Webflow site owners have occasionally reported receiving scam or phishing emails falsely claiming their websites were hacked and demanding ransom payments. These messages are part of widespread spam campaigns and are not evidence of an actual breach.
1. Understand the Scam
- Most of these emails are hoaxes that rely on fear tactics to extort money.
- They often include vague threats, no actual evidence of access, and demand Bitcoin payments.
- Messages may falsely claim to know your passwords or have access to your admin panels.
2. Check Your Webflow Site for Compromises
- Log in to Webflow and verify if your website is still operational and unchanged.
- Check Site Settings → Backups to review recent publishes or roll back in case of unauthorized edits.
- Go to Project Settings → Hosting to make sure site domains haven’t been modified.
3. Review Site Security
- Ensure you’re using strong passwords and have 2FA (Two-Factor Authentication) enabled on your Webflow account.
- Review your Webflow Team or Workspace for any unknown collaborators or editors.
- These scams rarely involve actual Webflow access unless your credentials are exposed elsewhere.
4. Check Breach Exposure
- Visit haveibeenpwned.com to check if your account email has been part of a prior data breach.
- If found in breaches, reset your password and enable 2FA immediately.
5. Do Not Respond or Pay
- Never reply to or pay these ransom emails.
- Responding confirms your email is active, which may invite more spam or phishing attempts.
6. Report the Email
- Mark it as spam in your email client to help filter future attempts.
- If you're in the U.S., you can report these emails to the FBI’s Internet Crime Complaint Center (IC3).
Summary
Ransom emails targeting Webflow website owners are typically scams with no actual system breach. Check your site’s integrity, enforce security best practices (strong passwords and 2FA), and ignore any payment demands.