Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews

Posted on November 8, 2025November 8, 2025 By CWS

Scammers are concentrating on companies with a brand new extortion scheme, and Google Maps is preventing again with a devoted reporting software.

Google has launched a function that enables enterprise house owners to report ransom calls for on to malicious actors who threaten them with pretend damaging evaluations.

Cybercriminals have developed a classy plan to extort cash from companies via Google Maps evaluations.

The scheme begins with “review-bombing,” the place unhealthy actors flood a enterprise profile with pretend one-star evaluations designed to bypass Google’s moderation programs.

As soon as the assault launches, scammers contact enterprise house owners via third-party messaging apps and demand cost.

The risk is straightforward however efficient: pay the price, or the damaging evaluations keep and doubtlessly escalate, damaging the enterprise’s fame and on-line score.

This sort of extortion exploits the significance of on-line evaluations for contemporary companies.

A sudden drop in rankings can considerably erode buyer belief and income, leaving some enterprise house owners feeling pressured to pay relatively than threat additional injury.

Google’s Response to the Risk

Google Maps has applied clear insurance policies prohibiting pretend engagement, harassment, extortion, and dangerous content material.

The platform actively screens for violations and removes content material that breaks these guidelines.

Nevertheless, the brand new reporting function represents a extra direct response to the rising extortion drawback.

The corporate is at the moment rolling out an official service provider extortion report kind that enables enterprise house owners to alert Google to ransom calls for rapidly.

This streamlined reporting course of permits the corporate to take swift motion towards malicious actors making an attempt to govern the evaluation system for monetary acquire.

Safety specialists suggest that enterprise house owners by no means have interaction with extortionists or pay ransom calls for, as doing so solely encourages additional assaults.

As an alternative, companies ought to instantly report malicious exercise utilizing Google’s official service provider extortion report kind.

Enterprise house owners ought to protect all proof of extortion makes an attempt, together with screenshots, emails, and chat logs.

These information can assist regulation enforcement investigations and assist Google establish patterns of abuse throughout a number of targets.

The evaluation extortion scheme highlights how scammers proceed to search out new methods to take advantage of on-line platforms.

Google’s proactive strategy to the reporting function demonstrates the continued battle between platform suppliers and cybercriminals to guard companies and shoppers from digital fraud.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Adds, Bad, Businesses, Demands, Feature, Google, Maps, Ransom, Removing, Report, Reviews

Post navigation

Previous Post: Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
Next Post: Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched

Related Posts

FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process Cyber Security News
New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors Cyber Security News
Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Cyber Security News
Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions Cyber Security News
PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code Cyber Security News
U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News