Ransom emails claiming your Webflow site has been hacked are often part of a widespread phishing or extortion scam, not a sign of an actual security breach.
1. Understand the Nature of These Emails
- These emails typically claim that a hacker has gained access to your website or private data and demand a ransom in cryptocurrency (usually Bitcoin).
- In most cases, they are generic scams sent to hundreds or thousands of addresses using scraped email lists.
- There's often no real evidence of a breach — just threats using fear tactics.
2. Verify Webflow Site Security
- Webflow-hosted sites are secured by Webflow’s infrastructure, with HTTPS, sandboxed publishing, and strict platform controls.
- There have been no widespread reports of Webflow platform-level compromises causing this type of ransom threat.
- To double-check, log in to Webflow and:
- Check your login history (under Account Settings > Billing > Login History).
- Review Editor and Collaborator access under Project Settings > Members.
3. Review Your Custom Code and Integrations
- If you have embedded third-party scripts or use external CMS/JS services, inspect them for vulnerabilities.
- Disable or remove any unaudited or unnecessary custom code in the Page Settings or Site Settings > Custom Code area.
4. Strengthen Your Account Security
- Enable Two-Factor Authentication (2FA) on your Webflow account.
- Change your Webflow and connected email passwords if you suspect your credentials were leaked elsewhere.
- Use a tool like Have I Been Pwned to check if your email has been involved in past data breaches.
5. Do Not Respond or Pay
- Do not engage, respond, or send payment — paying does not guarantee the threat will stop and may mark you as a future target.
- Mark the email as spam or phishing in your email client.
Summary
These ransom emails are almost always scams with no actual access to your Webflow site. Verify your Webflow account security, audit custom code, and use 2FA, but there's no need to panic or pay.