 2025.

The Hacker News Tags:Attempts, Businesses, Extortion, Feature, Google, Launches, Maps, Report, ReviewBased

Post navigation

Previous Post: Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token
Next Post: Destructive Russian Cyberattacks on Ukraine Expand to Grain Sector

Related Posts

Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks The Hacker News
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News
Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks The Hacker News
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The Hacker News
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks The Hacker News
Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
  • From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
  • Landfall Android Spyware Targeted Samsung Phones via Zero-Day
  • New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model
  • New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
  • From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
  • Landfall Android Spyware Targeted Samsung Phones via Zero-Day
  • New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model
  • New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News