Google

Google Maps Introduces Tool For Businesses To Report Extortion Tied To Negative Reviews

Google Maps has introduced a dedicated tool allowing merchants to report extortion attempts linked to fake negative reviews.

Announced as part of Google’s latest fraud and scams advisory on November 6, 2025, this feature aims to combat a growing tactic used by cybercriminals to harass and financially pressure business owners.

With online scams affecting 57% of adults worldwide according to the 2025 Global Anti-Scam Alliance report, Google’s initiative underscores its commitment to safeguarding the digital ecosystem.

Understanding Negative Review Extortion

Negative review extortion, often called “review-bombing,” involves bad actors flooding a business’s Google Maps profile with fabricated one-star reviews.

These attacks bypass moderation systems through coordinated efforts, tarnishing reputations overnight.

Scammers then reach out via messaging apps or email, demanding payments typically in cryptocurrency or gift cards to remove the reviews or halt further damage.

Refusal escalates the assault, potentially crippling local businesses reliant on positive online visibility for customer traffic.

This scheme preys on the vulnerability of small enterprises, where a plummeting rating can lead to lost revenue and long-term harm.

Google’s Trust & Safety teams have noted a rise in such incidents, fueled by transnational crime groups leveraging AI to automate and scale their operations.

The advisory highlights how these extortionists exploit platforms like Google Maps, which hosts millions of business listings, to target owners in retail, hospitality, and services sectors.

The New Reporting Mechanism

The freshly rolled-out tool provides a streamlined, direct channel for businesses to alert Google of extortion attempts.

Accessible through the Google Business Profile dashboard, it enables users to submit evidence such as screenshots of demands, chat logs, and review patterns.

Once reported, Google’s moderation teams prioritize investigations, removing violating content and pursuing actions against perpetrators under policies against fake engagement and harassment.

This isn’t a standalone fix; it integrates with existing defenses like automated detection of suspicious review spikes and prohibitions on extortionate behavior.

For businesses, the process is straightforward: log in, navigate to the support section, and use the dedicated extortion report form. Early adopters report quicker resolutions, with Google emphasizing swift takedowns to minimize impact.

Protecting Businesses In The Scam Era

Business owners should never pay ransoms, as it invites repeat attacks. Instead, document everything and report immediately to empower law enforcement.

Google’s broader efforts include AI-driven scam detection in Gmail and Messages, plus ad policies blocking fraudulent promotions. As holiday shopping ramps up, vigilance against seasonal scams remains crucial.

This tool represents a proactive step in an evolving threat landscape, empowering businesses to fight back without fear. By sharing these insights, Google fosters a safer online space for all.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago