Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews

Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews

Posted on November 8, 2025November 8, 2025 By CWS

Scammers are concentrating on companies with a brand new extortion scheme, and Google Maps is preventing again with a devoted reporting software.

Google has launched a function that enables enterprise house owners to report ransom calls for on to malicious actors who threaten them with pretend damaging evaluations.

Cybercriminals have developed a classy plan to extort cash from companies via Google Maps evaluations.

The scheme begins with “review-bombing,” the place unhealthy actors flood a enterprise profile with pretend one-star evaluations designed to bypass Google’s moderation programs.

As soon as the assault launches, scammers contact enterprise house owners via third-party messaging apps and demand cost.

The risk is straightforward however efficient: pay the price, or the damaging evaluations keep and doubtlessly escalate, damaging the enterprise’s fame and on-line score.

This sort of extortion exploits the significance of on-line evaluations for contemporary companies.

A sudden drop in rankings can considerably erode buyer belief and income, leaving some enterprise house owners feeling pressured to pay relatively than threat additional injury.

Google’s Response to the Risk

Google Maps has applied clear insurance policies prohibiting pretend engagement, harassment, extortion, and dangerous content material.

The platform actively screens for violations and removes content material that breaks these guidelines.

Nevertheless, the brand new reporting function represents a extra direct response to the rising extortion drawback.

The corporate is at the moment rolling out an official service provider extortion report kind that enables enterprise house owners to alert Google to ransom calls for rapidly.

This streamlined reporting course of permits the corporate to take swift motion towards malicious actors making an attempt to govern the evaluation system for monetary acquire.

Safety specialists suggest that enterprise house owners by no means have interaction with extortionists or pay ransom calls for, as doing so solely encourages additional assaults.

As an alternative, companies ought to instantly report malicious exercise utilizing Google’s official service provider extortion report kind.

Enterprise house owners ought to protect all proof of extortion makes an attempt, together with screenshots, emails, and chat logs.

These information can assist regulation enforcement investigations and assist Google establish patterns of abuse throughout a number of targets.

The evaluation extortion scheme highlights how scammers proceed to search out new methods to take advantage of on-line platforms.

Google’s proactive strategy to the reporting function demonstrates the continued battle between platform suppliers and cybercriminals to guard companies and shoppers from digital fraud.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Adds, Bad, Businesses, Demands, Feature, Google, Maps, Ransom, Removing, Report, Reviews

Post navigation

Previous Post: Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
Next Post: Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched

Related Posts

Attacker Context and Historical iOS Zero-Click Similarities Attacker Context and Historical iOS Zero-Click Similarities Cyber Security News
Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT Cyber Security News
1.2 Million Healthcare Devices and Systems Data Leaked Online 1.2 Million Healthcare Devices and Systems Data Leaked Online Cyber Security News
How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? Cyber Security News
What’s Next for SOC in 2026: Get the Early-Adopter Advantage  What’s Next for SOC in 2026: Get the Early-Adopter Advantage  Cyber Security News
New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Claude Opus 4.6 Unveils 500+ Critical Vulnerabilities
  • FvncBot Exploits Android Accessibility: A New Threat
  • Transparent Tribe Targets India’s Tech Startups
  • Cybercriminals Exploit Legitimate Platforms for Ransomware
  • Odyssey Stealer Escalates Threats to macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Claude Opus 4.6 Unveils 500+ Critical Vulnerabilities
  • FvncBot Exploits Android Accessibility: A New Threat
  • Transparent Tribe Targets India’s Tech Startups
  • Cybercriminals Exploit Legitimate Platforms for Ransomware
  • Odyssey Stealer Escalates Threats to macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark