Last Updated on August 9, 2025 by Jade Artry
What Is Sextortion and How Can You Prevent It?
Sextortion is a form of online blackmail where criminals threaten to share intimate images or videos unless their demands are met. It’s a crime that affects thousands of people across all ages and backgrounds, yet many victims suffer in silence because of shame or fear.
As someone who’s spent years helping people navigate digital safety challenges, I want you to know that if you’re reading this because you’re worried, scared, or already facing this situation – you’re not alone, and there’s help available. Mind you, I’m still learning new tactics these criminals use every month, but this guide will walk you through everything you need to know about recognising, preventing, and responding to sextortion attempts.
Understanding Sextortion
Sextortion is a form of online blackmail where criminals threaten to share intimate images or videos unless you meet their demands – typically money or more explicit content. This crime affects thousands of people across all demographics, from teenagers on gaming platforms to professionals on LinkedIn, yet most victims suffer in silence due to shame.
The criminals behind these schemes operate like businesses, often as part of organised crime networks. Their goal is simple: use fear and shame to extract money or additional explicit content. Unlike revenge porn, where someone shares intimate content out of spite, sextortion is purely transactional – criminals don’t care about the content itself, only what they can gain from threatening you with it.
What Is Sextortion?
Sextortion is criminal extortion that uses sexual content as leverage to force victims to pay money or provide more explicit material. The term combines ‘sex’ and ‘extortion’ to describe this specific form of blackmail where criminals threaten to share intimate images (real or fake) with your family, friends, or employer unless you meet their demands.
Most sextortion cases follow a predictable pattern. It typically starts with a friendly message on social media, a dating app match, or a gaming platform chat. The criminal builds trust over days or weeks, creating what feels like a genuine connection. They’re patient, charming, and seem genuinely interested in you.
Once trust is established, conversations turn intimate. They might share photos first, making you feel comfortable reciprocating. Sometimes they’ll suggest a video call, secretly recording without your knowledge. In other cases, they’ll manipulate you into sharing content directly.
Then comes the reveal. Suddenly, they have your intimate content and a list of your social media contacts. The threats begin: pay up, or everyone you know sees these images. The friendly person you thought you knew becomes your worst nightmare.
How Sextortion Happens
Sextortion happens when criminals build trust with victims online before manipulating them into sharing intimate content, then threatening to distribute it unless demands are met. It typically starts with a friendly message on social media, dating apps, or gaming platforms, followed by weeks of patient relationship-building before the criminal reveals their true intentions.
Anyone can become a victim of sextortion. However, certain groups face higher risks. Young men aged 14-25 are increasingly targeted, often through Instagram or Snapchat. The scammers know this demographic is less likely to report due to embarrassment.
LGBTQ+ individuals face disproportionate targeting, with criminals exploiting fears about being outed. Women of all ages remain frequent targets on dating platforms, where approaches tend to be more romantic. Parents, professionals with reputations to protect, and anyone experiencing loneliness or life transitions are particularly vulnerable. (I’ve noticed criminals seem to have an uncanny ability to find people at their most vulnerable moments.)
The Criminal Operations
Sextortion criminal operations are sophisticated businesses run by organised crime groups, particularly from West Africa and Southeast Asia. These operations function like call centres with scripts, training manuals, and performance targets, using advanced tools to harvest contact lists and process cryptocurrency payments while targeting hundreds of victims simultaneously.
They use advanced tools to harvest contact lists, create convincing fake profiles, and process payments through cryptocurrency. Some operations target hundreds of victims simultaneously, using automation to manage conversations until the crucial moments require human intervention. Fair enough, I don’t understand all the technical details myself, but the main point is this: you’re not facing some teenager in their bedroom – these are professional operations.
Understanding this helps remove shame. You’re not stupid for falling for it – you’re facing professional criminals using psychological manipulation techniques refined over thousands of attempts.
Real-Life Examples
Sextortion affects everyone from teenagers to celebrities. In 2019, actress Bella Thorne famously took control when a hacker threatened to release her intimate photos – she posted them herself on Twitter, stating “I took my power back” (BBC report). Professional athletes have been increasingly targeted too, with multiple NFL and NBA players reporting sextortion attempts through Instagram DMs.
The 2014 celebrity iCloud leaks, dubbed “The Fappening,” showed how even tech-savvy celebrities could fall victim. Hackers used phishing emails to access over 100 celebrities’ accounts, including Jennifer Lawrence and Kate Upton (FBI case summary). While not traditional sextortion (no demands were made before release), it demonstrated how intimate content can be weaponised.
More recently, several Love Island contestants have spoken about receiving sextortion threats after the show, with criminals threatening to release intimate content unless paid. These high-profile cases remind us that wealth and fame don’t protect against these crimes – in fact, they often make people bigger targets.
Sextortion Statistics
Sextortion statistics reveal a massive and growing problem: the FBI received over 18,000 sextortion complaints in 2024 with losses exceeding $45 million, while the National Center for Missing & Exploited Children reported a roughly 1000% increase in financial sextortion targeting minors between 2021 and 2024. Here’s the thing though – less than 20% of victims report these crimes, with teenage boys reporting at only around 5%.</p
Yet these numbers only scratch the surface. Experts estimate that less than 20% of victims report sextortion. Among teenage boys, that number drops to just 5%. The average financial loss per victim is around £2,000, though some lose significantly more. Most disturbing: victims under 18 are six times more likely to self-harm following sextortion.
How Sextortion Schemes Work
Sextortion schemes work by following predictable patterns that vary based on the victim’s age and the platform used. Criminals typically spend days or weeks building trust through friendly conversation, gradually steering interactions toward intimacy before revealing their true intentions and making threats.
Adult-Targeted Schemes
Adult sextortion schemes often begin on dating apps or adult websites. The criminal creates an attractive profile, usually stealing photos from models or influencers. They’ll match with targets and quickly suggest moving the conversation to WhatsApp or Telegram – platforms where they can operate with less oversight.
The progression feels natural. Flirty messages lead to photo exchanges, then video calls. During video chats, they’ll use pre-recorded footage while secretly recording you. Some use sophisticated software to manipulate their video feed in real-time, making detection nearly impossible.
Professional blackmail is rising too. Criminals create fake LinkedIn profiles, targeting executives or professionals. They’ll build connections over weeks, discussing business before steering conversations toward personal topics. Once they have compromising material, they threaten to send it to employers, colleagues, or professional networks.
The financial focus is clear with adult targets. Demands typically range from £500 to £5,000, carefully calculated based on your apparent wealth. They’ll research your job, home, and lifestyle to set amounts that seem payable but painful. (One victim told me the demanded amount was almost exactly what he’d mentioned saving for a holiday – these criminals do their homework.)
Teen-Targeted Schemes
Teenage sextortion follows different patterns. Criminals often initiate contact through Instagram, Snapchat, or gaming platforms like Discord. They pose as peers, using age-appropriate language and interests to build trust.
The grooming process might involve weeks of normal conversation about school, games, or mutual interests. They’re exceptionally patient, understanding that rushing will raise suspicions. Once trust is established, they’ll introduce romantic elements, often claiming to be struggling with their own insecurities about sharing photos.
School-based threats are particularly cruel. Criminals threaten to share content with classmates, teachers, or post it on school social media pages. They understand the devastating social consequences for teenagers and exploit this mercilessly.
Unlike adult schemes, teen-targeted sextortion sometimes demands more images rather than money. This creates an escalating cycle of abuse, with each compliance providing more material for blackmail.
Common Tactics Across All Schemes
Regardless of the target’s age, sextortionists use similar psychological tactics. Love bombing – overwhelming victims with attention and affection – creates emotional dependency. They’ll message constantly, making you feel special and desired.
Time pressure is crucial to their success. Once they reveal their threats, they’ll demand immediate action: ‘You have one hour to send the money or I post everything.’ This prevents rational thinking or seeking help. They know that given time, victims might realise the scam or contact authorities.
Isolation techniques keep victims from seeking support. They’ll say things like ‘If you tell anyone, I’ll know and release everything immediately’ or ‘The police can’t help you – I’m in another country.’ These lies keep victims trapped and compliant.
Platform-Specific Methods
Each platform presents unique opportunities for criminals. On Instagram, they exploit the platform’s emphasis on visual content and the ease of finding followers. They’ll view your stories, like old photos, and gradually build familiarity before sliding into DMs.
Snapchat’s disappearing messages create false security. Victims think content vanishes, but criminals use screen recording software or modified apps that save everything. The platform’s younger user base and casual culture make it ideal for sextortionists.
Discord’s gaming focus provides cover for initial contact. Criminals join servers related to popular games, participating normally before privately messaging targets. The platform’s voice chat features enable real-time manipulation during gaming sessions.
Dating apps accelerate the process. Users expect romantic interactions, making them more susceptible to rapid escalation. Criminals exploit the urgency many feel to make connections, especially those recently divorced or ending long-term relationships.
AI and Deepfake Threats
Modern sextortionists increasingly use AI technology in their schemes. Deepfake software can create convincing nude images from innocent photos you’ve shared publicly. Voice cloning technology enables real-time voice manipulation during calls, making detection even harder.
Some operations use chatbots to manage hundreds of initial conversations simultaneously, only involving humans when victims seem ready to share content. Understanding these AI-powered threats helps you stay vigilant – never assume technology can’t be manipulated against you.
Prevention Strategies
Preventing sextortion requires a combination of privacy settings, behavioural awareness, and family communication. Simple steps like enabling two-factor authentication, verifying new contacts through video calls, and setting clear boundaries about content sharing can dramatically reduce your risk of becoming a victim.
Digital Hygiene Basics
Digital hygiene basics for sextortion prevention include setting all social media profiles to private, regularly reviewing follower lists, using physical webcam covers, and limiting personal information shared publicly. These simple steps create multiple barriers that make it significantly harder for criminals to gather the information they need to manipulate you. (I’ll be honest – I only started using a webcam cover myself about two years ago, but now I won’t video call without checking it first.)
Be selective about the personal information you share publicly. Criminals build trust by demonstrating knowledge about you – your workplace, favourite coffee shop, or pet’s name. The less public information available, the harder it becomes to manipulate you. Mind you, I’m not saying become a digital hermit, but consider your digital identity protection as essential as locking your front door.
Webcam security matters more than most realise. Invest in a physical webcam cover – a simple sliding cover costs less than £5 but prevents unauthorised recording. When not actively using video calls, keep cameras covered. Check which apps have camera permissions and revoke access for any you don’t actively use.
Behavioural Prevention
Behavioural prevention of sextortion involves trusting your instincts about online relationships, developing strong verification habits before sharing personal content, and maintaining clear boundaries about what you will and won’t share online. Real relationships develop gradually with mutual sharing, while scammers push quickly toward intimacy without reciprocating personal information.
Develop strong verification habits. Before sharing anything personal, verify people you meet online through video calls where they respond to spontaneous requests. Pre-recorded videos can’t react to random instructions like touching their nose or showing specific items.
Set clear boundaries about content sharing from the start. It’s perfectly reasonable to say ‘I don’t share photos with people I haven’t met in person’ or ‘I prefer to keep things non-visual until we know each other better.’
Technical Prevention
Enable two-factor authentication on all accounts, especially social media and email. This prevents criminals from taking over accounts even if they obtain passwords. Use authenticator apps rather than SMS codes when possible – they’re significantly more secure.
Consider using VPN protection when using dating apps or social platforms. This masks your real location and makes it harder for criminals to gather information about you. While not fool-proof, it adds another layer of protection.
Review your authentication methods regularly. Strong, unique passwords for each platform prevent criminals from accessing multiple accounts if one gets compromised. Password managers make this manageable without memorising dozens of complex passwords.
Communication Strategies
Open family conversations about online safety create protective environments. Parents should discuss sextortion risks with teenagers without shame or judgment. Frame it as you would any safety discussion – matter-of-fact and focused on protection, not prohibition.
For families, establishing digital safety rules together builds trust while maintaining protection. When children understand the ‘why’ behind safety measures, they’re more likely to follow them and seek help if something goes wrong.
Create an environment where mistakes don’t mean punishment. Many victims, especially teenagers, don’t report sextortion because they fear getting in trouble for sharing intimate content. Make it clear that safety trumps everything – you’d rather know about problems immediately than have them escalate due to fear.
Platform-Specific Settings
Each platform offers specific protections worth enabling. On Instagram, turn off message requests from people you don’t follow. Enable the ‘Hide offensive comments’ feature and restrict who can tag you in posts. Under Privacy settings, prevent others from adding you to groups without permission.
Snapchat’s ‘Ghost Mode’ prevents location sharing, while ‘Only Friends’ settings limit who can contact you. Disable ‘Quick Add’ to prevent appearing in suggestion lists. Turn off ‘Show me in Search Results’ unless necessary for your personal or professional life.
For dating apps, verify profiles carefully before engaging. Use the platform’s video call features rather than moving to personal numbers quickly. Report suspicious behaviour immediately – legitimate users understand safety concerns.
Recognising Sextortion Attempts
Recognising sextortion attempts early can help you escape before threats materialise. Key warning signs include excessive flattery, reluctance to video chat, pressure to share intimate content quickly, and technical excuses that don’t add up. Once you know these red flags, criminals’ tactics become obvious.
Early Warning Signs
Early warning signs of sextortion include someone showing excessive interest too quickly, avoiding video calls with technical excuses, pushing conversations toward intimacy faster than feels comfortable, and having limited social media history or interactions. Watch for patterns like only being available at odd hours or stories that don’t match their supposed location. Trust me, once you know these signs, they become glaringly obvious.
Watch for conversation patterns. Legitimate people share stories, express frustrations, and have varied moods. Scammers deflect personal questions and focus relentlessly on steering toward intimacy. They’ll claim technical issues preventing video calls or always have excuses for not meeting.
Escalation Indicators
The shift from friendly to demanding happens suddenly but follows patterns. They’ll test boundaries with small requests first – ‘just one photo’ or ‘show me your smile.’ Each compliance leads to bigger requests, conditioning you to say yes.
Emotional manipulation intensifies. They’ll claim to be falling for you, say you’re special, different from others they’ve met. Then comes emotional blackmail: they’re depressed and your photos cheer them up, or they’ve shared their images so it’s only fair you reciprocate.
Time pressure appears even before explicit threats. They need photos ‘right now’ because they’re feeling lonely, or they’re about to lose internet access for days. This urgency prevents reflection – exactly what they want.
Manipulation Techniques
Criminals exploit common emotional needs. For lonely individuals, they provide attention and validation. For those lacking confidence, they offer admiration and desire. They’re skilled at identifying and exploiting whatever emotional vulnerability you reveal.
Gaslighting begins early. When you express doubts, they’ll act hurt: ‘I thought you trusted me’ or ‘I can’t believe you’d think that of me.’ They make you feel guilty for reasonable caution, gradually breaking down protective instincts.
False proof appears to build trust. They’ll send what seems like verification – holding signs with your name, voice messages, even fake IDs. These are easily created with photo editing or stolen from other victims. Real verification requires spontaneous, specific actions they can’t prepare in advance.
Verification Failures
Legitimate people understand and respect verification requests. If someone becomes angry or evasive when you ask for video calls or to meet in public first, consider it a major warning sign. Real connections survive cautious approaches.
Time zone inconsistencies reveal deception. They claim to live nearby but are mysteriously available at odd hours. Their sunset photos don’t match your local daylight. They’re always tired when it should be morning or wide awake during supposed night-time.
Social proof helps verify identity. Real people have digital footprints – tagged photos with friends, comments from family, posts spanning years. Fake profiles often have recent creation dates, few genuine interactions, and photos that seem too polished or inconsistent.
Trust Your Instincts
Your subconscious often recognises threats before your conscious mind admits them. That nagging feeling something’s wrong? Listen to it. Discomfort with requests, even if you can’t explain why? Valid reason to pause.
Genuine connections feel balanced. You’re excited but not anxious, eager but not pressured. If interactions leave you feeling drained, guilty, or constantly trying to please them, something’s wrong. Healthy relationships energise; manipulative ones exhaust.
Never override safety instincts for fear of seeming rude or paranoid. Better to miss a potential connection than become a victim. Anyone worth knowing will understand and respect your caution. Those who don’t reveal themselves as threats.
What to Do If You’re Being Sextorted
If you’re being sextorted, take immediate action: don’t pay any money, stop all communication, and document everything before blocking the criminal. Most importantly, tell someone you trust and report to authorities – statistics show that over 80% of victims who pay face additional demands, while those who report and block typically see threats end quickly.
Immediate Actions
Immediate actions when facing sextortion are: stop all communication with the criminal, do not pay any money (over 80% who pay face additional demands), take screenshots of all threats and evidence, block them on all platforms, and tell someone you trust. These first steps are crucial for stopping the extortion and beginning recovery.
Stop all communication immediately. Don’t respond to threats, don’t negotiate, don’t beg. Every interaction provides more ammunition and encourages continued harassment. Block them on all platforms, but take screenshots first.
Tell someone you trust. This feels impossible when shame floods through you, but isolation is what criminals count on. Whether it’s a friend, family member, or counsellor, speaking breaks their power. You’d be surprised how understanding people can be. (Fair enough, it took me years to realise just how common this is – most people know someone who’s been targeted.)
Evidence Preservation
Document everything before blocking or deleting. Screenshot all messages, including timestamps and sender information. Save their profile URLs, usernames, and any images they used. This evidence becomes crucial for reports and potential prosecution.
Create a timeline of events. When did contact begin? When did it turn inappropriate? When were threats made? What exactly did they demand? Clear documentation helps authorities understand the situation and track criminal patterns.
Save any financial information if you unfortunately already paid. Transaction IDs, cryptocurrency wallet addresses, payment service details – all help authorities trace criminal networks. Don’t feel ashamed if you paid; fear makes people do things they wouldn’t normally consider.
Reporting Procedures
Report to local police immediately, especially if you’re under 18 or threats involve physical harm. While some officers might lack experience with online crimes, insist on filing a report. Use terms like ‘criminal extortion’ rather than just ‘online harassment’ to convey seriousness.
File a report with the FBI’s IC3 at ic3.gov. They coordinate with international law enforcement and track criminal networks. Even if criminals claim to be overseas, report anyway – many operate domestically while pretending otherwise.
For cases involving minors, report to the NCMEC CyberTipline at missingkids.org. They have specialised resources and work directly with platforms to remove content and pursue criminals.
Report to the platform where contact occurred. Instagram, Snapchat, and others have dedicated sextortion reporting mechanisms. They can preserve evidence, remove accounts, and prevent criminals from contacting other potential victims.
Damage Control
Immediately strengthen your digital security. Change passwords on all accounts, especially email and social media. Enable two-factor authentication everywhere. Consider using comprehensive security solutions to monitor for any breaches.
Warn close contacts if criminals obtained your contact list. A simple message explaining you’ve been targeted by scammers and to ignore any unusual messages about you suffices. Most people understand and appreciate the warning.
Consider temporary social media deactivation. This prevents criminals from contacting your network and removes their leverage. You can reactivate accounts once the immediate threat passes, usually within a few weeks.
Emotional Support
Understand that none of this is your fault. You’re not stupid, naive, or deserving of this treatment. Professional criminals manipulated you using sophisticated psychological techniques. Self-blame only adds unnecessary suffering to an already difficult situation.
Seek professional support. The Cyber Civil Rights Initiative offers a 24/7 helpline at cybercivilrights.org with trained counsellors who understand these specific traumas. They provide free, confidential support without judgment.
Recovery takes time. Initial panic subsides within days, but emotional impacts can linger. Feelings of violation, trust issues, and anxiety are normal responses to this trauma. Professional counselling helps process these emotions healthily.
Long-term Protection
Consider ongoing monitoring services. Companies like Aura provide identity monitoring that alerts you if your information appears in concerning places online. While not specifically for sextortion, these services provide peace of mind.
Rebuild digital habits gradually. You might feel like avoiding all online interactions, but isolation isn’t sustainable. Instead, apply learned lessons: verify identities, maintain boundaries, trust instincts. Most online interactions remain safe when you’re informed and cautious.
Consider sharing your story when ready. Many survivors find power in helping others avoid similar situations. Whether through anonymous forums or eventual public advocacy, your experience could save someone else from this trauma.
How Common Are Sextortion Emails?
Sextortion emails have become increasingly common, with millions sent daily claiming hackers have intimate footage and demanding Bitcoin payments. The vast majority of these emails are complete scams – criminals obtain old passwords from data breaches and send mass threats hoping someone will panic and pay, without having any actual compromising material. (I get about three of these a week myself – straight to the bin they go.)
The good news? Most sextortion email scams are completely fake. Criminals obtain old passwords from data breaches and send thousands of identical threats hoping someone will panic and pay. If you’re wondering how to tell if a sextortion email is real, look for these signs: generic threats, no specific details about you, and demands for cryptocurrency.
Recovery from sextortion is absolutely possible. While the immediate trauma feels overwhelming, thousands of survivors have rebuilt their lives and confidence. The key is accessing appropriate support and remembering that criminals’ threats rarely materialise once you stop engaging.
Professional support makes a significant difference in recovery. While the immediate trauma feels overwhelming, thousands of survivors have rebuilt their lives with appropriate help. The National Suicide Prevention Lifeline (988) provides immediate crisis support if you’re experiencing thoughts of self-harm.
Thorn (thorn.org) offers extensive resources for understanding and preventing sextortion. Their research helps shape platform policies and law enforcement responses. Reading their materials helps understand you’re not alone in this experience.
For comprehensive statistics and prevention resources, the National Center for Missing & Exploited Children (missingkids.org) provides updated information about trends and prevention strategies. Their resources help families discuss these risks appropriately.
Is Sextortion Illegal?
Yes, sextortion is a crime – often a federal crime with severe penalties. The punishment for sextortion can include years in prison, especially when minors are involved. Sextortion laws vary by location, but it’s illegal everywhere in the US and UK. If you’re wondering ‘can a victim of sextortion get in trouble?’ – the answer is no. You’re the victim of a crime. While sharing intimate content might violate some platforms’ terms of service, law enforcement focuses on catching criminals, not punishing victims. Is sextortion a felony? In most jurisdictions, yes, particularly when it involves minors or crosses state lines. Remember that recovery isn’t linear. Good days mix with difficult ones. Triggers might cause temporary setbacks. This is normal trauma response, not weakness. With appropriate support and time, the intensity of these feelings diminishes. Finally, know that your experience, while painful, doesn’t define you. Sextortion is something that happened to you, not who you are. Survivors often emerge stronger, more digitally aware, and better equipped to help others navigate online safely. Your story has power – when you’re ready to share it.
Conclusion
Sextortion is a serious crime that thrives on silence and shame, but knowledge and support are your strongest defences. Whether you’re reading this for prevention or because you’re currently facing threats, remember that you’re not alone, you’re not at fault, and there is help available. The most important things to remember: trust your instincts about online relationships, never pay extortion demands (it only makes things worse), and always report threats to authorities. These criminals rely on fear and isolation – breaking that silence breaks their power. If you take nothing else from this guide, know this: sextortion is never your fault, recovery is absolutely possible, and thousands of people have walked this path before you and come out stronger. The resources are there, the support exists, and you deserve to feel safe online.
Need more protection? Explore our digital safety shop for privacy screens, webcam covers, and security tools that add extra layers of protection to your online life. Because everyone deserves to feel safe in the digital world.