Blog
Over the last few years, various types of sextortion schemes have been on the rise. However, a new twist to this old scam has recently caught the attention of law enforcement and federal agencies (and Interfor); personalization.
Cybercriminals send emails to potential victims, including their names, phone numbers, and in some cases, photos of their homes. The cybercriminals allege to posses webcam footage of their victims engaging in explicit activities such as watching pornography or performing sexual acts. They demand payment within 24 hours, threatening to release the footage if their demands are not met.
The language in these emails feels genuine , and when paired with a photo of the victim’s home and a strict time limit, it creates the appearance of a credible threat. Understandably, many may be tempted to comply with the $2,000 extortion demand under such pressure. As of recently, individuals close to Interfor (and even two of our employees) have received these emails and messages pertaining to this new sextortion tactic. Below is the same advice our team gave to them.
Main Types of Sextortion
- Traditional sextortion occurs when predators email individuals claiming to possess videos or photos of them, and threatening to share the content unless the victim provides more explicit images. This form of sextortion often targets teens and young people, who are more susceptible to believing the threat. If the teen sends revealing photos in an attempt to stop the extortion, the cycle continues, with the cybercriminal repeatedly threatening to share the new images unless more are provided. Many teens feel too embarrassed or ashamed to seek help from an adult. This is not only sextortion but also amounts to sexual abuse.
- Financial sextortion involves cybercriminals threatening to reveal compromising photos unless the victim pays a specified sum of money. According to CNBC, this form of sextortion is “the fastest-growing crime targeting children in North America and Australia,” with incidents increasing by 1000% over the past 18 months.
In the vast majority of cases, such as the latest variation, cybercriminals do not actually possess compromising videos — the mere threat, particularly when paired with personalization, is enough to induce panic in their victims. This tactic is the one we see proliferating now, likely through the enhanced power of AI driven methods that use public records to personalize the threat.
In rarer instances, the cybercriminals do have compromising photos — often obtained through deception or threats. According to the FBI, this form of sextortion has led to “an alarming number” of victim suicides.
Why is Sextortion So Heinous?
Unlike other cyber scams that focus on identity theft or hacking financial information, sextortion is especially cruel because it exploits of one of the most powerful human emotions: shame.
Brene Brown describes shame as “the most powerful, master emotion” noting that it “erodes our courage and fuels disengagement.” Cybercriminals engaging in sextortion exploit this pivotal human emotion, preying on genuine fears. As a result, many victims , particularly teens, may feel compelled to comply with the sextorter’s demands, either by sending compromising photos or paying money. Even if they have no memory of watching pornography or have never taken a revealing photo , the personalized threat can sow self-doubt. Unfortunately, sending compromising photos only prolongs the cycle of abuse.
Tips for Staying Safe Online
While sextortion often targets teens, adults are not immune to these threats. It is important to understand that being targeted is never the victim’s fault. Essentially, there’s no foolproof way to prevent being targeted. However, following several general best practices for online behavior can help reduce the risk.
The Department of Homeland Security recommends:
- Avoid sending compromising photos of yourself to anyone, even if it is a friend and regardless of your willingness. Remember, anything digital has the potential to be leaked or hacked into.
- Turn off webcams when not in use.
- Never open attachments from unknown senders.
- Take screenshots of any conversation where someone makes lude comments or requests.
- Report any attempts at sextortion! While it may be challenging, especially for teens,reporting these incidents is crucial for helping authorities combat the issue effectively.
- Copy and paste some of the email you received into a search engine to see if others report receiving a similar email. These attempts are generally sent out in mass.
Parents and teachers should educate children and students about sextortion, explaining what it is, discussing safety measures, and maintaining open lines of communication to ensure anyone in trouble can feel comfortable seeking help. Adults who are targeted in this manner should first take a deep breath and calmly assess whether this blackmail attempt makes any sense. Most of these schemes fall apart under a modicum critical evaluation. If ever in doubt, feel free to run it by us!