🆘 If You Are Being Sextorted Right Now
The steps come before the article. In order:
- Do not pay. Paying does not stop the threats — the FBI has documented that perpetrators often release the material regardless of payment, and paying confirms you can be hit again.
- Stop replying. Block the account on every platform where contact occurred. Silence is the protective response.
- Save the evidence. Screenshot the messages, the profile, the payment requests. Do not delete the conversation.
- Report. If you are under 18: report.cybertip.org (NCMEC CyberTipline) + 1-800-THE-LOST (1-800-843-5678). If you are an adult: ic3.gov (FBI) + reportfraud.ftc.gov (FTC).
- Remove the images. Under 18: takeitdown.ncmec.org (NCMEC's free Take It Down service, hash-based, image never leaves your device). Adult: stopncii.org.
- Talk to someone. Call or text 988 (Suicide & Crisis Lifeline). Tell a trusted adult, partner, friend, counselor, or doctor. You are not the first; you will not be the last; the threats end once the material is reported and you are no longer alone with it.
Survivor narratives from r/Sextortion (5+ years, 200K+ members): "I Survived Sextortion — Please Read this if your scared" (119 upvotes), "Goodbye, a year later I'm moving on" (78), "My guide and advice on how to handle the sextortion and the mental impact" (89). The threats end. People recover. You are not alone.
📌 The 30-Second Version
The FBI received 75,000+ sextortion-related submissions in 2025, with 11,000 from people under 20. NCMEC's CyberTipline received 1.4 million online enticement reports in 2025 — a 156% jump from 2024 — averaging nearly 100 financial-sextortion reports per day. NCMEC counts at least 36 teen-boy suicides linked to sextortion since 2021. The FBI's Operation Artemis (April 2025) resulted in 22 Nigerian arrests connected to roughly $65M in U.S. losses across approximately 3,000 identified victims. Five variants dominate the 2024–2026 volume: financial sextortion of teen boys (the FBI's #1 priority), adult dating-app or romance-into-extortion, email-only "I have your password" mass extortion (no actual content), AI-generated deepfake threats (no real images shared), and spousal-impersonation extortion targeting partners and family. The unifying defense: do not pay, stop replying, save the messages, and report — to NCMEC under 18, to FBI IC3 if adult.
⚡ Quick Safety Rules
- Never pay. The FBI's public guidance is explicit: perpetrators often release the material regardless of payment. Paying confirms you can be reached and invites follow-on demands.
- Block, do not negotiate. Stop replying on every channel where the scammer reached you. Do not threaten back, do not send a final message, do not warn them you will report.
- Screenshot everything before blocking. Messages, profile, payment requests, platform usernames. The screenshots are the foundation of any FBI / NCMEC / platform report.
- Report fast. Under 18: NCMEC CyberTipline + tell a trusted adult (no questions, no consequences). Adult: FBI IC3 + FTC ReportFraud.
- Use the removal services. NCMEC Take It Down (under 18, free, image never leaves your device) and StopNCII.org (adults) generate a hash that participating platforms (Instagram, Snapchat, TikTok, Facebook, OnlyFans, Reddit, X, Pornhub) use to block matching uploads.
- Crisis support is one number: 988. Call or text. The shame fades; the threats lose their power; people recover.
🪞 Is this a sextortion attempt? — 30-second self-check
Run if a new contact has gone fast or aggressive. Two or more "yes" answers and the answer is yes.
- Did a stranger you met online quickly steer the conversation toward intimate photos, video chat, or "showing yourself"?
- Did the conversation escalate from friendly contact to a payment demand within hours or days?
- Did the scammer claim to have your contacts list and threaten to send images to family, friends, school, or employer?
- Is the scammer demanding payment in Bitcoin, gift cards, Cash App, or Zelle — irreversible rails?
- Did you receive an email containing a real (or old) password of yours along with a threat to release a "recording" you do not remember being made?
2+ yes: Sextortion. Stop replying. Block. Screenshot. Report. → Skip to What to Do
Jump to a Variant
A Single 17-Year-Old's Two Hours: How the Script Lands
The case the FBI most often points to follows a now-familiar arc, drawn from the agency's 2024 financial-sextortion advisory and from DOJ Eastern District of Pennsylvania court filings. A 17-year-old boy receives an Instagram DM from what looks like a teenage girl peer — a profile created days earlier with a small set of Pinterest-sourced photos and a bio that matches the local high school's culture. The conversation is friendly for an hour. The "girl" sends an intimate photo and asks for one back. He sends one. Within ninety seconds the tone changes.
The next message lists his Instagram friends — names, schools, parents' employers — pasted from a contacts scrape the scammer ran during the rapport-building phase. The demand is $300 in Apple gift cards, escalating to a $1,500 wire if he does not comply within thirty minutes. The scammer sends a screenshot of his own school yearbook page and a list of his mother's contacts. The boy pays. The threats continue. Four hours later the scammer demands another $2,000.
This is the script the FBI's Operation Artemis (April 2025) was built to disrupt — 22 Nigerian arrests, multiple extraditions, two 17-year sentences in a Michigan teen-suicide case, and federal cooperation with Nigeria's EFCC, Canada, Australia, and the UK. Approximately half of the 22 arrested subjects were directly linked to victims who had taken their own lives. NCMEC's tally of teen-boy suicides linked to financial sextortion stands at at least 36 since 2021. The single most protective intervention any parent, friend, or sibling can offer is making clear, ahead of time, that if something happens you will not be in trouble — come to me, no questions, no consequences, we will report it together. The FBI's Stop Sextortion campaign emphasizes that the most-cited reason victims do not report is fear of parental reaction. Pre-empting that fear is the work.
What These Scams Actually Are
Sextortion is a coercion script — the use of intimate images (real, obtained, or fabricated by AI) as a coercion tool to extract money or further sexual material. The FBI's working definition covers two main classes: financially motivated sextortion (the perpetrator wants money) and traditional sextortion (the perpetrator wants more sexual content). The financially motivated variant has dominated 2022–2026 volume; the traditional variant remains the more dangerous form for younger children because the demands escalate over months or years.
The defining structural feature of sextortion — what makes it different from ordinary blackmail or romance fraud — is the asymmetry of perceived shame. The scammer's power is not the image itself; it is the victim's belief that distribution would be socially or psychologically catastrophic. NCMEC's recovery research and the r/Sextortion subreddit's survivor narratives converge on the same finding: the threat loses its power once the material is reported, the platforms are notified, and the victim is no longer alone with the secret. Reporting is the protective act. Silence is the scammer's tool.
🔑 The single rule that defeats every variant — do not pay, stop replying, save the evidence, report
The FBI's guidance, NCMEC's intake protocol, and the r/Sextortion community consensus all converge on the same four-step sequence: (1) do not pay (paying does not stop the threats and confirms you can be hit again), (2) stop replying (every additional message is more material), (3) save the evidence (screenshots are the foundation of any report), and (4) report (NCMEC under 18, FBI IC3 if adult). The 988 Suicide & Crisis Lifeline is one number that covers the rest.
The 5 Variants
Each variant follows the same protective playbook — only the channel, the demographic, and the material differ. The variants are ordered by current FBI / NCMEC priority, with financial sextortion of teen boys the highest because of its lethality.
A scammer (often part of a Nigerian cybercrime network) creates a fake teenage-girl peer profile, builds rapport with a 14–17 year-old male target, requests an intimate image, then immediately switches to threats — pay or the image goes to the victim's friends, family, school, or sports team. Per Thorn's 2025 research, 90% of financial-sextortion victims are boys ages 14–17. NCMEC has documented at least 36 teen-boy suicides linked to financial sextortion since 2021. The FBI's Operation Artemis (April 2025) resulted in 22 Nigerian arrests connected to roughly $65M in U.S. losses across approximately 3,000 identified victims.
A composite case drawn from FBI Sacramento and DOJ EDPA filings illustrates the script's tempo. A 16-year-old male receives an Instagram follow request from a profile that looks like a teenage girl from a neighboring high school. The profile is two weeks old, with eight photos and a bio referencing two local landmarks. After three short DM exchanges over an evening, the "girl" suggests moving to Snapchat, sends an intimate photo, and asks for one back. Within seconds of the victim's image landing, the conversation pivots: a screenshot of the victim's Instagram friends list (scraped during the rapport phase), a list of his mother's coworkers (cross-referenced from her LinkedIn), and a demand for $400 in Apple gift cards within fifteen minutes. Refusal triggers an immediate "preview send" to two of the friends in the screenshot — sometimes real, sometimes bluffed. The pressure is engineered for adolescent reasoning: small enough demands to feel survivable, fast enough timing to prevent reflection, and shame-based pressure that works hardest on the demographic with the least experience handling it.
The r/Sextortion subreddit (5+ years old, 200K+ members) is the most consistent public archive of the script's actual feel and the protective steps that work. The 206-upvote thread "I was a victim of sextortion, here's what happened and how I got through it" documents one teen's full arc: the initial DM, the image exchange, the demand, the panic, the report, and the recovery. The 119-upvote thread "I Survived Sextortion — Please Read this if your scared" emphasizes the same point survivors converge on: "the threats end once you stop replying and report." The 99-upvote thread "Sextortionist fucked with the wrong guy" documents a victim who refused to pay, blocked, reported, and watched the threats deflate within 48 hours. The recovery pattern is consistent across hundreds of survivor posts: stop replying, screenshot, report to NCMEC + FBI IC3, use Take It Down, tell a trusted adult, and within days to weeks the threats stop and the survivor's life returns to a recognizable shape.
What stops the script is the protective sequence. If you or someone you know is being sextorted: do not pay, stop replying, save the messages, and file at report.cybertip.org (NCMEC CyberTipline, free, primary path for under-18 victims) and tell a trusted adult. Use NCMEC's free Take It Down service to remove intimate images from participating platforms (Instagram, Snapchat, TikTok, Facebook, OnlyFans, Reddit, X) — the service generates a hash on the user's device, so the image itself never leaves; the platforms then block any matching uploads. Federal prosecution is real and accelerating: Operation Artemis arrests, two 17-year sentences in the Michigan case, multiple extraditions to Pennsylvania. The protective rule for parents and trusted adults: pre-empt the shame. If something happens, you will not be in trouble — come to me, no questions, no consequences, we will report it together.
Red Flags
- New social-media follower whose profile is days or weeks old
- Conversation steers toward intimate photos within hours of first contact
- "Girl" suggests moving to Snapchat (auto-deleting messages favor the scammer)
- Threat references the victim's contacts list, school, or family by name within seconds of receiving an image
- Payment demand in Apple gift cards, Bitcoin, Cash App, Zelle, or wire — irreversible rails
- Time-pressured threat ("within 15 minutes" / "in the next hour")
Defenses
- Treat any new social-media contact whose conversation moves toward intimate images as a script — block, do not engage
- Privacy settings: lock contacts list / friends list / followers to private; do not allow contact-list scraping
- If you (or your teen) sent an image: stop replying, block, screenshot, do not delete
- Report to NCMEC (under 18) at report.cybertip.org or FBI IC3 (adult) at ic3.gov
- Use NCMEC Take It Down for image removal from participating platforms (under 18, free, image never leaves device)
- Tell a trusted adult — pre-empted shame loses its power
Typical Money Demanded
Initial demand: $200–$500 in Apple gift cards · Escalation: $1,000–$5,000 wire transfer or Bitcoin · Operation Artemis cumulative loss across ~3,000 identified victims: ~$65M per FBI April 2025 announcement.
— Adult victims face a different version of the same script. The pressure shifts from peer shame to professional, family, or marital exposure, and the channels move from teen-dominant Instagram and Snapchat to dating apps and email. —
A scammer matches with an adult on a dating app, moves the conversation off-platform within days, escalates to a video chat or intimate-image exchange, then immediately switches to extortion — pay or the recording goes to the victim's employer, family, social network, or in some cases the victim's spouse. The threat works because the victim's calculation centers on professional consequences, marital damage, or family exposure rather than peer shame. The FBI 2024 IC3 report logged 54,936 sextortion-and-extortion complaints with $33.5M in losses; a substantial share of adult complaints map to this variant.
A composite case from r/Sextortion adult survivor threads and FBI field-office advisories illustrates the adult-target version. A 38-year-old professional matches on Hinge with what looks like a local woman in her early 30s. After three days of friendly messaging, she suggests moving to WhatsApp because Hinge "isn't very private." Two days later she initiates a video call, gets him to expose himself on camera, and the recording is in her hands within minutes. The next message is a screenshot of his LinkedIn page, a list of his five most senior coworkers, his employer's HR contact, and a demand for $2,500 in Bitcoin within twenty-four hours. If he does not pay, the recording goes to his manager and the company's executive team. The scammer's research is light — LinkedIn for the professional contacts, the dating-app bio for the personal context — and the threat is designed to make the calculation feel rational: pay $2,500 to keep a job versus risk a career.
The structural feature is the same as the teen variant: the scammer's power depends on the victim's belief that distribution would be socially or professionally catastrophic. r/Sextortion adult survivor threads — including the 140-upvote "for other female survivors" and dozens of male-survivor narratives — converge on the protective sequence working the same way for adults as for teens. "The threats stopped within 72 hours of me reporting and blocking. He sent two more messages and then nothing." The protective steps work because the scammer's economics depend on volume — the perpetrator running this script is targeting dozens or hundreds of victims simultaneously, and a non-paying, non-replying, reporting victim is a deadweight loss. The scammer moves on to the next live target; the silent, blocked victim drops off the priority list within days.
What stops it is the same four steps: do not pay, stop replying, save the evidence, report. For adult victims: file at ic3.gov (FBI Internet Crime Complaint Center) and at reportfraud.ftc.gov (FTC). Use StopNCII.org to remove intimate images from participating platforms (Facebook, Instagram, TikTok, Reddit, OnlyFans, Pornhub, X, Bumble, and dozens more). StopNCII.org generates a hash of the image on the user's device — the image itself never leaves the device — and submits the hash to participating platforms, which then block any matching upload. The TAKE IT DOWN Act (signed May 2025) gives federal-law backing to nonconsensual intimate-image takedown requests, including AI-generated content. If your spouse, partner, or family is being threatened with disclosure, the federal answer is now: report, remove, and recover — not pay.
Red Flags
- Dating-app match wants to move off-platform within 1–3 days
- Video chat or intimate-image exchange suggested early, before any in-person meeting
- Threat references your LinkedIn, employer, family, or spouse within seconds of the exchange
- Payment demanded in Bitcoin, wire transfer, or Cash App
- "Pay $X within 24 hours or it goes to..." pressure framing
Defenses
- Treat any video-chat or intimate-image request from a dating-app match before in-person meeting as a possible script
- If exchange occurred and threats follow: stop replying, block on every channel, screenshot first
- Report to FBI IC3 (ic3.gov) and FTC (reportfraud.ftc.gov)
- Use StopNCII.org for adult intimate-image removal from participating platforms
- Tell your partner / spouse first if relevant — pre-empted shame loses its power; the scammer's secrecy framing is the threat
Typical Money Demanded
Initial demand: $1,500–$5,000 in Bitcoin or wire · Escalation: $10,000+ over multiple "final" payments · 2024 IC3 sextortion-and-extortion total losses: $33.5M across 54,936 complaints (FBI 2024 IC3 Annual Report).
— The lowest-effort variant ignores rapport entirely. It runs as bulk email at internet-marketing scale and depends on a one-in-a-thousand panic response. The threat is fabricated. —
A bulk email claims the sender has hacked the recipient's webcam, recorded compromising material, and will release it unless a Bitcoin payment is sent within 24–48 hours. The email frequently includes a real password the recipient has used in the past — harvested from a public data breach — to make the threat look credible. There is no actual recording. The scammer sends the same template to millions of addresses. Per Krebs on Security and Have I Been Pwned investigations dating to 2018, payment compliance is well under 1% but the volume keeps the campaigns profitable. The Federal answer: do not pay, do not reply, change the password if it is still in use anywhere, enable two-factor authentication, and delete the email.
A representative case: a 45-year-old receives an email with the subject line "Your password is [actual-old-password]." The body claims the sender has installed malware on the recipient's computer, recorded webcam footage of the recipient watching adult content, and will release the footage to the recipient's email contacts unless 0.05 BTC (~$3,000 at 2026 prices) is sent to a Bitcoin address within 48 hours. The password is real — used by the recipient on LinkedIn in 2012 — and is now in the public domain via the LinkedIn 2012 breach republished on Have I Been Pwned. There is no malware. There is no recording. The scammer harvested the email address and password from the breach data, stitched them into a template, and sent the same email to millions of addresses with the password substituted in. Payment compliance on these campaigns is well under 1% — but at scale, even 0.1% is profitable.
The federal guidance on this variant has been consistent since the FTC and FBI flagged it in 2018: do not pay, do not reply, change the password everywhere it is still in use, enable two-factor authentication, and delete the email. The diagnostic that the threat is empty: the scammer never produces the actual footage, never names a specific webcam session, and never demonstrates platform-specific access. If the threat were real, the scammer would have a strong incentive to prove it; the bulk-email variant cannot prove it because there is nothing to prove. Have I Been Pwned (Troy Hunt's free service) lets users check whether their password is in any of dozens of public breach corpora — if your password from this email is listed, that explains where the scammer found it.
What stops it is recognition. If you receive a "your password is X" email demanding Bitcoin, do not reply. Do not pay. Change the password anywhere you still use it. Enable two-factor authentication on every account that supports it. File at reportfraud.ftc.gov and at ic3.gov. Delete the email. The protective sequence is the same as the high-severity variants — only the threat is hollower. r/Scams thread "Phishing/sextortion email sent with my supposed own mail" (3 upvotes, but representative of dozens of similar posts) documents the everyday volume of this campaign; victims who paid almost universally report follow-on demands within weeks, while victims who ignored the email reported nothing.
Red Flags
- Subject line or body contains a real (often old) password of yours
- Claim of webcam footage or screen recording you do not remember being made
- Bitcoin payment demanded with a specific deadline (24–48 hours)
- No specific demonstration of access — no named website, no specific session, no platform-specific identifier
- Email signature looks generic or auto-generated
Defenses
- Do not reply, do not pay, do not click links
- Check haveibeenpwned.com to find which breach exposed your password
- Change the password anywhere you still use it; never reuse passwords across accounts
- Enable two-factor authentication on email, social media, banking, and any sensitive account
- Use a password manager (Bitwarden, 1Password, Apple Keychain) to generate and store unique passwords
- Report at reportfraud.ftc.gov and delete the email
Typical Money Demanded
$500–$5,000 in Bitcoin per email · Sent to millions of addresses; payment compliance well under 1% per Krebs on Security; campaign profitability comes from volume, not yield.
— The newest variant inverts a defining assumption of every previous form. The victim never shared an intimate image. The image exists anyway. —
A scammer takes a clothed, public-facing photo of a victim from social media, runs it through an AI nudification tool, and sends the AI-generated nude image back to the victim with the standard sextortion demands — pay or the image goes to family, friends, school, or employer. The victim never shared an intimate image at any point. Per Thorn's 2025 research, 13% of sextortion victims now report that the perpetrator used AI-generated deepfake imagery rather than real intimate content. The federal response: the TAKE IT DOWN Act, signed May 2025, explicitly criminalizes the nonconsensual online publication or threat of online publication of intimate images including AI-generated ones, and gives federal-law backing to platform takedown requests.
A representative case from r/Sextortion's AI-deepfake survivor threads (including the 70-upvote "(F 20) Someone used my Instagram photo to make a fake AI nude and is threatening me — really worried"): a 20-year-old college student finds an anonymous Twitter / X DM in her requests folder. The DM contains an AI-generated nude image of her — the face is clearly hers (taken from her public Instagram), the body is fabricated. The DM demands $1,000 in Bitcoin within 24 hours or the image will be sent to her professors, her family, and posted on a public revenge-porn site. She has never shared an intimate image with anyone, online or off. The scammer has no real material; the AI-generated image is the only material. The image was generated by feeding her public Instagram photo into one of the dozens of AI nudification tools that proliferated on the open internet between 2023 and 2026.
The protective sequence is the same as the real-image variants — and arguably stronger, because the AI-generation is itself a federal crime under the TAKE IT DOWN Act. The image is fake; the protections are real. StopNCII.org and NCMEC's Take It Down service both accept hashes of AI-generated intimate imagery for removal from participating platforms — Instagram, Snapchat, TikTok, Facebook, OnlyFans, Reddit, Pornhub, X, and dozens more. The TAKE IT DOWN Act requires participating platforms to honor takedown requests within 48 hours. The FBI's IC3 portal accepts AI-deepfake sextortion reports as a sub-category of sextortion. The Department of Justice has begun prosecuting AI-deepfake sextortion under the new federal statute as of late 2025.
What stops it is the same four steps plus one additional protective practice: lock down social-media privacy settings so public photos are not available to scrape. Set Instagram, Facebook, TikTok, and X profiles to private; remove photos that show identifying features (clear face, full body) from public profiles; disable photo tagging by strangers; review and prune followers and friends. The scammer's economics depend on the photo being scrapable; private accounts deny the input. For victims of an existing AI-deepfake threat: do not pay, stop replying, screenshot, report at ic3.gov (or report.cybertip.org if under 18), and use Take It Down (under 18) or StopNCII.org (adults) to hash and remove the AI-generated image from participating platforms. The TAKE IT DOWN Act's 48-hour mandatory-removal window kicks in once the takedown request is submitted.
Red Flags
- You receive a nude image of yourself from a stranger and you have never shared a nude image with anyone
- The face in the image is clearly yours but the body looks subtly off — proportions, skin tone, lighting
- Image has artifacts characteristic of AI generation — repeated patterns, smooth-but-inconsistent skin texture, unusual finger or hand rendering
- Threat references your contacts list, school, or employer (same script as real-image sextortion)
- Payment demanded in Bitcoin or Cash App
Defenses
- Lock down social-media privacy: Instagram private, Facebook friends-only, TikTok private, X protected — deny the scammer the input photo
- Remove identifying photos (clear face + full body) from public profiles
- If a deepfake threat arrives: stop replying, block, screenshot first, do not delete
- Report at ic3.gov (adult) or report.cybertip.org (under 18); the TAKE IT DOWN Act covers AI-generated images under federal law
- Use StopNCII.org (adult) or Take It Down (under 18) for hash-based removal from participating platforms
Typical Money Demanded
$500–$3,000 in Bitcoin initial demand · 13% of sextortion victims in Thorn's 2025 survey reported AI-deepfake variant · TAKE IT DOWN Act (May 2025) mandates 48-hour platform removal once a takedown request is submitted.
— The fifth variant inverts the target. The victim is not the person whose intimate content the scammer claims to have; the victim is the partner, family member, or friend the scammer is asking. —
A scammer impersonates a victim's spouse, family member, or close friend via a spoofed or lookalike email or messaging account, then asks the recipient for intimate photos — framed as an intimate-couple exchange, a romantic-emergency, or in some cases a faked-medical-context request. The recipient sends images to what they believe is their partner; the scammer extracts the images and pivots to extortion against either the recipient or their actual partner. The 294-upvote r/Scams thread "Scammer posing as my wife with a proton e-mail and asking her friends for breast pictures" documents the script's most common tempo.
A representative case from the r/Scams thread above and FBI BEC-adjacent advisories illustrates the script. A 35-year-old woman receives a Proton Mail email from what appears to be her husband's address — close lookalike, one extra letter that is easy to miss on mobile. The email asks if she would be willing to send him an intimate photo for "a special anniversary surprise I'm putting together." She sends one. The next day she receives a separate email from a different address demanding $5,000 in Bitcoin or the photo will be released to her social-media followers and her workplace. The husband never sent the original request; the scammer harvested her email address from his contacts (compromised in a years-old breach), set up a lookalike domain, sent the request, harvested the response, and pivoted. The variant exploits the trust default in spousal communication — the recipient does not verify the request because it appears to come from someone they trust.
The structural defense is the same defense that works against Business Email Compromise: verify any unexpected request through a separate channel before acting on it. If an email purports to be from your spouse and the request is unusual (intimate photos, a money transfer, a sudden change in behavior), call them on the phone number you already have, walk into the next room, send a Slack DM you initiate yourself, or use any channel other than the one the suspicious email arrived on. The scammer cannot intercept a separate channel they did not anticipate; the verification kills the script. The same protective sequence applies if the script has already succeeded: do not pay, stop replying, save the evidence, report to FBI IC3, and use StopNCII.org to remove the image from participating platforms.
What stops it is the verification habit. If a spouse, family member, or close friend asks for something unusual by email or DM — intimate photos, money, a sudden change in plans — verify on a different channel before responding. A real partner welcomes a verification call; a scammer cannot fake one. If the script has already succeeded and you sent images you now regret, the recovery path is the same as the adult dating-app variant: ic3.gov, reportfraud.ftc.gov, StopNCII.org for adult intimate-image removal, and 988 if you need to talk to someone. Tell your actual partner. The scammer's power is the secrecy framing; pre-empted shame loses its power.
Red Flags
- Email or DM from your spouse, family member, or close friend with an unusual request (intimate photos, money, behavior change)
- Sender address has subtle differences from the real address (extra letter, different domain, .net vs .com)
- Request frames secrecy or surprise — "don't tell anyone, it's a surprise"
- Channel is unusual for that person — they normally text, the email arrives via Proton Mail or another platform they don't use
Defenses
- Verify any unexpected request from a trusted contact through a separate channel — phone call, in person, Slack DM you initiate
- Look closely at the sender address — lookalike domains are the diagnostic
- Lock down email security: two-factor authentication, strong unique passwords, phishing-resistant 2FA where available
- If the script succeeded: do not pay, screenshot, report at ic3.gov + reportfraud.ftc.gov
- Use StopNCII.org to remove the image from participating platforms
- Tell your actual partner — pre-empted shame loses its power
Typical Money Demanded
$3,000–$10,000 in Bitcoin per extortion attempt · Volume lower than other variants but conversion rate higher because the social engineering is heavier.
The Numbers (and Where They Come From)
Sextortion is the rare consumer-fraud category where the federal data is unusually consistent across agencies, because three independent organizations track it through different intake paths. The triangulation matters: it confirms the threat scale and the demographic concentration are real, not an artifact of any single agency's reporting.
The 2024 FBI IC3 Annual Report logged 54,936 sextortion-and-extortion complaints with $33.5M in losses — a 59% YoY increase in complaints. The 2025 Annual Report (released Q1 2026) showed continued growth to 75,000+ submissions specifically tagged sextortion-related. Per Thorn's 2025 sextortion research, 90% of financial sextortion victims are boys ages 14–17, and LGBTQ+ teens face double the risk of non-LGBTQ+ peers (36% vs 18%). The FinCEN Notice on Financially Motivated Sextortion (September 2025) instructs financial institutions to flag transactions consistent with sextortion payment patterns — gift-card purchases at unusual volume, Bitcoin transfers from teen account-holders, repeated small-dollar wire transfers to specific recipient countries — and provides typology indicators that have already supported multiple federal prosecutions including the Operation Artemis cases.
📌 Why this category is unusually consequential
Most consumer-fraud categories cause financial harm. Sextortion causes both financial harm and a documented mortality signal: at least 36 teenage-boy suicides linked to financial sextortion since 2021 per NCMEC, with the FBI's Operation Artemis announcement noting that approximately half of the 22 arrested subjects were directly linked to victims who had taken their own lives. The protective conversation parents can have with teens — if something happens you will not be in trouble, come to me, no questions, no consequences, we will report it together — is the single most-cited intervention by NCMEC, the FBI, and the r/Sextortion survivor community. Pre-empting the shame removes the scammer's power. The threats end. People recover. The article you are reading is meant to make that conversation easier to have.
Recovery Reality (and Why the Threats End)
Recovery from sextortion happens in two layers — the immediate threat-cessation layer (days to weeks) and the longer emotional and reputational recovery layer (weeks to months). The threat-cessation layer is consistently fast once the protective sequence is followed. The r/Sextortion subreddit's survivor narratives — including the 78-upvote "Goodbye, a year later I'm moving on," the 119-upvote "I Survived Sextortion — Please Read this if your scared," and the 89-upvote "My guide and advice on how to handle the sextortion and the mental impact" — converge on the same arc: stop replying + report, threats taper within 48–72 hours, scammer moves on within a week, and the survivor's life returns to a recognizable shape within a month or two. The scammer's economics depend on volume; a non-paying, non-replying, reporting victim is dead weight to the perpetrator and gets dropped quickly.
The longer recovery layer is where 988, school counselors, primary-care doctors, and the r/Sextortion community matter most. The shame the scammer engineered does not vanish on the day the threats stop; it fades over weeks as the survivor processes what happened, talks to people they trust, and integrates the experience into a self-narrative that is not defined by it. The community guidance from r/Sextortion's most-upvoted recovery posts emphasizes one consistent message: "It gets better. The threats stop. People recover. You are not the first; you will not be the last." The data agrees. NCMEC's recovery research, the FBI Stop Sextortion campaign's testimonials, and the survivor community converge on the same finding.
🆘 What to Do If You've Been Sextorted
📞 988 Suicide & Crisis Lifeline — Anytime
Call or text 988 for free, confidential, 24/7 crisis support. The line is staffed by trained counselors and is the federally designated crisis resource for anyone in emotional distress. There is no waiting list and no insurance requirement.
🛡 NCMEC CyberTipline — Under 18
If you are under 18 (or reporting on behalf of someone who is): file at report.cybertip.org and call 1-800-THE-LOST (1-800-843-5678). NCMEC's intake team triages reports to law enforcement and provides direct survivor support.
🏛 FBI IC3 — Adult Victims
File at ic3.gov for federal investigation. The aggregated reports drive operations like Operation Artemis even when an individual case cannot be solved on its own. Include screenshots and the scammer's platform usernames.
🖼 Take It Down — Image Removal (Under 18)
Visit takeitdown.ncmec.org — NCMEC's free service that hashes intimate images of minors on the user's device (image never leaves) and submits the hash to participating platforms (Instagram, Snapchat, TikTok, Facebook, OnlyFans, Reddit, X, Pornhub) for blocking.
🖼 StopNCII.org — Image Removal (Adults)
Visit stopncii.org for the equivalent adult service. Same hash-based approach, same participating-platform list, same federal-law backing under the TAKE IT DOWN Act.
📋 FTC ReportFraud — Federal Tracking
File at reportfraud.ftc.gov for FTC consumer-protection records. The reports inform federal alerts and consumer-protection campaigns.
💬 Tell a Trusted Adult / Partner / Friend
The scammer's power is your secrecy. Telling a parent, partner, school counselor, doctor, or close friend kills the power. The conversation feels harder than it is; survivor narratives consistently report relief within minutes of telling someone.
🚫 Ignore Recovery DMs
Within hours of a public victim post, recovery-scam DMs offering to "recover your funds" or "remove the images" for an upfront fee will arrive. Block all of them. The legitimate channels are above; recovery scammers are the parasite layer.
If You're Reporting Outside the United States
Sextortion is global — Yahoo-Boys networks target English-speaking teens across the entire Anglosphere, and the protective steps are universal. Reporting paths exist in every major jurisdiction.
- United Kingdom: Internet Watch Foundation (IWF) for image removal + Action Fraud for the police-side report. The NCA's CEOP command handles online child sexual exploitation; ceop.police.uk is the public-facing intake.
- Canada: Cybertip.ca (the Canadian equivalent of NCMEC, run by the Canadian Centre for Child Protection) and Canadian Anti-Fraud Centre (CAFC) for adult fraud reporting.
- Australia: eSafety Commissioner handles intimate-image takedown requests with statutory authority; Scamwatch (run by the ACCC) handles fraud reporting.
- European Union: Report to your national CERT or police service; Europol's online crime portal aggregates cross-border cases. INHOPE (inhope.org) maintains a directory of national hotlines for child sexual exploitation reporting.
- Ireland: An Garda Síochána Garda National Cyber Crime Bureau + Hotline.ie for image-removal.
- New Zealand: Netsafe for both image-removal and protective advice.
Frequently Asked Questions
What should I do if I'm being sextorted right now?
If I pay, will the scammer stop?
What is financial sextortion?
What is the email-only "I have your password" sextortion?
What if I never sent any intimate images but the scammer says they have AI-generated ones?
Can my photos really be removed from the internet?
Are the scammers ever actually caught?
I'm a parent — what should I tell my teen?
Related Reading
- Recovery Scams — Within hours of any public sextortion-victim post, recovery-scam DMs offer to "recover funds" or "remove images" for upfront fees. They are the parasite layer; block all of them.
- Pig-Butchering Scams — The romance-into-investment variant runs a structurally similar long-form rapport-then-extract script, often through the same dating-app channels.
- AI Voice-Clone Scams — The audio-AI sibling of the deepfake-image variant. Same federal protective stack (TAKE IT DOWN Act, FBI IC3 reporting), different sensory channel.