Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Google Maps Adds Extortion Reporting

November 10, 2025
Reading Time: 3 mins read
in News
Google Maps Adds Extortion Reporting

Google is actively tackling a malicious tactic known as review bombing, where criminals post a deluge of fake one-star reviews on a business’s Google Maps profile. Following this initial digital attack, as described by Laurie Richardson, Google’s vice president of Trust & Safety, the scammers contact the business owner directly—often using third-party messaging apps—to demand payment. They threaten further harm to the business’s public rating and reputation if the fee is not paid, coercing merchants into meeting the extortion demand. The new dedicated form is Google’s mechanism for businesses to report these specific instances of review-based extortion.

Beyond review extortion, Google also highlighted several other prevalent scams currently circulating online. These include online job scams, where fraudsters use fake postings and recruiter profiles on fraudulent job boards to trick job seekers into providing sensitive data or downloading malware, such as Remote Access Trojans (RATs) or information stealers. Another growing threat is AI product impersonation scams, where bad actors capitalize on the popularity of artificial intelligence to promote and mimic genuine AI services. They use techniques like malvertising and hijacked social media accounts to trap victims into downloading malicious mobile and desktop apps, ‘fleeceware’ with hidden subscriptions, or bogus browser extensions.

The threat landscape also features malicious VPN apps and extensions. These applications are disguised as legitimate Virtual Private Network services and are often distributed using social engineering lures that exploit geopolitical events to target users seeking secure internet access. Once installed, these apps can deliver other damaging payloads, including information stealers, RATs, and banking malware, with the ultimate goal of stealing data and draining cryptocurrency wallets. Additionally, a particularly cruel scheme is the fraud recovery scam, where individuals who have already been scammed are targeted a second time. Fraudsters pose as asset recovery agents associated with trusted entities like law firms or government agencies—a threat the U.S. FBI also flagged in August 2025.

Finally, seasonal threats like holiday scams exploit major shopping and holiday periods. Threat actors use counterfeit offers on social media platforms to deceive unsuspecting shoppers, leading to financial fraud and data theft. To counter this wide array of schemes, users are advised to be highly vigilant. Key precautions include being wary of unexpected delivery texts or emails that demand a fee and exercising extreme caution when approached by anyone claiming they can recover lost funds. Users should also download apps exclusively from trusted sources and legitimate developers and be highly cautious when asked to provide sensitive personal information online.

These developments coincide with a report from Reuters detailing a similar fight against malicious activity on Meta’s platforms. The news agency’s findings suggest Meta earns billions annually from ad marketing scams and illegal products. Citing an internal December 2024 document, Reuters estimated that scam ads could account for up to 10.1% of Meta’s overall revenue, translating to approximately $16 billion. The report further stated that Meta allegedly allowed “high value accounts” to accumulate hundreds of strikes before being shut down, and even charged bad actors higher rates as a penalty for accruing more strikes, only banning advertisers if its systems were 95% certain they were committing fraud. Meta responded by calling the 10.1% estimate “rough and overly-inclusive” and noted that it has removed over 134 million pieces of scam ad content in 2025.

Reference:

  • Google Launches Maps Feature To Help Businesses Report Review Based Extortion
Tags: Cyber NewsCyber News 2025Cyber threatsNovember 2025
ADVERTISEMENT

Related Posts

Niobium Raises 23 Million For FHE Tech

NCSC Warns Orgs Of Exposed Device Flaws

December 5, 2025
PRC Hackers Use BrickStorm In US

PRC Hackers Use BrickStorm In US

December 5, 2025
NCSC Warns Orgs Of Exposed Device Flaws

Hackers Accused Of Wiping 96 Databases

December 5, 2025
Niobium Raises 23 Million For FHE Tech

Niobium Raises 23 Million For FHE Tech

December 4, 2025
Defender Outage Disrupts Threat Alerting

Arizona AG Sues Temu Over Data Theft

December 4, 2025
Niobium Raises 23 Million For FHE Tech

Google Expands Android Scam Protection

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial