If you are in crisis right now: Call or text 988 (Suicide & Crisis Lifeline). Available 24/7. You can also text HOME to 741741 (Crisis Text Line). You are not alone. This is not your fault. Your life is not over.

The TLDR

Sextortion is blackmail using sexual images — real, stolen, or AI-generated. The attacker threatens to send intimate images to your family, friends, or employer unless you pay money, provide more images, or comply with other demands. Paying never makes it stop. The attacker will come back for more. This crime targets teenagers (especially boys aged 14–17), adults on dating apps, LGBTQ+ individuals, and military/government personnel. Multiple teenagers have died by suicide after sextortion attacks. If this is happening to you or someone you know: stop communicating with the attacker, do not pay, and report it immediately.

The Reality

This section exists because the shame that sextortion creates is the attacker’s most powerful weapon. So let’s be direct about what’s actually happening.

The FBI IC3 identified sextortion as the fastest-growing crime targeting minors in the United States. Reports increased over 300% between 2021 and 2023. In 2023 alone, the FBI received over 26,000 sextortion complaints involving minors.

Real people. Real consequences:

Who the victims are: Engineers, teachers, doctors, soldiers, teenagers, executives, parents. There is no demographic that’s immune. The only common factor is that the victim was human, and the attacker exploited that humanity.

Here’s what you need to hear:

You are not the first person this has happened to. You are not the last. You are not stupid for being targeted. The person who did this is a criminal operating from a script designed to exploit human psychology. The shame you feel is manufactured by the attacker. It is their weapon. Do not let it win.

How It Works

The Social Engineering Phase

The most common sextortion pattern starts on social media or dating apps:

  1. Initial contact: An attractive profile (stolen photos) reaches out on Instagram, Snapchat, a dating app, or a gaming platform. The conversation is friendly, flirty, and moves quickly.
  2. Building trust: Over hours or days (sometimes just a single conversation), the attacker builds rapport. They may share (fake) intimate images first to establish reciprocity.
  3. The exchange: The attacker asks for intimate images or video, or moves to a video call where they encourage the victim to undress or engage in sexual activity.
  4. The reveal: Immediately after receiving images, the attacker reveals they’ve been recording. They show a screenshot of the victim’s social media contacts — family, friends, employer — and threaten to send the images unless the victim pays.

The entire sequence can happen in a single evening. For teenagers, it often happens within hours of first contact.

The AI-Generated Variant

You don’t even need to send real images anymore for this to happen to you.

Attackers now use AI image generation to create realistic nude images from fully-clothed photos pulled from social media profiles. The victim receives a fake nude of themselves — convincing enough to cause panic — with a demand for payment.

This variant is particularly devastating because:

The Data Breach Variant

If intimate images were stolen from a hacked device, cloud account, or a partner’s phone, the attacker may have real images without any social engineering. This happens through:

The “Wrong Number” Variant

A text from an unknown number: “Hey, is this Jason? I got your number from Sarah!” The conversation starts as a “mistake” and gradually becomes flirtatious. The attacker builds the illusion of a connection, moves to sharing images, and then the trap closes.

The Demand Cycle

The first demand is usually for money ($200–$1,000) via cryptocurrency, gift cards, or wire transfer. The attacker needs the payment method to be irreversible.

Paying does not end it. In documented cases, paying the initial demand leads to:

The re-victimization pattern: Once an attacker identifies a victim who pays, that victim’s information is shared with other criminal networks. They may receive demands from multiple, unrelated attackers.

Who Gets Targeted

Teenagers (Especially Boys 14–17)

The FBI has specifically warned about a surge in sextortion targeting teenage boys. The criminal networks — primarily based in West Africa (the “Yahoo Boys” groups in Nigeria) and Southeast Asia — specifically target boys because the shame response is often more acute, the willingness to pay (or comply with demands for more images) is higher, and boys are less likely to tell a parent.

Multiple teenagers have died by suicide after sextortion. This isn’t a “cyber nuisance.” It’s a lethal crime.

Adults on Dating Apps

Adults are targeted through dating apps (Tinder, Bumble, Hinge), social media DMs, and messaging platforms. The attack pattern is the same — build trust, solicit images, blackmail.

LGBTQ+ Individuals

In countries where homosexuality is criminalized, sextortion carries an additional threat: exposure to law enforcement and social ostracism. Attackers specifically target LGBTQ+ individuals in these regions because the leverage is existential, not just embarrassing.

Military and Government Employees

Foreign intelligence services and criminal organizations target military and government employees for sextortion as a pathway to espionage. The leverage: “Provide classified information or we send these images to your commanding officer.”

The Criminal Infrastructure

Most sextortion operations are not lone actors. They are organized criminal enterprises:

How It Gets Exploited

Financial Extortion

The primary motive. The attacker wants money and will continue demanding it as long as the victim pays.

Escalation to In-Person Exploitation

In cases involving minors, sextortion can escalate from online demands to coercion for in-person meetings. The NCMEC has documented cases where sextortion was the entry point for contact sexual abuse.

Reputation Destruction

Some attackers release the images regardless of payment — for revenge, for power, or because the victim refused to pay. While devastating, it’s important to know: you can survive this. Images can be reported for removal. Platforms have policies for non-consensual intimate images. And the people who matter in your life will stand with you.

What You Can Do

If You’re Being Targeted RIGHT NOW

Stop. Read this list. Follow it in order.

  1. Do not pay. Paying confirms you’re a victim who will pay. The demands will escalate.
  2. Do not send more images. No matter what they threaten.
  3. Stop communicating with the attacker. Do not engage, negotiate, or respond. Block them.
  4. Screenshot everything. Messages, the attacker’s profile, their demands, any evidence of the conversation. This is evidence.
  5. Report to the platform — Instagram, Snapchat, Discord, etc. all have reporting mechanisms for sextortion.
  6. Report to law enforcement:
    • FBI IC3 — file an online complaint
    • NCMEC CyberTipline — if the victim is a minor (report online or call 1-800-843-5678)
    • Your local police — file a report
  7. Secure your accounts immediately:
    • Change passwords on email, social media, banking — everything
    • Enable 2FA on every account (authenticator app, not SMS)
    • Call your bank if you shared financial information
    • Review your email for unauthorized access or forwarding rules
  8. Contact Take It Downtakeitdown.ncmec.org helps minors get intimate images removed from platforms. For adults, the Cyber Civil Rights Initiative (cybercivilrights.org) provides resources.

If You’ve Already Paid

You are not in more trouble. You are not further victimized by having paid. You are a victim of a crime, and your response under duress is understandable.

  1. Stop all communication with the attacker now
  2. Document everything you can
  3. File reports (FBI IC3, NCMEC if minor, local police)
  4. Contact your bank or payment provider — some transactions can be disputed
  5. Secure your accounts (passwords, 2FA, banking)

The “I’ve Been Breached” Emergency Checklist

Whether it’s sextortion, account compromise, or any kind of digital breach — here’s the step-by-step:

  1. Change your email password first — email is the master key
  2. Enable 2FA on your email — authenticator app, not SMS
  3. Change passwords on all financial accounts — bank, credit cards, crypto, PayPal, Venmo
  4. Enable 2FA on financial accounts
  5. Call your bank — tell them your information may be compromised, ask about fraud alerts
  6. Change passwords on social media — every platform
  7. Enable 2FA on social media
  8. Freeze your credit — Equifax, Experian, TransUnion. It’s free.
  9. Check Have I Been Pwned — see what breaches include your email
  10. Monitor your accounts for unauthorized activity over the coming weeks
  11. File reportsFBI IC3, identitytheft.gov, local police as appropriate

For Parents

If your child comes to you about sextortion:

  1. Your reaction matters more than anything else. If you react with anger, they will shut down and may not tell you the full story. Respond with: “Thank you for telling me. This is not your fault. We’re going to handle this together.”
  2. Do not punish them. Taking their phone away or grounding them tells them that being a victim has consequences — which means they’ll never come to you again.
  3. Follow the reporting steps above — FBI IC3, NCMEC, local police.
  4. Get professional help. NCMEC victim services (1-800-843-5678) can connect you with counselors who specialize in exactly this.
  5. Have the conversation before it happens. Normalize talking about online safety. Tell your kids: “If this ever happens to you, I will not be angry. I will help you.”

Prevention

You Are Not Alone

If you’re reading this because it’s happening to you — or because it already happened — here’s what’s true:

If you’re in crisis:

Sources & Further Reading