Sextortion is a continuation of a centuries-old practice where malicious actors use erotic and sexually suggestive content to blackmail people for money, favors, or leverage. While modern sextortion has moved into online platforms, it’s as rampant as ever. In this article, we cover the process and warning signs of sextortion along with the steps for how to respond to this threat.
Lukas Tamašiūnas
October 16, 2025
Black Friday’s best price on identity theft protection
Get up to 70% off!
Get the Deal
30-day money-back guarantee
View promotion details.
DISCLAIMER: If you or a family member is facing sextortion, do not comply with extortionist demands — instead, you should report the crime to your local police department and seek support. For US citizens, you can report extortion to the Federal Bureau of Investigation (1-800-CALL-FBI) and IC3.gov. For victim support, consider using the Cyber Civil Rights Initiative Helpline (1-844-878-2274, [email protected]) or, if a minor is involved, the National Center for Missing and Exploited Children (1-800-THE-LOST, [email protected]). If you live outside the US, consider contacting local police and your national cybercrime unit.
Sextortion is a type of blackmail during which somebody threatens to expose sexually explicit content (typically private pictures and videos) of a person unless that person does what they’re told. The term “sextortion” is a combination of words “sex” and “extortion” and describes a practice that has existed since Victorian times, when “18th-century criminals realised that the laws against sodomy could enable them to entrap men, and extort their money” [1].
These days, perpetrators of sextortion use online apps such as WhatsApp, Snapchat, Discord, or Instagram to groom people into sharing nude or sexual images. Once victims send their private pictures or videos, “sextortionists” will record the content and use it to threaten their targets with public exposure unless they meet the blackmailer’s demands.
Sextortion typically happens through popular social media platforms (such as Snapchat, Discord, Instagram, or WhatsApp). In these platforms, blackmailers engage in chatting and “innocent” flirting with unsuspecting impressionable users to coerce them into sharing explicit photos and videos.
Sextortion can have many different faces and appear in various scenarios, with the most common including:
According to the Federal Bureau of Investigation (FBI), sextortion cases typically target minors, particularly boys aged 14–17 [2]. However, sextortion victims can range from kids under 13 to young adults (20 years old or more) and older. The data from the 2024 FBI’s Internet Crime Complaint Center (IC3) report also suggests that people aged 30–39 are the second most likely to experience sexual blackmail, with more than 9,000 reported cases in this age category alone [3].
Data also shows a particular correlation that suggests sextortionists might choose their victims based on their sexual orientation. According to the Thorn nonprofit organization, LGBTQ+ teens are twice as likely to experience sextortion compared to their non-LGBTQ counterparts [4]. Another troubling statistic is that 1 in 3 sextortion victims know their extortionists in real life as romantic partners, school peers, or even family acquaintances [5].
Sextortion can occur on any messaging platform. However, the perpetrators prefer using popular social media and webcam-based apps, such as Instagram, Snapchat, WhatsApp, or Facebook [6]. In some cases, malicious actors may lurk in online games such as Roblox, which are popular among kids and teenage boys.
Blackmailers may also target dating platforms, such as Grindr or Tinder, because they’re full of users willing to engage in flirtatious and intimate conversations. Exploiting the nature of such apps allows scammers to commit romance fraud or sextortion.
It’s important to understand that no messaging platform is completely safe from cyber extortion. Perpetrators will use any available app, whether it’s Reddit, Omegle, Discord, or other platform that allows users to communicate via chat or video calls.
The number of sextortion cases has drastically increased during recent years. In 2024 alone, the National Center for Missing and Exploited Children (NCMEC) received nearly 100 reports of financial sextortion per day [7]. Below you’ll find some of the most notable sextortion cases in recent years.
CONTENT WARNING: The text below may contain information about sensitive topics such as sextortion, child abuse, and self-harm, which may be disturbing to readers.
The dangers of sextortion can range from financial damage to psychological trauma. However, those are not the only risks of this cyber threat. Sextortion can result in many different outcomes, including:
Sextortion has warning signs that can help the target recognize the threat before blackmailers get a hold of private content. These signs may include:
The victims of sextortion often suffer alone because they’re threatened into silence, scared, or embarrassed to seek help. However, warning signs may help caregivers (family members, teachers, or legal guardians) spot a teenager that’s suffering from sextortion. These behavioral warning signs are:
If you get a sextortion email or message, do not respond to threats or demands. However, don’t ignore the situation either. Depending on your circumstances, you have at least two ways to deal with sextortion scammers.
If you suspect a sextortion attempt but haven’t yet shared explicit content with the perpetrators, you should immediately:
Ideally, it’s best to not engage with scammers, so upon noticing suspicious activity, it’s best to stop communicating with potential scammers either by blocking them or removing them from your contact list.
If you have a strong suspicion you might be dealing with a sextortionist, you can report the account to the platform you’re communicating on. Most social media and messaging apps have dedicated abuse reporting channels and continue to introduce tools to combat sextortion.
You can also consider reporting the scammers to law enforcement. However, it’s best to do so once you have actual proof of suspicious activity (for example, screenshots of threats).
If you have shared explicit content and are now receiving threats from blackmailers, consider following these steps:
Even if you’re being threatened, stop responding to the extorter. These scams often rely on pressure and fear to extract quick payments and scammers often return even if you comply with their demands.
Screenshot the message threats, save emails and chat threads, and keep original email headers and any usernames or profile links of the perpetrator.
Scammers often rely on their victims to stay silent. Regardless, it’s best to ask for help, either from relatives or other trustworthy people (for example, a school teacher). Additionally, victims over 18 can contact international agencies such as StopNCII (Stop Non Consensual Intimate Image Abuse). Initiatives like StopNCII help create a secure hash (a unique digital fingerprint that helps detect and block uploads) of your intimate images or videos so participating platforms can help remove explicit content.
Victims that are under 18 can seek additional support from organizations such as NCMEC (the National Center for Missing and Exploited Children) that offer help in taking down explicit content and providing emotional support. EU citizens can find help by checking Europol’s suggested channels, while UK, Australian, and Canadian citizens should contact the Internet Watch Foundation (IWF), Australian Centre to Counter Child Exploitation (ACCCE), or the RCMP respectively.
For US citizens, contact your local FBI field office, either via mobile (1-800-CALL-FBI) or online (fbi.gov) and file a complaint with the FBI’s Internet Crime Complaint Center (ic3.gov). Meanwhile EU, Australia, and UK citizens should contact their local police offices. For Canadian residents, RCMP will offer primary assistance and provide the next steps to take.
If you’re from the US and experienced extortion via email or have become involved in other impersonation/scam tactics, consider reporting it to the FTC. Australian citizens can contact the eSafety Commissioner's office. Meanwhile, Canadians should reach out to the Canadian Anti-Fraud Centre (CAFC).
Finally, consider investing in identity theft protection services to mitigate the damage in case of future attacks. Identity protection services offer insurance in case of identity theft (provided the victim is a service customer during the time the attack occurs) and other cybercrime, including sextortion.
Services such as NordProtect offer cyber extortion protection features that also cover sextortion cases. With NordProtect, victims are guaranteed cyber extortion insurance that includes a professional negotiator, coverage for eligible costs, and psychological counseling. Additionally, users receive extra benefits, such as dark web monitoring and credit monitoring. It’s a smart investment in your online safety that ensures professional help and damage mitigation in case you suffer cyber extortion or identity theft.
Holiday scams
are up.
Prices are
down.
Save 70% on identity theft
protection today
Get the Deal
30-day money-back guarantee
View promotion details.
Dealing with the aftermath of any kind of extortion can be a long and exhausting process. To recover from sextortion, consider taking these steps:
You can prevent sextortion by practicing vigilant behavior online. Some other tips on how to prevent sextortion:
For more cyber threat overviews and tips on protecting your personal information, check out the NordProtect blog.
[1] Independent, “Sexual Blackmail: a modern history by Angus McLaren,” The Independent, 2002. [Online]. Available: https://www.independent.co.uk/arts-entertainment/books/reviews/sexual-blackmail-a-modern-history-by-angus-mclaren-137475.html
[2] Federal Bureau of Investigation, “Sextortion: a growing threat targeting minors,” FBI, 2024. [Online]. Available: https://www.fbi.gov/contact-us/field-offices/nashville/news/sextortion-a-growing-threat-targeting-minors
[3] Internet Crime Complaint Center, “Federal Bureau of Investigation Internet Crime Report 2024,” IC3, 2024. [Online]. Available: https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf
[4] G. De Guzman, “The state of sextortion in 2025,” Thorn, 2025. [Online]. Available: https://www.thorn.org/blog/the-state-of-sextortion-in-2025/
[5] Thorn, “Sextortion: What it is, How it Happens and Who’s at Risk,” Thorn, 2025. [Online]. Available: https://www.thorn.org/blog/the-growing-threat-of-sextortion/
[6] Thorn, “Trends in Financial Sextortion: An investigation of sextortion reports in NCMEC CyberTipline data - Thorn,” Thorn, 2024. [Online]. Available: https://www.thorn.org/research/library/financial-sextortion/
[7] National Center for Missing & Exploited Children, “NCMEC releases new data: 2024 in numbers,” NCMEC, 2025. [Online]. Available: https://www.missingkids.org/blog/2025/ncmec-releases-new-data-2024-in-numbers
[8] T. Dhondy, “BBC tracks down sextortion scammer targeting teenage boys,” BBC, 2025. [Online]. Available: https://www.bbc.com/news/articles/czrpedexleno
[9] F. Karimi, “He lost his son to suicide after a ‘sextortion’ scam. Now this lawmaker is fighting to save other teens,” CNN, 2023. [Online]. Available: https://edition.cnn.com/2023/05/13/us/brandon-guffey-gavin-sextortion-law-cec
[10] M. Alsharif, A. Mullen, “Nigerian man accused of extorting South Carolina teen who died,” NBC News, 2025. [Online]. Available: https://www.nbcnews.com/news/us-news/nigerian-man-extradited-us-alleged-sextortion-south-carolina-teen-died-rcna189475
[11] T. Turnbull, “Man posing as YouTube star jailed for global sextortion plot,” BBC, 2024. [Online]. Available: https://www.bbc.com/news/articles/cp35z4z08qvo
[12] Internet Watch Foundation, “Child sexual extortion cases in the UK soar with warnings ‘ruthless’ criminals are still putting children and young people at risk,” IWF, 2025. [Online]. Available: https://www.iwf.org.uk/news-media/news/child-sexual-extortion-cases-in-the-uk-soar-with-warnings-ruthless-criminals-are-still-putting-children-and-young-people-at-risk/
Lukas is curious and keen on sharing his knowledge with everyone, which can make him quite annoying at times. Regardless, he believes in the power of being informed and loses a wrinkle every time someone gets cybersecurity insurance or downloads a two-factor authentication app.
Black Friday’s best price on identity theft protection
Get up to 70% off!
Get the Deal
30-day money-back guarantee
View promotion details.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.