Sextortion Scams: From Teen Targeting to Email Blackmail
What You Need to Know About This Growing Online Threat
Estimated reading time: 11 minutes | Published: 5/15/2026
The Threat Hiding in Your Inbox and Your Teen's Messages
The FBI issued an urgent warning in February 2026 on Safer Internet Day: sextortion schemes are surging, and they're devastating families across the country.
Between October 2021 and March 2023, the FBI received over 13,000 reports of sextortion involving at least 12,600 victims. At least 20 of those victims died by suicide.
The threat comes in two distinct forms: financially motivated attacks targeting teenagers, and mass email blackmail campaigns targeting adults. Both exploit shame, fear, and urgency to coerce victims into paying or providing more compromising material.
If you have children with internet access, or if you've ever received an email claiming someone has compromising footage of you, you need to understand how these scams work and what to do about them.
Financial Sextortion: The Crisis Targeting Teenagers
Financial sextortion is a criminal act where an offender coerces a minor into creating and sending sexually explicit images or videos, then threatens to release that material unless the victim pays money.
Who Is Being Targeted
The primary victims are boys between the ages of 14 and 17, though any child can become a target. The FBI observed at least a 20% increase in financially motivated sextortion incidents involving minors between October 2022 and March 2023 compared to the same period the previous year.
Most attackers operate from outside the United States, primarily in West African countries like Nigeria and Ivory Coast, or Southeast Asian countries like the Philippines.
How the Attack Happens
A financial sextortion scenario can unfold in as little as five minutes. Here's the typical progression:
Step 1: Initial Contact
The attacker identifies and targets children through social media platforms (Instagram, Snapchat, TikTok), online games, gaming consoles, livestreaming platforms, and messaging apps.
They create fake profiles pretending to be around the victim's age, often using stolen photos of attractive young people. They claim to share similar interests, attend a nearby school, or live in the same area.
Step 2: Building Trust
The attacker quickly moves the conversation toward building a romantic or intimate connection. They express interest in the victim, compliment them, and create a sense of mutual trust.
They may spend minutes or hours grooming the victim before making their request.
Step 3: The Request
The attacker asks the victim to share sexually explicit images or videos. They might claim they've already sent theirs (using fake or stolen images) and ask the victim to reciprocate.
Often, they frame it as mutual, consensual, and private - just between two people who like each other.
Step 4: The Threat
As soon as the victim sends an explicit image or video, the attacker's tone changes completely.
They reveal they have saved the content and threaten to send it to the victim's friends, family members, classmates, teachers, or post it publicly on social media unless the victim pays money.
To prove they can follow through, they may show screenshots of the victim's social media contacts or friend list, demonstrating they know exactly who to send the material to.
Step 5: The Demand
The attacker demands payment, typically through:
• Gift cards (Amazon, iTunes, Google Play, Steam)
• Mobile payment services (Venmo, CashApp, Zelle)
• Wire transfers
• Cryptocurrency (Bitcoin, Ethereum)
The amount requested varies, but it's often framed as urgent: "Pay $500 in the next 2 hours or I send everything to everyone you know."
Step 6: Escalation
Even if the victim pays, the attacker rarely deletes the material. Instead, they often:
• Demand more money
• Request additional explicit images
• Share the material anyway, sometimes to humiliate the victim or as leverage against others
The victim becomes trapped in a cycle of escalating demands with no clear way out.
Why Teenagers Don't Report It
The shame, fear, and confusion children feel when caught in this cycle often prevents them from asking for help or reporting the abuse.
Victims worry they'll get in trouble for sending the images in the first place. They fear their parents' reaction. They're embarrassed and don't want anyone to know. They believe if they just pay, it will go away.
This isolation is exactly what the attacker is counting on. The longer the victim stays silent, the more control the attacker maintains.
The Tragic Consequences
These crimes have led to an alarming number of suicides among victims - primarily boys who felt they had no way out.
The FBI has documented at least 20 deaths by suicide linked directly to sextortion cases. The actual number is likely higher, as many cases go unreported.
Adult Email Sextortion: The
"I Recorded You" Scam
While teenagers face targeted sextortion attacks, adults are bombarded with mass email scams claiming to have compromising webcam footage.
What the Email Says
The email typically includes:
• A subject line designed to shock: "You pervert, I recorded you" or "Hello pervert" or "Your secret is out"
• A claim they infected your device: "My malware gave me full access to your device, including your camera and microphone"
• An alleged recording: "I recorded you visiting pornographic websites and captured footage from your webcam"
• Proof they're serious - your password: The email includes an actual password you've used (often an old one)
• A Bitcoin ransom: "Pay $1,500 in Bitcoin within 48 hours or I send the video to all your contacts"
• A threat of exposure: "I have access to your email and social media. I will ruin your reputation."
Why the Email Feels So Convincing
The inclusion of a real password makes the threat feel legitimate. If they have your password, maybe they really do have access to your device, right?
Wrong.
How They Got Your Password
The password came from a data breach - likely from years ago - not from hacking your device.
Massive data breaches have exposed billions of email addresses and passwords over the years. These datasets are sold on the dark web and reused by scammers for mass email campaigns.
Recent research by Malwarebytes found that scammers are even scraping passwords from publicly accessible disposable email inboxes (like FakeMailGenerator) and using those passwords in sextortion emails.
The scammer never had access to your device. They simply pulled your email and an old password from a breach, then sent the same threatening email to millions of people hoping a small percentage will panic and pay.
Why the Threats Are Empty
There is no malware on your device. There is no recording. There is no video.
If there were, the scammer would include a screenshot or clip as proof. They don't, because they have nothing.
This is a mass email campaign designed to exploit shame and fear. The scammer sent the exact same email to thousands or millions of people. They're hoping a tiny fraction will pay out of panic or embarrassment.
How to Recognize a Sextortion Attempt
For Teenagers:
• Someone you just met online is moving the conversation toward sexual topics very quickly
• They're asking for photos or videos
• They claim to have already sent you their photos (often fake or stolen)
• They want to move the conversation to a different platform
• They're creating urgency or pressure
• After you send something, they immediately demand money or more content
For Adults:
• An email claims to have hacked your device or installed malware
• It includes an old password to "prove" they're serious
• It claims to have webcam footage of you but provides no proof
• It demands payment in Bitcoin, gift cards, or other untraceable methods
• It creates a short deadline (24-48 hours) to pressure you into acting quickly
• It warns you not to contact police or tell anyone
What to Do If You're Targeted
If You're a Teenager Being Extorted:
1. Tell a trusted adult immediately
Tell a parent, guardian, teacher, school counselor, or another trusted adult. You are not in trouble. You are the victim of a crime.
The attacker is counting on you staying silent. Breaking that silence is the first step to stopping them.
2. Stop all communication with the attacker
Do not respond to their messages. Do not send more money or images. Block them on all platforms.
3. Do NOT pay
Paying does not make this go away. It tells the attacker you're a reliable target, and they will demand more.
4. Preserve evidence
Take screenshots of the messages, profile, and threats. Do not delete the conversation - law enforcement will need it.
5. Report it
• Call the FBI at 1-800-CALL-FBI (225-5324)
• Report to the National Center for Missing & Exploited Children (NCMEC) at report.cybertip.org
• Report the account through the platform's safety/abuse reporting feature
6. Use the Take It Down program
NCMEC offers a free Take It Down service (takeitdown.ncmec.org) that helps remove sexually explicit images of minors from the internet.
If You're an Adult Who Received a Sextortion Email:
1. Do not panic
The email is a scam. There is no video. There is no malware. The threats are empty.
2. Do NOT pay
Paying confirms your email is active and that you're susceptible to threats. You'll receive more scam emails.
3. Do NOT reply
Responding tells the scammer someone is reading messages at that address, which may lead to more targeted scams.
4. Change your password if it appears in the email
If you're still using that password anywhere, change it immediately. If you've already changed it, you're fine.
Check haveibeenpwned.com to see which data breaches exposed your email and passwords.
5. Delete the email and block the sender
Mark it as spam or phishing so your email provider can filter similar messages in the future.
6. Report it to the FBI
File a report with the FBI's Internet Crime Complaint Center (IC3) at ic3.gov.
How to Protect Yourself and Your Family
For Parents and Caregivers:
1. Have the conversation
Talk to your children about sextortion before it happens. Explain that:
• People online are not always who they claim to be
• Someone who asks for explicit images or videos is a predator, not a friend
• If something like this happens, they should tell you immediately - they are not in trouble
• You will support them, not punish them
The FBI has a guide specifically for parents and educators on how to talk to kids about sextortion. Find it at fbi.gov/sextortion.
2. Monitor without invading privacy
Know which platforms your children use. Understand how those platforms work. Check privacy settings together.
You don't need to read every message, but you should be aware of changes in behavior:
• Sudden withdrawal from family or friends
• Increased secrecy about online activity
• Anxiety or fear when using devices
• Requests for money or gift cards
3. Use parental controls and privacy settings
Set accounts to private. Disable location sharing. Limit who can contact your child. Review friend/follower lists together.
4. Teach critical thinking about online relationships
Help children understand:
• If someone online is rushing intimacy, that's a red flag
• Legitimate romantic interest doesn't start with requests for explicit content
• Once an image is sent, you lose control of it forever
5: How to Protect Yourself and Your Family
Age-Appropriate Resources to Help Start the Conversation
For younger children (ages 8-12), talking about sextortion in abstract terms can be difficult. Consider using age-appropriate resources designed to introduce these concepts through storytelling:
Electra and the DM Deception by Steven Nicolas - A middle-grade fiction book that tackles online grooming and sextortion through an engaging story. Written by a cybersecurity professional, it helps young readers recognize red flags, set digital boundaries, and understand the importance of speaking up when something feels wrong.
NetSmartz (NCMEC) - Free interactive games and videos for children on online safety topics
Using stories and interactive tools can make these conversations less intimidating for both parents and children while delivering critical safety lessons.
For Everyone:
1. Use strong, unique passwords
Sextortion emails work partly because they include a real password from a data breach. Using unique passwords for every account limits damage when breaches happen.
2. Enable two-factor authentication
Even if someone has your password, two-factor authentication prevents them from accessing your account.
3. Cover your webcam when not in use
While the "I recorded you" emails are fake, actual webcam hacking is possible. Cover your camera with a sliding cover or tape when you're not using it.
4. Keep software updated
Security patches close vulnerabilities that could be exploited by actual malware.
5. Be skeptical of urgent threats
Scammers rely on panic and urgency. If an email or message is demanding immediate action or payment, take a breath and verify independently before responding.
Where to Get Help
If you or someone you know is a victim of sextortion:
In Canada:
Cybertip.ca:cybertip.ca - Report online child sexual exploitation
Canadian Anti-Fraud Centre: 1-888-495-8501
RCMP Cybercrime: rcmp-grc.gc.ca/en/cybercrime
Take It Down (Canada):protectchildren.ca/en/take-it-down
Kids Help Phone (24/7): 1-800-668-6868 or text CONNECT to 686868
Talk Suicide Canada (24/7): 1-833-456-4566 or text 45645
In the United States:
FBI Tip Line: 1-800-CALL-FBI (225-5324)
FBI Internet Crime Complaint Center: ic3.gov
NCMEC CyberTipline: report.cybertip.org
Take It Down: takeitdown.ncmec.org
Crisis Text Line: Text HOME to 741741
988 Suicide & Crisis Lifeline: Call or text 988
The Critical Takeaway
Sextortion is a serious, growing threat affecting both teenagers and adults. The FBI has documented thousands of cases and at least 20 deaths by suicide among young victims.
For teenagers: if someone online asks for explicit images, they are a predator. If you've already sent something and are being threatened, tell a trusted adult immediately. You are not in trouble. You are the victim of a crime. Help is available.
For adults: if you receive an email claiming to have compromising footage and demanding Bitcoin, it's a scam. Do not pay. Do not reply. Delete it, change your password if needed, and report it to the FBI.
The shame and fear these scams create are real. But the threats - in most cases - are not. Breaking the silence is the first step to stopping the attack.
You are not alone. Help is available. Report it.
Need help protecting your family or organization from online threats?
THINKFLEX provides cybersecurity awareness training, security assessments, and practical guidance to help families and businesses reduce their exposure to online threats. Contact us to learn more.