The Biz Tool Store

The Rise of Review Ransom


Listen Later

In this episode, we’re diving into a disturbing trend that’s targeting small businesses: “Review Ransom.” This digital-age shakedown is a new form of extortion where scammers weaponize your online reputation and hold it hostage. Here’s a breakdown of what it is and how you can protect your business.

(00:00) – Introduction: What is Review Ransom?

The speaker introduces “Review Ransom,” comparing it to traditional ransomware. Instead of hacking your files, scammers are hijacking your business’s reputation.

(00:30) – How the Scam Works

The process is simple and devastating:

  1. A scammer (or group of scammers) floods your Google Business Profile with a string of fake, intentional, one-star reviews all at once.
  2. They then contact you, often through email or a messaging app.
  3. The demand: They will only remove or “revise” these damaging reviews if you pay them a ransom.
  4. (01:15) – The Key Vulnerability: Your WhatsApp Button

    The speaker identifies a critical vulnerability that many targeted businesses have in common: they have enabled the WhatsApp integration on their Google Business Profile.

    • This button gives scammers from anywhere in the world a direct, easy, and often anonymous way to find and contact you to make their demands.
    • Preventative Step #1: The speaker strongly recommends disabling the WhatsApp integration on your Google Business Profile immediately to cut off this easy access point.
    • (02:06) – Proactive Defense: Document Everything

      Don’t wait until you’re attacked. The best defense is a good offense.

      • The speaker advises all business owners to proactively document their legitimate reviews.
      • Go to your profile and take screenshots of all your current reviews, or use review software to download a CSV file of your review history.
      • This creates a baseline of your real reputation, which is crucial evidence if you’re ever targeted.
      • (03:31) – What to Do If You Are Attacked

        If you become a victim of review ransom, here’s the action plan:

        1. Do Not Pay the Ransom.
        2. Use Your Documentation: This is where your screenshots become invaluable. You can use them to show Google your long-standing history of legitimate reviews, contrasting it with the sudden, suspicious burst of one-star ratings.
        3. Flag the Reviews: Go into your Google Business Profile and flag every single fake review for appeal.
        4. Provide Evidence: When you appeal, include any and all evidence of the extortion attempt. This includes screenshots of the ransom demands, whether they came through email, WhatsApp, or another platform.
        5. (04:30) – Final Summary & Key Takeaways

          The speaker provides a final, four-step strategy:

          1. Prevent: Remove the WhatsApp button from your Google Business Profile.
          2. Prepare: Screenshot or download all your current, legitimate reviews today as a proactive measure.
          3. React: If you are attacked, immediately start the appeal process with Google, flagging each review and providing your documentation and ransom evidence.
          4. Diversify: Don’t sleep on other platforms. The speaker emphasizes the importance of getting reviews on Yelp, as it’s a major data source that powers other important platforms, including Apple Maps.
          5. ...more
            View all episodesView all episodes
            Download on the App Store

            The Biz Tool StoreBy Tay Musslewhite