If you are in crisis right now: Call or text 988 (Suicide & Crisis Lifeline). Available 24/7. You can also text HOME to 741741 (Crisis Text Line). You are not alone. This is not your fault. Your life is not over.
The TLDR
Sextortion is blackmail using sexual images — real, stolen, or AI-generated. The attacker threatens to send intimate images to your family, friends, or employer unless you pay money, provide more images, or comply with other demands. Paying never makes it stop. The attacker will come back for more. This crime targets teenagers (especially boys aged 14–17), adults on dating apps, LGBTQ+ individuals, and military/government personnel. Multiple teenagers have died by suicide after sextortion attacks. If this is happening to you or someone you know: stop communicating with the attacker, do not pay, and report it immediately.
The Reality
This section exists because the shame that sextortion creates is the attacker’s most powerful weapon. So let’s be direct about what’s actually happening.
The FBI IC3 identified sextortion as the fastest-growing crime targeting minors in the United States. Reports increased over 300% between 2021 and 2023. In 2023 alone, the FBI received over 26,000 sextortion complaints involving minors.
Real people. Real consequences:
- Multiple American teenagers have died by suicide after sextortion attacks, including high-profile cases that led to federal investigations and arrests
- The FBI, NCMEC, and the Canadian Centre for Child Protection have all issued emergency advisories
- Adults lose an average of $500–$3,000 per incident, with some losing tens of thousands
- The emotional damage — shame, isolation, depression, anxiety — persists long after the financial loss
Who the victims are: Engineers, teachers, doctors, soldiers, teenagers, executives, parents. There is no demographic that’s immune. The only common factor is that the victim was human, and the attacker exploited that humanity.
Here’s what you need to hear:
You are not the first person this has happened to. You are not the last. You are not stupid for being targeted. The person who did this is a criminal operating from a script designed to exploit human psychology. The shame you feel is manufactured by the attacker. It is their weapon. Do not let it win.
How It Works
The Social Engineering Phase
The most common sextortion pattern starts on social media or dating apps:
- Initial contact: An attractive profile (stolen photos) reaches out on Instagram, Snapchat, a dating app, or a gaming platform. The conversation is friendly, flirty, and moves quickly.
- Building trust: Over hours or days (sometimes just a single conversation), the attacker builds rapport. They may share (fake) intimate images first to establish reciprocity.
- The exchange: The attacker asks for intimate images or video, or moves to a video call where they encourage the victim to undress or engage in sexual activity.
- The reveal: Immediately after receiving images, the attacker reveals they’ve been recording. They show a screenshot of the victim’s social media contacts — family, friends, employer — and threaten to send the images unless the victim pays.
The entire sequence can happen in a single evening. For teenagers, it often happens within hours of first contact.
The AI-Generated Variant
You don’t even need to send real images anymore for this to happen to you.
Attackers now use AI image generation to create realistic nude images from fully-clothed photos pulled from social media profiles. The victim receives a fake nude of themselves — convincing enough to cause panic — with a demand for payment.
This variant is particularly devastating because:
- The victim never sent anything
- The images aren’t real, but they look real enough to destroy reputations
- Proving the images are fake requires analysis that most people don’t know how to do
- The shame response is the same whether the images are real or fabricated
The Data Breach Variant
If intimate images were stolen from a hacked device, cloud account, or a partner’s phone, the attacker may have real images without any social engineering. This happens through:
- iCloud/Google Photos account compromise (weak password, no 2FA)
- Ex-partner sharing images (revenge porn, which is illegal in most states)
- Device theft or unauthorized access
- Data breaches of dating or hookup platforms
The “Wrong Number” Variant
A text from an unknown number: “Hey, is this Jason? I got your number from Sarah!” The conversation starts as a “mistake” and gradually becomes flirtatious. The attacker builds the illusion of a connection, moves to sharing images, and then the trap closes.
The Demand Cycle
The first demand is usually for money ($200–$1,000) via cryptocurrency, gift cards, or wire transfer. The attacker needs the payment method to be irreversible.
Paying does not end it. In documented cases, paying the initial demand leads to:
- Immediate demand for more money (“That wasn’t enough, I need more”)
- Demand for more explicit images (“Send more or I’ll release what I have”)
- Ongoing blackmail for weeks or months
- Release of the images anyway, even after payment
The re-victimization pattern: Once an attacker identifies a victim who pays, that victim’s information is shared with other criminal networks. They may receive demands from multiple, unrelated attackers.
Who Gets Targeted
Teenagers (Especially Boys 14–17)
The FBI has specifically warned about a surge in sextortion targeting teenage boys. The criminal networks — primarily based in West Africa (the “Yahoo Boys” groups in Nigeria) and Southeast Asia — specifically target boys because the shame response is often more acute, the willingness to pay (or comply with demands for more images) is higher, and boys are less likely to tell a parent.
Multiple teenagers have died by suicide after sextortion. This isn’t a “cyber nuisance.” It’s a lethal crime.
Adults on Dating Apps
Adults are targeted through dating apps (Tinder, Bumble, Hinge), social media DMs, and messaging platforms. The attack pattern is the same — build trust, solicit images, blackmail.
LGBTQ+ Individuals
In countries where homosexuality is criminalized, sextortion carries an additional threat: exposure to law enforcement and social ostracism. Attackers specifically target LGBTQ+ individuals in these regions because the leverage is existential, not just embarrassing.
Military and Government Employees
Foreign intelligence services and criminal organizations target military and government employees for sextortion as a pathway to espionage. The leverage: “Provide classified information or we send these images to your commanding officer.”
The Criminal Infrastructure
Most sextortion operations are not lone actors. They are organized criminal enterprises:
- West Africa (Nigeria, Côte d’Ivoire): “Yahoo Boys” — organized cybercrime groups that operate sextortion alongside romance scams and BEC. They use scripts, share techniques on social media, and target victims globally.
- Southeast Asia (Philippines, Cambodia, Myanmar): Some operations use trafficked individuals forced to work in scam call centers. The criminal infrastructure includes crypto laundering networks and money mules.
- Payment laundering: Cryptocurrency payments are mixed through tumblers. Gift card codes are resold on secondary markets. Wire transfers go through money mule networks.
How It Gets Exploited
Financial Extortion
The primary motive. The attacker wants money and will continue demanding it as long as the victim pays.
Escalation to In-Person Exploitation
In cases involving minors, sextortion can escalate from online demands to coercion for in-person meetings. The NCMEC has documented cases where sextortion was the entry point for contact sexual abuse.
Reputation Destruction
Some attackers release the images regardless of payment — for revenge, for power, or because the victim refused to pay. While devastating, it’s important to know: you can survive this. Images can be reported for removal. Platforms have policies for non-consensual intimate images. And the people who matter in your life will stand with you.
What You Can Do
If You’re Being Targeted RIGHT NOW
Stop. Read this list. Follow it in order.
- Do not pay. Paying confirms you’re a victim who will pay. The demands will escalate.
- Do not send more images. No matter what they threaten.
- Stop communicating with the attacker. Do not engage, negotiate, or respond. Block them.
- Screenshot everything. Messages, the attacker’s profile, their demands, any evidence of the conversation. This is evidence.
- Report to the platform — Instagram, Snapchat, Discord, etc. all have reporting mechanisms for sextortion.
- Report to law enforcement:
- FBI IC3 — file an online complaint
- NCMEC CyberTipline — if the victim is a minor (report online or call 1-800-843-5678)
- Your local police — file a report
- Secure your accounts immediately:
- Change passwords on email, social media, banking — everything
- Enable 2FA on every account (authenticator app, not SMS)
- Call your bank if you shared financial information
- Review your email for unauthorized access or forwarding rules
- Contact Take It Down — takeitdown.ncmec.org helps minors get intimate images removed from platforms. For adults, the Cyber Civil Rights Initiative (cybercivilrights.org) provides resources.
If You’ve Already Paid
You are not in more trouble. You are not further victimized by having paid. You are a victim of a crime, and your response under duress is understandable.
- Stop all communication with the attacker now
- Document everything you can
- File reports (FBI IC3, NCMEC if minor, local police)
- Contact your bank or payment provider — some transactions can be disputed
- Secure your accounts (passwords, 2FA, banking)
The “I’ve Been Breached” Emergency Checklist
Whether it’s sextortion, account compromise, or any kind of digital breach — here’s the step-by-step:
- Change your email password first — email is the master key
- Enable 2FA on your email — authenticator app, not SMS
- Change passwords on all financial accounts — bank, credit cards, crypto, PayPal, Venmo
- Enable 2FA on financial accounts
- Call your bank — tell them your information may be compromised, ask about fraud alerts
- Change passwords on social media — every platform
- Enable 2FA on social media
- Freeze your credit — Equifax, Experian, TransUnion. It’s free.
- Check Have I Been Pwned — see what breaches include your email
- Monitor your accounts for unauthorized activity over the coming weeks
- File reports — FBI IC3, identitytheft.gov, local police as appropriate
For Parents
If your child comes to you about sextortion:
- Your reaction matters more than anything else. If you react with anger, they will shut down and may not tell you the full story. Respond with: “Thank you for telling me. This is not your fault. We’re going to handle this together.”
- Do not punish them. Taking their phone away or grounding them tells them that being a victim has consequences — which means they’ll never come to you again.
- Follow the reporting steps above — FBI IC3, NCMEC, local police.
- Get professional help. NCMEC victim services (1-800-843-5678) can connect you with counselors who specialize in exactly this.
- Have the conversation before it happens. Normalize talking about online safety. Tell your kids: “If this ever happens to you, I will not be angry. I will help you.”
Prevention
- Be cautious with intimate images — once sent, you lose control. This applies to trusted partners too (relationships end, phones get stolen, accounts get hacked).
- Lock down social media — private accounts, friends-only contacts, no public follower lists.
- Reverse image search awareness — attackers use fake profiles with stolen photos. Reverse image search (Google Images, TinEye) can reveal if the person you’re talking to is using someone else’s photos.
- Be suspicious of fast-moving online relationships — real connections develop naturally. Sextortion scripts move fast because the attacker needs to close before you have time to think.
You Are Not Alone
If you’re reading this because it’s happening to you — or because it already happened — here’s what’s true:
- Thousands of people experience this every month. You are not the only one.
- This was done to you, not by you. The criminal is responsible. Not you.
- Your life is not over. The immediate crisis feels total. It is not. People survive this and rebuild.
- The images, if they exist, can be reported for removal. Platforms comply with non-consensual intimate image reports.
- The shame fades. The power the attacker has over you is finite. Every step you take — reporting, securing accounts, talking to someone — reduces it.
If you’re in crisis:
- 988 Suicide & Crisis Lifeline: Call or text 988. Available 24/7.
- Crisis Text Line: Text HOME to 741741
- NCMEC (if under 18): 1-800-843-5678
- Cyber Civil Rights Initiative helpline: 1-844-878-2274
Sources & Further Reading
- FBI IC3: Sextortion Advisory — FBI alerts and reporting for sextortion
- NCMEC: Sextortion Resources — resources specifically for minors and parents
- Take It Down (NCMEC) — tool for minors to remove intimate images from platforms
- Thorn: Research on Sextortion — research and technology for combating child exploitation
- Cyber Civil Rights Initiative — resources for adult victims of non-consensual intimate images
- 988 Suicide & Crisis Lifeline — 24/7 crisis support
- FBI: Parent/Caregiver Sextortion Guide — FBI’s guide for parents of sextortion victims
- StopNCII.org — tool for adults to prevent non-consensual sharing of intimate images