🛡 Scam Guide · 2026 · Everywhere

Sextortion: What to Do First, the FBI Numbers, and 5 Variants

If you are being sextorted right now, the steps come first: do not pay, stop replying, save the messages, and report — to NCMEC if you are under 18, to FBI IC3 if you are an adult. The FBI received 75,000+ sextortion-related submissions in 2025 with 11,000 from people under 20. NCMEC counts at least 36 teen-boy suicides linked to sextortion since 2021. The FBI's Operation Artemis (April 2025) resulted in 22 Nigerian arrests connected to roughly $65M in U.S. losses. Five documented variants, real survivor stories from r/Sextortion, and the protective steps that work.

💬 Channels: Instagram · Snapchat · Email · Telegram · Discord 📅 Updated May 2026 📑 5 variants documented ⭐ FBI · NCMEC · DOJ · FinCEN verified
🎯 Primary target: Teenage boys 14–17 (90% of financial sextortion victims) 📈 FBI 2025 IC3 reports: 75,000+ sextortion submissions 📉 NCMEC teen-boy suicides since 2021: 36+ documented
📖 11 min read

🆘 If You Are Being Sextorted Right Now

The steps come before the article. In order:

  1. Do not pay. Paying does not stop the threats — the FBI has documented that perpetrators often release the material regardless of payment, and paying confirms you can be hit again.
  2. Stop replying. Block the account on every platform where contact occurred. Silence is the protective response.
  3. Save the evidence. Screenshot the messages, the profile, the payment requests. Do not delete the conversation.
  4. Report. If you are under 18: report.cybertip.org (NCMEC CyberTipline) + 1-800-THE-LOST (1-800-843-5678). If you are an adult: ic3.gov (FBI) + reportfraud.ftc.gov (FTC).
  5. Remove the images. Under 18: takeitdown.ncmec.org (NCMEC's free Take It Down service, hash-based, image never leaves your device). Adult: stopncii.org.
  6. Talk to someone. Call or text 988 (Suicide & Crisis Lifeline). Tell a trusted adult, partner, friend, counselor, or doctor. You are not the first; you will not be the last; the threats end once the material is reported and you are no longer alone with it.

Survivor narratives from r/Sextortion (5+ years, 200K+ members): "I Survived Sextortion — Please Read this if your scared" (119 upvotes), "Goodbye, a year later I'm moving on" (78), "My guide and advice on how to handle the sextortion and the mental impact" (89). The threats end. People recover. You are not alone.

📌 The 30-Second Version

The FBI received 75,000+ sextortion-related submissions in 2025, with 11,000 from people under 20. NCMEC's CyberTipline received 1.4 million online enticement reports in 2025 — a 156% jump from 2024 — averaging nearly 100 financial-sextortion reports per day. NCMEC counts at least 36 teen-boy suicides linked to sextortion since 2021. The FBI's Operation Artemis (April 2025) resulted in 22 Nigerian arrests connected to roughly $65M in U.S. losses across approximately 3,000 identified victims. Five variants dominate the 2024–2026 volume: financial sextortion of teen boys (the FBI's #1 priority), adult dating-app or romance-into-extortion, email-only "I have your password" mass extortion (no actual content), AI-generated deepfake threats (no real images shared), and spousal-impersonation extortion targeting partners and family. The unifying defense: do not pay, stop replying, save the messages, and report — to NCMEC under 18, to FBI IC3 if adult.

⚡ Quick Safety Rules

🪞 Is this a sextortion attempt? — 30-second self-check

Run if a new contact has gone fast or aggressive. Two or more "yes" answers and the answer is yes.

  1. Did a stranger you met online quickly steer the conversation toward intimate photos, video chat, or "showing yourself"?
  2. Did the conversation escalate from friendly contact to a payment demand within hours or days?
  3. Did the scammer claim to have your contacts list and threaten to send images to family, friends, school, or employer?
  4. Is the scammer demanding payment in Bitcoin, gift cards, Cash App, or Zelle — irreversible rails?
  5. Did you receive an email containing a real (or old) password of yours along with a threat to release a "recording" you do not remember being made?

2+ yes: Sextortion. Stop replying. Block. Screenshot. Report. → Skip to What to Do

Jump to a Variant

  1. High Financial Sextortion of Teen Boys (Yahoo-Boys / Instagram-Snapchat)
  2. High Adult Dating-App / Romance-Into-Extortion
  3. Med Email-Only "I Have Your Password" Mass Extortion
  4. High AI-Generated Deepfake Nude Threats (No Real Images Shared)
  5. Med Spousal / Family-Impersonation Email Extortion

A Single 17-Year-Old's Two Hours: How the Script Lands

The case the FBI most often points to follows a now-familiar arc, drawn from the agency's 2024 financial-sextortion advisory and from DOJ Eastern District of Pennsylvania court filings. A 17-year-old boy receives an Instagram DM from what looks like a teenage girl peer — a profile created days earlier with a small set of Pinterest-sourced photos and a bio that matches the local high school's culture. The conversation is friendly for an hour. The "girl" sends an intimate photo and asks for one back. He sends one. Within ninety seconds the tone changes.

The next message lists his Instagram friends — names, schools, parents' employers — pasted from a contacts scrape the scammer ran during the rapport-building phase. The demand is $300 in Apple gift cards, escalating to a $1,500 wire if he does not comply within thirty minutes. The scammer sends a screenshot of his own school yearbook page and a list of his mother's contacts. The boy pays. The threats continue. Four hours later the scammer demands another $2,000.

This is the script the FBI's Operation Artemis (April 2025) was built to disrupt — 22 Nigerian arrests, multiple extraditions, two 17-year sentences in a Michigan teen-suicide case, and federal cooperation with Nigeria's EFCC, Canada, Australia, and the UK. Approximately half of the 22 arrested subjects were directly linked to victims who had taken their own lives. NCMEC's tally of teen-boy suicides linked to financial sextortion stands at at least 36 since 2021. The single most protective intervention any parent, friend, or sibling can offer is making clear, ahead of time, that if something happens you will not be in trouble — come to me, no questions, no consequences, we will report it together. The FBI's Stop Sextortion campaign emphasizes that the most-cited reason victims do not report is fear of parental reaction. Pre-empting that fear is the work.

What These Scams Actually Are

Sextortion is a coercion script — the use of intimate images (real, obtained, or fabricated by AI) as a coercion tool to extract money or further sexual material. The FBI's working definition covers two main classes: financially motivated sextortion (the perpetrator wants money) and traditional sextortion (the perpetrator wants more sexual content). The financially motivated variant has dominated 2022–2026 volume; the traditional variant remains the more dangerous form for younger children because the demands escalate over months or years.

The defining structural feature of sextortion — what makes it different from ordinary blackmail or romance fraud — is the asymmetry of perceived shame. The scammer's power is not the image itself; it is the victim's belief that distribution would be socially or psychologically catastrophic. NCMEC's recovery research and the r/Sextortion subreddit's survivor narratives converge on the same finding: the threat loses its power once the material is reported, the platforms are notified, and the victim is no longer alone with the secret. Reporting is the protective act. Silence is the scammer's tool.

🔑 The single rule that defeats every variant — do not pay, stop replying, save the evidence, report

The FBI's guidance, NCMEC's intake protocol, and the r/Sextortion community consensus all converge on the same four-step sequence: (1) do not pay (paying does not stop the threats and confirms you can be hit again), (2) stop replying (every additional message is more material), (3) save the evidence (screenshots are the foundation of any report), and (4) report (NCMEC under 18, FBI IC3 if adult). The 988 Suicide & Crisis Lifeline is one number that covers the rest.

The 5 Variants

Each variant follows the same protective playbook — only the channel, the demographic, and the material differ. The variants are ordered by current FBI / NCMEC priority, with financial sextortion of teen boys the highest because of its lethality.

Variant #1
High Severity
Financial Sextortion of Teen Boys (Yahoo-Boys / Instagram-Snapchat)
💬 Channel: Instagram, Snapchat, TikTok DM. Scammer poses as a teenage-girl peer with a freshly created profile and Pinterest-sourced photos. Conversation moves to image exchange within 30–90 minutes. Demand follows within seconds of the victim sending an image. Payment demanded in gift cards, Bitcoin, Cash App, or wire. Operating from Nigeria-based "Yahoo Boys" cybercrime networks per FBI Operation Artemis findings.

A scammer (often part of a Nigerian cybercrime network) creates a fake teenage-girl peer profile, builds rapport with a 14–17 year-old male target, requests an intimate image, then immediately switches to threats — pay or the image goes to the victim's friends, family, school, or sports team. Per Thorn's 2025 research, 90% of financial-sextortion victims are boys ages 14–17. NCMEC has documented at least 36 teen-boy suicides linked to financial sextortion since 2021. The FBI's Operation Artemis (April 2025) resulted in 22 Nigerian arrests connected to roughly $65M in U.S. losses across approximately 3,000 identified victims.

A composite case drawn from FBI Sacramento and DOJ EDPA filings illustrates the script's tempo. A 16-year-old male receives an Instagram follow request from a profile that looks like a teenage girl from a neighboring high school. The profile is two weeks old, with eight photos and a bio referencing two local landmarks. After three short DM exchanges over an evening, the "girl" suggests moving to Snapchat, sends an intimate photo, and asks for one back. Within seconds of the victim's image landing, the conversation pivots: a screenshot of the victim's Instagram friends list (scraped during the rapport phase), a list of his mother's coworkers (cross-referenced from her LinkedIn), and a demand for $400 in Apple gift cards within fifteen minutes. Refusal triggers an immediate "preview send" to two of the friends in the screenshot — sometimes real, sometimes bluffed. The pressure is engineered for adolescent reasoning: small enough demands to feel survivable, fast enough timing to prevent reflection, and shame-based pressure that works hardest on the demographic with the least experience handling it.

The r/Sextortion subreddit (5+ years old, 200K+ members) is the most consistent public archive of the script's actual feel and the protective steps that work. The 206-upvote thread "I was a victim of sextortion, here's what happened and how I got through it" documents one teen's full arc: the initial DM, the image exchange, the demand, the panic, the report, and the recovery. The 119-upvote thread "I Survived Sextortion — Please Read this if your scared" emphasizes the same point survivors converge on: "the threats end once you stop replying and report." The 99-upvote thread "Sextortionist fucked with the wrong guy" documents a victim who refused to pay, blocked, reported, and watched the threats deflate within 48 hours. The recovery pattern is consistent across hundreds of survivor posts: stop replying, screenshot, report to NCMEC + FBI IC3, use Take It Down, tell a trusted adult, and within days to weeks the threats stop and the survivor's life returns to a recognizable shape.

What stops the script is the protective sequence. If you or someone you know is being sextorted: do not pay, stop replying, save the messages, and file at report.cybertip.org (NCMEC CyberTipline, free, primary path for under-18 victims) and tell a trusted adult. Use NCMEC's free Take It Down service to remove intimate images from participating platforms (Instagram, Snapchat, TikTok, Facebook, OnlyFans, Reddit, X) — the service generates a hash on the user's device, so the image itself never leaves; the platforms then block any matching uploads. Federal prosecution is real and accelerating: Operation Artemis arrests, two 17-year sentences in the Michigan case, multiple extraditions to Pennsylvania. The protective rule for parents and trusted adults: pre-empt the shame. If something happens, you will not be in trouble — come to me, no questions, no consequences, we will report it together.

Red Flags

  • New social-media follower whose profile is days or weeks old
  • Conversation steers toward intimate photos within hours of first contact
  • "Girl" suggests moving to Snapchat (auto-deleting messages favor the scammer)
  • Threat references the victim's contacts list, school, or family by name within seconds of receiving an image
  • Payment demand in Apple gift cards, Bitcoin, Cash App, Zelle, or wire — irreversible rails
  • Time-pressured threat ("within 15 minutes" / "in the next hour")

Defenses

  • Treat any new social-media contact whose conversation moves toward intimate images as a script — block, do not engage
  • Privacy settings: lock contacts list / friends list / followers to private; do not allow contact-list scraping
  • If you (or your teen) sent an image: stop replying, block, screenshot, do not delete
  • Report to NCMEC (under 18) at report.cybertip.org or FBI IC3 (adult) at ic3.gov
  • Use NCMEC Take It Down for image removal from participating platforms (under 18, free, image never leaves device)
  • Tell a trusted adult — pre-empted shame loses its power

Typical Money Demanded

Initial demand: $200–$500 in Apple gift cards · Escalation: $1,000–$5,000 wire transfer or Bitcoin · Operation Artemis cumulative loss across ~3,000 identified victims: ~$65M per FBI April 2025 announcement.

— Adult victims face a different version of the same script. The pressure shifts from peer shame to professional, family, or marital exposure, and the channels move from teen-dominant Instagram and Snapchat to dating apps and email. —

Variant #2
High Severity
Adult Dating-App / Romance-Into-Extortion
💬 Channel: Tinder, Hinge, Bumble, Grindr, Match, OkCupid, Plenty of Fish. Scammer profile presents as locally available adult. Conversation moves quickly off the dating platform to WhatsApp, Telegram, or Snapchat. Video chat or intimate-image exchange follows within 1–7 days. Demand follows within seconds of intimate exchange. Payment demanded in Bitcoin, wire, or Cash App.

A scammer matches with an adult on a dating app, moves the conversation off-platform within days, escalates to a video chat or intimate-image exchange, then immediately switches to extortion — pay or the recording goes to the victim's employer, family, social network, or in some cases the victim's spouse. The threat works because the victim's calculation centers on professional consequences, marital damage, or family exposure rather than peer shame. The FBI 2024 IC3 report logged 54,936 sextortion-and-extortion complaints with $33.5M in losses; a substantial share of adult complaints map to this variant.

A composite case from r/Sextortion adult survivor threads and FBI field-office advisories illustrates the adult-target version. A 38-year-old professional matches on Hinge with what looks like a local woman in her early 30s. After three days of friendly messaging, she suggests moving to WhatsApp because Hinge "isn't very private." Two days later she initiates a video call, gets him to expose himself on camera, and the recording is in her hands within minutes. The next message is a screenshot of his LinkedIn page, a list of his five most senior coworkers, his employer's HR contact, and a demand for $2,500 in Bitcoin within twenty-four hours. If he does not pay, the recording goes to his manager and the company's executive team. The scammer's research is light — LinkedIn for the professional contacts, the dating-app bio for the personal context — and the threat is designed to make the calculation feel rational: pay $2,500 to keep a job versus risk a career.

The structural feature is the same as the teen variant: the scammer's power depends on the victim's belief that distribution would be socially or professionally catastrophic. r/Sextortion adult survivor threads — including the 140-upvote "for other female survivors" and dozens of male-survivor narratives — converge on the protective sequence working the same way for adults as for teens. "The threats stopped within 72 hours of me reporting and blocking. He sent two more messages and then nothing." The protective steps work because the scammer's economics depend on volume — the perpetrator running this script is targeting dozens or hundreds of victims simultaneously, and a non-paying, non-replying, reporting victim is a deadweight loss. The scammer moves on to the next live target; the silent, blocked victim drops off the priority list within days.

What stops it is the same four steps: do not pay, stop replying, save the evidence, report. For adult victims: file at ic3.gov (FBI Internet Crime Complaint Center) and at reportfraud.ftc.gov (FTC). Use StopNCII.org to remove intimate images from participating platforms (Facebook, Instagram, TikTok, Reddit, OnlyFans, Pornhub, X, Bumble, and dozens more). StopNCII.org generates a hash of the image on the user's device — the image itself never leaves the device — and submits the hash to participating platforms, which then block any matching upload. The TAKE IT DOWN Act (signed May 2025) gives federal-law backing to nonconsensual intimate-image takedown requests, including AI-generated content. If your spouse, partner, or family is being threatened with disclosure, the federal answer is now: report, remove, and recover — not pay.

Red Flags

  • Dating-app match wants to move off-platform within 1–3 days
  • Video chat or intimate-image exchange suggested early, before any in-person meeting
  • Threat references your LinkedIn, employer, family, or spouse within seconds of the exchange
  • Payment demanded in Bitcoin, wire transfer, or Cash App
  • "Pay $X within 24 hours or it goes to..." pressure framing

Defenses

  • Treat any video-chat or intimate-image request from a dating-app match before in-person meeting as a possible script
  • If exchange occurred and threats follow: stop replying, block on every channel, screenshot first
  • Report to FBI IC3 (ic3.gov) and FTC (reportfraud.ftc.gov)
  • Use StopNCII.org for adult intimate-image removal from participating platforms
  • Tell your partner / spouse first if relevant — pre-empted shame loses its power; the scammer's secrecy framing is the threat

Typical Money Demanded

Initial demand: $1,500–$5,000 in Bitcoin or wire · Escalation: $10,000+ over multiple "final" payments · 2024 IC3 sextortion-and-extortion total losses: $33.5M across 54,936 complaints (FBI 2024 IC3 Annual Report).

— The lowest-effort variant ignores rapport entirely. It runs as bulk email at internet-marketing scale and depends on a one-in-a-thousand panic response. The threat is fabricated. —

Variant #3
Medium Severity
Email-Only "I Have Your Password" Mass Extortion
💬 Channel: Bulk email, sent to millions of addresses scraped from data breaches. Email frequently includes a real password the recipient has used in the past — harvested from a years-old breach (LinkedIn, Adobe, Yahoo, etc.) — to make the threat look credible. Demands Bitcoin payment within 24–48 hours.

A bulk email claims the sender has hacked the recipient's webcam, recorded compromising material, and will release it unless a Bitcoin payment is sent within 24–48 hours. The email frequently includes a real password the recipient has used in the past — harvested from a public data breach — to make the threat look credible. There is no actual recording. The scammer sends the same template to millions of addresses. Per Krebs on Security and Have I Been Pwned investigations dating to 2018, payment compliance is well under 1% but the volume keeps the campaigns profitable. The Federal answer: do not pay, do not reply, change the password if it is still in use anywhere, enable two-factor authentication, and delete the email.

A representative case: a 45-year-old receives an email with the subject line "Your password is [actual-old-password]." The body claims the sender has installed malware on the recipient's computer, recorded webcam footage of the recipient watching adult content, and will release the footage to the recipient's email contacts unless 0.05 BTC (~$3,000 at 2026 prices) is sent to a Bitcoin address within 48 hours. The password is real — used by the recipient on LinkedIn in 2012 — and is now in the public domain via the LinkedIn 2012 breach republished on Have I Been Pwned. There is no malware. There is no recording. The scammer harvested the email address and password from the breach data, stitched them into a template, and sent the same email to millions of addresses with the password substituted in. Payment compliance on these campaigns is well under 1% — but at scale, even 0.1% is profitable.

The federal guidance on this variant has been consistent since the FTC and FBI flagged it in 2018: do not pay, do not reply, change the password everywhere it is still in use, enable two-factor authentication, and delete the email. The diagnostic that the threat is empty: the scammer never produces the actual footage, never names a specific webcam session, and never demonstrates platform-specific access. If the threat were real, the scammer would have a strong incentive to prove it; the bulk-email variant cannot prove it because there is nothing to prove. Have I Been Pwned (Troy Hunt's free service) lets users check whether their password is in any of dozens of public breach corpora — if your password from this email is listed, that explains where the scammer found it.

What stops it is recognition. If you receive a "your password is X" email demanding Bitcoin, do not reply. Do not pay. Change the password anywhere you still use it. Enable two-factor authentication on every account that supports it. File at reportfraud.ftc.gov and at ic3.gov. Delete the email. The protective sequence is the same as the high-severity variants — only the threat is hollower. r/Scams thread "Phishing/sextortion email sent with my supposed own mail" (3 upvotes, but representative of dozens of similar posts) documents the everyday volume of this campaign; victims who paid almost universally report follow-on demands within weeks, while victims who ignored the email reported nothing.

Red Flags

  • Subject line or body contains a real (often old) password of yours
  • Claim of webcam footage or screen recording you do not remember being made
  • Bitcoin payment demanded with a specific deadline (24–48 hours)
  • No specific demonstration of access — no named website, no specific session, no platform-specific identifier
  • Email signature looks generic or auto-generated

Defenses

  • Do not reply, do not pay, do not click links
  • Check haveibeenpwned.com to find which breach exposed your password
  • Change the password anywhere you still use it; never reuse passwords across accounts
  • Enable two-factor authentication on email, social media, banking, and any sensitive account
  • Use a password manager (Bitwarden, 1Password, Apple Keychain) to generate and store unique passwords
  • Report at reportfraud.ftc.gov and delete the email

Typical Money Demanded

$500–$5,000 in Bitcoin per email · Sent to millions of addresses; payment compliance well under 1% per Krebs on Security; campaign profitability comes from volume, not yield.

— The newest variant inverts a defining assumption of every previous form. The victim never shared an intimate image. The image exists anyway. —

Variant #4
High Severity
AI-Generated Deepfake Nude Threats (No Real Images Shared)
💬 Channel: Instagram, Snapchat, Twitter/X, Discord. Scammer scrapes a public social-media photo (clothed), runs it through an AI nudification tool, and sends the AI-generated nude back to the victim with extortion demands. The victim never shared an intimate image at any point. Per Thorn's 2025 research, 13% of sextortion victims report this variant.

A scammer takes a clothed, public-facing photo of a victim from social media, runs it through an AI nudification tool, and sends the AI-generated nude image back to the victim with the standard sextortion demands — pay or the image goes to family, friends, school, or employer. The victim never shared an intimate image at any point. Per Thorn's 2025 research, 13% of sextortion victims now report that the perpetrator used AI-generated deepfake imagery rather than real intimate content. The federal response: the TAKE IT DOWN Act, signed May 2025, explicitly criminalizes the nonconsensual online publication or threat of online publication of intimate images including AI-generated ones, and gives federal-law backing to platform takedown requests.

A representative case from r/Sextortion's AI-deepfake survivor threads (including the 70-upvote "(F 20) Someone used my Instagram photo to make a fake AI nude and is threatening me — really worried"): a 20-year-old college student finds an anonymous Twitter / X DM in her requests folder. The DM contains an AI-generated nude image of her — the face is clearly hers (taken from her public Instagram), the body is fabricated. The DM demands $1,000 in Bitcoin within 24 hours or the image will be sent to her professors, her family, and posted on a public revenge-porn site. She has never shared an intimate image with anyone, online or off. The scammer has no real material; the AI-generated image is the only material. The image was generated by feeding her public Instagram photo into one of the dozens of AI nudification tools that proliferated on the open internet between 2023 and 2026.

The protective sequence is the same as the real-image variants — and arguably stronger, because the AI-generation is itself a federal crime under the TAKE IT DOWN Act. The image is fake; the protections are real. StopNCII.org and NCMEC's Take It Down service both accept hashes of AI-generated intimate imagery for removal from participating platforms — Instagram, Snapchat, TikTok, Facebook, OnlyFans, Reddit, Pornhub, X, and dozens more. The TAKE IT DOWN Act requires participating platforms to honor takedown requests within 48 hours. The FBI's IC3 portal accepts AI-deepfake sextortion reports as a sub-category of sextortion. The Department of Justice has begun prosecuting AI-deepfake sextortion under the new federal statute as of late 2025.

What stops it is the same four steps plus one additional protective practice: lock down social-media privacy settings so public photos are not available to scrape. Set Instagram, Facebook, TikTok, and X profiles to private; remove photos that show identifying features (clear face, full body) from public profiles; disable photo tagging by strangers; review and prune followers and friends. The scammer's economics depend on the photo being scrapable; private accounts deny the input. For victims of an existing AI-deepfake threat: do not pay, stop replying, screenshot, report at ic3.gov (or report.cybertip.org if under 18), and use Take It Down (under 18) or StopNCII.org (adults) to hash and remove the AI-generated image from participating platforms. The TAKE IT DOWN Act's 48-hour mandatory-removal window kicks in once the takedown request is submitted.

Red Flags

  • You receive a nude image of yourself from a stranger and you have never shared a nude image with anyone
  • The face in the image is clearly yours but the body looks subtly off — proportions, skin tone, lighting
  • Image has artifacts characteristic of AI generation — repeated patterns, smooth-but-inconsistent skin texture, unusual finger or hand rendering
  • Threat references your contacts list, school, or employer (same script as real-image sextortion)
  • Payment demanded in Bitcoin or Cash App

Defenses

  • Lock down social-media privacy: Instagram private, Facebook friends-only, TikTok private, X protected — deny the scammer the input photo
  • Remove identifying photos (clear face + full body) from public profiles
  • If a deepfake threat arrives: stop replying, block, screenshot first, do not delete
  • Report at ic3.gov (adult) or report.cybertip.org (under 18); the TAKE IT DOWN Act covers AI-generated images under federal law
  • Use StopNCII.org (adult) or Take It Down (under 18) for hash-based removal from participating platforms

Typical Money Demanded

$500–$3,000 in Bitcoin initial demand · 13% of sextortion victims in Thorn's 2025 survey reported AI-deepfake variant · TAKE IT DOWN Act (May 2025) mandates 48-hour platform removal once a takedown request is submitted.

— The fifth variant inverts the target. The victim is not the person whose intimate content the scammer claims to have; the victim is the partner, family member, or friend the scammer is asking. —

Variant #5
Medium Severity
Spousal / Family-Impersonation Email Extortion
💬 Channel: Email or messaging-app DM, often from a spoofed or near-lookalike address impersonating the victim's spouse, family member, or close friend. The "person" claims to have been hacked or to need a discrete favor — often the favor is intimate photos of the recipient, framed as part of a couples' intimate exchange or an emergency. Volume is lower than email-only mass extortion but the script is more targeted and the social engineering is heavier.

A scammer impersonates a victim's spouse, family member, or close friend via a spoofed or lookalike email or messaging account, then asks the recipient for intimate photos — framed as an intimate-couple exchange, a romantic-emergency, or in some cases a faked-medical-context request. The recipient sends images to what they believe is their partner; the scammer extracts the images and pivots to extortion against either the recipient or their actual partner. The 294-upvote r/Scams thread "Scammer posing as my wife with a proton e-mail and asking her friends for breast pictures" documents the script's most common tempo.

A representative case from the r/Scams thread above and FBI BEC-adjacent advisories illustrates the script. A 35-year-old woman receives a Proton Mail email from what appears to be her husband's address — close lookalike, one extra letter that is easy to miss on mobile. The email asks if she would be willing to send him an intimate photo for "a special anniversary surprise I'm putting together." She sends one. The next day she receives a separate email from a different address demanding $5,000 in Bitcoin or the photo will be released to her social-media followers and her workplace. The husband never sent the original request; the scammer harvested her email address from his contacts (compromised in a years-old breach), set up a lookalike domain, sent the request, harvested the response, and pivoted. The variant exploits the trust default in spousal communication — the recipient does not verify the request because it appears to come from someone they trust.

The structural defense is the same defense that works against Business Email Compromise: verify any unexpected request through a separate channel before acting on it. If an email purports to be from your spouse and the request is unusual (intimate photos, a money transfer, a sudden change in behavior), call them on the phone number you already have, walk into the next room, send a Slack DM you initiate yourself, or use any channel other than the one the suspicious email arrived on. The scammer cannot intercept a separate channel they did not anticipate; the verification kills the script. The same protective sequence applies if the script has already succeeded: do not pay, stop replying, save the evidence, report to FBI IC3, and use StopNCII.org to remove the image from participating platforms.

What stops it is the verification habit. If a spouse, family member, or close friend asks for something unusual by email or DM — intimate photos, money, a sudden change in plans — verify on a different channel before responding. A real partner welcomes a verification call; a scammer cannot fake one. If the script has already succeeded and you sent images you now regret, the recovery path is the same as the adult dating-app variant: ic3.gov, reportfraud.ftc.gov, StopNCII.org for adult intimate-image removal, and 988 if you need to talk to someone. Tell your actual partner. The scammer's power is the secrecy framing; pre-empted shame loses its power.

Red Flags

  • Email or DM from your spouse, family member, or close friend with an unusual request (intimate photos, money, behavior change)
  • Sender address has subtle differences from the real address (extra letter, different domain, .net vs .com)
  • Request frames secrecy or surprise — "don't tell anyone, it's a surprise"
  • Channel is unusual for that person — they normally text, the email arrives via Proton Mail or another platform they don't use

Defenses

  • Verify any unexpected request from a trusted contact through a separate channel — phone call, in person, Slack DM you initiate
  • Look closely at the sender address — lookalike domains are the diagnostic
  • Lock down email security: two-factor authentication, strong unique passwords, phishing-resistant 2FA where available
  • If the script succeeded: do not pay, screenshot, report at ic3.gov + reportfraud.ftc.gov
  • Use StopNCII.org to remove the image from participating platforms
  • Tell your actual partner — pre-empted shame loses its power

Typical Money Demanded

$3,000–$10,000 in Bitcoin per extortion attempt · Volume lower than other variants but conversion rate higher because the social engineering is heavier.

The Numbers (and Where They Come From)

Sextortion is the rare consumer-fraud category where the federal data is unusually consistent across agencies, because three independent organizations track it through different intake paths. The triangulation matters: it confirms the threat scale and the demographic concentration are real, not an artifact of any single agency's reporting.

75,000+
FBI 2025 IC3 sextortion-related submissions; 11,000 from people under 20 (FBI IC3 2025 Annual Report)
✓ verified
1.4M
NCMEC 2025 online enticement reports — a 156% YoY increase; nearly 100 financial-sextortion reports per day (NCMEC 2025 data release)
✓ verified
36+
NCMEC-documented teenage-boy suicides linked to financial sextortion since 2021 (NCMEC Sextortion page)
✓ verified
$65M
FBI Operation Artemis cumulative U.S. losses across ~3,000 identified victims; 22 Nigerian arrests April 2025 (FBI / EFCC announcement)
✓ verified

The 2024 FBI IC3 Annual Report logged 54,936 sextortion-and-extortion complaints with $33.5M in losses — a 59% YoY increase in complaints. The 2025 Annual Report (released Q1 2026) showed continued growth to 75,000+ submissions specifically tagged sextortion-related. Per Thorn's 2025 sextortion research, 90% of financial sextortion victims are boys ages 14–17, and LGBTQ+ teens face double the risk of non-LGBTQ+ peers (36% vs 18%). The FinCEN Notice on Financially Motivated Sextortion (September 2025) instructs financial institutions to flag transactions consistent with sextortion payment patterns — gift-card purchases at unusual volume, Bitcoin transfers from teen account-holders, repeated small-dollar wire transfers to specific recipient countries — and provides typology indicators that have already supported multiple federal prosecutions including the Operation Artemis cases.

📌 Why this category is unusually consequential

Most consumer-fraud categories cause financial harm. Sextortion causes both financial harm and a documented mortality signal: at least 36 teenage-boy suicides linked to financial sextortion since 2021 per NCMEC, with the FBI's Operation Artemis announcement noting that approximately half of the 22 arrested subjects were directly linked to victims who had taken their own lives. The protective conversation parents can have with teens — if something happens you will not be in trouble, come to me, no questions, no consequences, we will report it together — is the single most-cited intervention by NCMEC, the FBI, and the r/Sextortion survivor community. Pre-empting the shame removes the scammer's power. The threats end. People recover. The article you are reading is meant to make that conversation easier to have.

Recovery Reality (and Why the Threats End)

Recovery from sextortion happens in two layers — the immediate threat-cessation layer (days to weeks) and the longer emotional and reputational recovery layer (weeks to months). The threat-cessation layer is consistently fast once the protective sequence is followed. The r/Sextortion subreddit's survivor narratives — including the 78-upvote "Goodbye, a year later I'm moving on," the 119-upvote "I Survived Sextortion — Please Read this if your scared," and the 89-upvote "My guide and advice on how to handle the sextortion and the mental impact" — converge on the same arc: stop replying + report, threats taper within 48–72 hours, scammer moves on within a week, and the survivor's life returns to a recognizable shape within a month or two. The scammer's economics depend on volume; a non-paying, non-replying, reporting victim is dead weight to the perpetrator and gets dropped quickly.

The longer recovery layer is where 988, school counselors, primary-care doctors, and the r/Sextortion community matter most. The shame the scammer engineered does not vanish on the day the threats stop; it fades over weeks as the survivor processes what happened, talks to people they trust, and integrates the experience into a self-narrative that is not defined by it. The community guidance from r/Sextortion's most-upvoted recovery posts emphasizes one consistent message: "It gets better. The threats stop. People recover. You are not the first; you will not be the last." The data agrees. NCMEC's recovery research, the FBI Stop Sextortion campaign's testimonials, and the survivor community converge on the same finding.

🆘 What to Do If You've Been Sextorted

📞 988 Suicide & Crisis Lifeline — Anytime

Call or text 988 for free, confidential, 24/7 crisis support. The line is staffed by trained counselors and is the federally designated crisis resource for anyone in emotional distress. There is no waiting list and no insurance requirement.

🛡 NCMEC CyberTipline — Under 18

If you are under 18 (or reporting on behalf of someone who is): file at report.cybertip.org and call 1-800-THE-LOST (1-800-843-5678). NCMEC's intake team triages reports to law enforcement and provides direct survivor support.

🏛 FBI IC3 — Adult Victims

File at ic3.gov for federal investigation. The aggregated reports drive operations like Operation Artemis even when an individual case cannot be solved on its own. Include screenshots and the scammer's platform usernames.

🖼 Take It Down — Image Removal (Under 18)

Visit takeitdown.ncmec.org — NCMEC's free service that hashes intimate images of minors on the user's device (image never leaves) and submits the hash to participating platforms (Instagram, Snapchat, TikTok, Facebook, OnlyFans, Reddit, X, Pornhub) for blocking.

🖼 StopNCII.org — Image Removal (Adults)

Visit stopncii.org for the equivalent adult service. Same hash-based approach, same participating-platform list, same federal-law backing under the TAKE IT DOWN Act.

📋 FTC ReportFraud — Federal Tracking

File at reportfraud.ftc.gov for FTC consumer-protection records. The reports inform federal alerts and consumer-protection campaigns.

💬 Tell a Trusted Adult / Partner / Friend

The scammer's power is your secrecy. Telling a parent, partner, school counselor, doctor, or close friend kills the power. The conversation feels harder than it is; survivor narratives consistently report relief within minutes of telling someone.

🚫 Ignore Recovery DMs

Within hours of a public victim post, recovery-scam DMs offering to "recover your funds" or "remove the images" for an upfront fee will arrive. Block all of them. The legitimate channels are above; recovery scammers are the parasite layer.

📖 Coming Soon · tabiji.ai General Scams
If you're sharing this page with a teen or partner, the full book covers 30+ scams across phone, text, online, and in-person channels — same federal-source-verified research as this guide.
$4.99 on Kindle when it ships · Notify me →
See current titles →

If You're Reporting Outside the United States

Sextortion is global — Yahoo-Boys networks target English-speaking teens across the entire Anglosphere, and the protective steps are universal. Reporting paths exist in every major jurisdiction.

Frequently Asked Questions

What should I do if I'm being sextorted right now?
Five steps, in this order. (1) Do not pay. Paying does not stop the threats — the FBI has documented that perpetrators often release the material regardless of payment, and paying signals that you can be hit again. (2) Stop replying. Every additional message gives the scammer more material and more pressure. (3) Save the evidence — screenshot the messages, the profile, the payment requests, and the platform usernames. Do not delete anything. (4) Report. If you are under 18, file at report.cybertip.org (NCMEC CyberTipline) and tell a trusted adult. If you are an adult, file at ic3.gov (FBI Internet Crime Complaint Center) and at reportfraud.ftc.gov. Use NCMEC's free Take It Down service at takeitdown.ncmec.org if intimate images of you exist online and you are under 18; adults can use stopncii.org. (5) Talk to someone. Call or text 988 (Suicide & Crisis Lifeline) if you need to talk. The shame fades. The threats lose their power once the material is reported, the platforms are notified, and you are no longer alone with it.
If I pay, will the scammer stop?
Almost never. The FBI's public guidance on financially motivated sextortion is explicit: "offenders often release the victim's material regardless of whether payment is received." Paying confirms that the victim is reachable and willing to comply, which makes follow-on extortion attempts more likely, not less. The FinCEN 2025 advisory to financial institutions notes that sextortion payment patterns frequently include multiple escalating demands from the same perpetrator after an initial payment. The protective rule is to break contact, save evidence, and report — not to negotiate.
What is financial sextortion?
Financial sextortion is a sextortion variant where the perpetrator's goal is money rather than additional sexual content. The script: a scammer (often part of a Nigerian cybercrime network the FBI calls "Yahoo Boys") creates a fake teenage-girl peer profile on Instagram, Snapchat, or another platform, builds rapport with a target, asks for an intimate image, then immediately switches to threats — pay or the image goes to your friends, family, school, employer. The FBI received 75,000+ sextortion-related submissions to IC3 in 2025, with 11,000 from people under 20. Per Thorn's 2025 research, 90% of financial sextortion victims are boys ages 14–17. NCMEC has documented at least 36 teen-boy suicides linked to financial sextortion since 2021. The FBI's Operation Artemis (April 2025) resulted in the arrest of 22 Nigerian nationals connected to roughly $65M in U.S. losses across approximately 3,000 identified victims.
What is the email-only "I have your password" sextortion?
It's a bulk-email mass extortion variant where the sender claims to have hacked the recipient's webcam, recorded compromising material, and will release it unless a Bitcoin payment is sent within 24-48 hours. The email frequently includes a real password the recipient has used in the past — harvested from a years-old data breach — to make the threat look credible. There is no actual recording. The scammer sends the same template to millions of addresses. Federal advice is unambiguous: do not pay, do not reply, change the password if it's still in use anywhere, enable two-factor authentication, and delete the email. Report at reportfraud.ftc.gov and ic3.gov for federal data tracking. The Krebs on Security and Have I Been Pwned investigations have documented this variant since 2018; payment compliance is well under 1% but the volume keeps the campaigns profitable.
What if I never sent any intimate images but the scammer says they have AI-generated ones?
Per Thorn's 2025 sextortion research, 13% of victims report that the perpetrator used AI-generated deepfake images — meaning no real intimate images were ever shared by the victim. The federal response: in May 2025 the TAKE IT DOWN Act was signed into law, which criminalizes the nonconsensual online publication or threat of online publication of intimate images, including AI-generated ones. The protective steps are the same as for real-image sextortion — do not pay, do not reply, save the messages, report to NCMEC if under 18 or to FBI IC3 if adult, and use Take It Down (under 18) or StopNCII.org (adults) to remove the AI-generated material from participating platforms. AI-generated nudes are explicitly covered by the federal law as of 2025; platforms are required to remove them on report.
Can my photos really be removed from the internet?
From participating platforms, yes — and the participating-platform list is broad. NCMEC's Take It Down service (takeitdown.ncmec.org) generates a hash of the intimate image on your device (the image itself never leaves your device), then submits the hash to participating platforms — Instagram, Facebook, TikTok, Snapchat, OnlyFans, Pornhub, Reddit, X (formerly Twitter), and others — which then block any matching uploads. For adults, StopNCII.org provides the same hashing-based removal service. The hash-matching approach means the platforms do not need to see the actual image to block it. The TAKE IT DOWN Act (May 2025) gives federal-law backing to these removal requests. Removal does not retroactively erase distribution that has already occurred outside participating platforms, but it stops further spread on the platforms where most distribution happens.
Are the scammers ever actually caught?
Yes, increasingly. The FBI's Operation Artemis (announced April 2025) was a multi-national operation with Nigeria's EFCC and partners in Canada, Australia, and the UK that resulted in 22 arrests and several extraditions to the United States. Two Nigerian nationals were sentenced to over 17 years each in connection with the sextortion-driven suicide of a Michigan teenager. The DOJ Eastern District of Pennsylvania extradited two Nigerian men to face charges connected to the sextortion-driven death of a Pennsylvania young man. The 2024 IC3 report logged 54,936 sextortion-and-extortion complaints (a 59% YoY increase) with $33.5M in losses. The international cooperation is real and the prosecutions are accelerating. Reporting to FBI IC3 contributes directly to investigations like Operation Artemis — the FBI uses the aggregated reports to identify perpetrator networks even when an individual case cannot be solved on its own.
I'm a parent — what should I tell my teen?
Three messages, said before any incident happens, and again if one does. (1) If a stranger asks for intimate images, the request itself is the diagnostic — block, don't reply. (2) If something already happened, you will not be in trouble. The shame is the scammer's tool; removing the shame removes their power. Come to me, no questions, no consequences. We will report it together. (3) The threats lose their power once it is reported. NCMEC's Take It Down service can remove the images from participating platforms; the perpetrators face federal prosecution; the scammer's threats are weaker than they sound. The FBI's Stop Sextortion campaign emphasizes that the predominant victim demographic is 14-17 year-old boys, and that the most-cited reason victims do not report is fear of parental reaction. Pre-empting that fear is the single most protective conversation a parent can have.

Related Reading