Blog

Sextortion

Prevent Facebook Messenger Sextortion

Recent studies have found that messaging platforms are the second-most common starting point for sextortion. Facebook is the largest social network, and its Messenger chat platform trails only WhatsApp and WeChat in monthly active users. With these figures in mind, it’s important to understand how to prevent Facebook Messenger sextortion. Keep reading to learn how you can keep yourself safe on the platform.

Identifying the Issue: Prevent Facebook Messenger Sextortion Before It Starts

The first and largest battle in your effort to prevent Facebook Messenger sextortion is recognizing these schemes before they develop. This is a task that is easier said than done, but one that is very possible nonetheless. By learning the commonalities of sextortion and safe online practices, you can position yourself to safely use platform.

Common Red Flags of Facebook Messenger Sextortion

Sextortion is often conducted by organized cybercrime groups based overseas. They follow scripts similar to cold calling, leading to common tactics popping up across different scams. These parallels can help you recognize and prevent Facebook Messenger sextortion.

  • Unsolicited Messages. Any message in your inbox that you didn’t initiate or expect should be assessed with caution. Think about it — how often do you send messages to random people online?
  • Suspicious Profiles. Although it’s an exciting prospect, it’s unlikely that a wealthy, attractive individual is looking for love on Facebook chat Messenger. You should also be wary of unusual account behavior, such as weird posting habits or unnatural friend lists.
  • Fast Movers. It’s not uncommon to connect with someone online and hit it off early on in the conversation. However, what is unusual is passionate declarations of love in the beginning stages. Sextortionists often “love bomb” their targets.
  • Unusual Requests. It should be alarming if anyone online begins making requests for money, gifts, or personal information. In the case of sextortion, the request is for explicit content under the guise of an attractive suitor.

Practices That Can Help Prevent Facebook Messenger Sextortion

Knowing that sextortionists inhabit Facebook Messenger may deter you from using the platform. However, it is possible to avoid these criminals without having to delete the app. In addition to knowing what to look for, there are measures you can take to prevent Facebook Messenger sextortion.

  • Optimize Your Security Settings. Set your account to private and limit who can reach you through Facebook Messenger. You can do this under “Privacy and safety” in your account settings.
  • Avoid Oversharing. If you choose to send intimate content, do so with extreme caution and confirm the recipient’s identity. But avoiding oversharing also means not posting or sending personal information online.
  • Protect Your Passwords. Use strong, unique passwords for each online account and keep them private. Update your passwords regularly and consider the benefits of a password manager. You should also enable two-factor authentication (2FA) whenever available.
  • Don’t Click Suspicious Attachments. It’s never a good idea to click links you don’t know the destination to, especially from an unfamiliar sender. Sextortionists and other cybercriminals often embed malware in messages as a gateway to their target’s device.

What is Meta Doing to Prevent Facebook chat Messenger Sextortion?

Over recent years, Meta has implemented many new features to help users prevent sextortion on Facebook and Facebook Messenger. This effort has been made in coordination with multiple internet safety organizations.

Take It Down Tool

Meta collaborated with the National Center for Missing and Exploited Children (NCMEC) to create and expand the “Take It Down” Tool. The tool helps minor victims of sextortion remove their intimate content and prevent it from being reshared. This is done by assigning a unique hash to the image that is detected if the image is reshared.

The tool was initially released in 2023 and was available in English and Spanish. However, Meta and NCMEC extended the reach of the tool in 2024 by making it available in 25 languages. In their press release announcing the expansion, Meta said this will make the tool accessible to millions more teens.

Collaborating with Thorn

Meta teamed up with Thorn, a nonprofit working to improve cybersecurity for minors, to improve their sextortion guidance page. The resource aims to provide victims with guidance on how to proceed if they are targeted by a sextortionist. It also includes ways you can help a loved one who is experiencing the crime. The page can be found within the Sextortion Hub of Meta’s Safety Center.

Messenger Restrictions for Minors

Messenger has several features in place to help prevent sextortion that are automatically turned on for users under 18. One of these is nudity blur on photos. This feature blurs any nude content on the receiving end and issues a warning to the sender to be cautious when sharing such content.

Furthermore, accounts flagged for potential scammer activity will have their messages automatically delivered to the “hidden requests” folder. Warning messages will be sent to users who are already messaging potential scammers. Additionally, adults will only be able to message teen accounts they’re connected with. The message option won’t appear for potential sextortion accounts, even if they are connected already.

“Staying Safe from Online Harm” Curriculum

On Safer Internet Day 2025, Meta partnered with Childhelp to create an educational cyber safety module for middle schoolers. The curriculum is available for free online and discusses how to recognize and prevent sextortion and other forms of child exploitation.

Other contributors include the NCMEC, Thorn, the Department of Homeland Security, Purdue University and the Crimes against Children Research Center. This service provides guardians and educators with the tools to educate the children in their care — from lesson plans to engaging videos and activities.

Creating a Safe Future: Prevention Through Education

After reading this article, you’ve already taken a huge step in your effort to prevent Facebook Messenger sextortion. However, the job is not finished. Cybercriminals are constantly evolving, and you need to keep up with them.

Continual research and education are required to remain on the forefront of the best practices in cybersecurity. Much like a history textbook becomes outdated, cybersecurity information is constantly being improved and expanded upon.

Luckily, there are experts who are working just as hard to provide up to date information and create a safer digital realm for everyone. At Cyber Investigation Inc., we are constantly adding to our database of educational material. Our blog page is a great place to find the latest expert advice.

And if you are ever faced with sextortion on Facebook Messenger, we can help you gather the evidence you need to fight back. You can call our Facebook Messenger Sextortion Helpline any time of day to speak with our specialists and regain control.

Read More
Snapchat Nude Scam

In recent years, Snapchat has become one of the most popular apps for sharing pictures and videos. Users can share snapshots of their lives on the platform for a finite amount of time. However, this unique function creates an opportunity for scammers to exploit users with the sextortion nude scam on Snapchat. Keep reading to learn how the scam works, red flags to watch out for, and what to do if you fall victim.

How Does the Snapchat Sextortion Nude Scam Work?

Snapchat is known for its disappearing feature, making it a popular social media platform among young adults. Users can limit how long a Snap is visible, and messages and stories disappear after 24 hours.

However, this feature has also made it a hotbed for cybercrime, especially the sextortion nude scam. Perpetrators convince users to send compromising photos or videos and then use them as leverage for extortion. This is typically carried out by someone pretending to be a friend or romantic interest.

Then, the scammer threatens to share the photos or videos with the victim’s contacts unless they pay up. With a lot of victims feeling like they do not have any options, they end up paying the criminals. Once this happens, they become entrapped in the scammer’s vicious cycle.

It is essential to protect your privacy, and being aware of potential scams is crucial in today’s online landscape. This is especially true on social media platforms like Snapchat. And if you do happen to fall victim, remember you have options.

Red Flags of the Snapchat Sextortion Nude Scam

Recognizing the red flags is an essential skill for anyone to have, especially when using applications like Snapchat. It’s important to pay attention to signs that might indicate a person you are chatting with is a scammer. Below, our experts listed some tips to spot these scammers’ red flags.

  1. Unknown Friend Requests. If you’re receiving a friend request or message on Snapchat, it may be from someone you do not know. It is important to be cautious and take the time to evaluate who the person might be before responding.
  2. Conversation That Moves Quickly. Take caution if someone starts messaging you constantly and showering you with incessant “love bombs”. These are both common tactics by online scammers to gain your trust, and you should proceed with caution.
  3. Requests for Personal Information. Be wary of being asked to send personal pictures or videos, especially by someone you have just met online. Remember, once something is online, it’s out of your control.
  4. Accounts That Look Suspicious. There are elements of a legitimate account that are hard to fake. Check their Snap Score, Stories, and even their Snap Map location. If their information is not adding up, they may not be who they say they are.

What to Do if You Fall Victim to a Snapchat Sextortion Nude Scam

Sometimes, prevention isn’t enough. Sextortion nude scams on Snapchat have targeted victims from all backgrounds and levels of internet literacy. However, there is hope for a successful recovery. Our experts have assisted thousands of clients faced with Snapchat sextortion nude scams, and here’s what they suggest.

  • Do Not Pay. Some may feel that the asking price is worth their privacy. However, paying a sextortionist will not make them go away. In fact, it typically perpetuates the threats and does nothing to prevent exposure. It’s never a good idea to pay a cybercriminal or take them at their word.
  • Keep the Line Open. Victims often assume that blocking the sextortionist is the best move. However, blocking can lead to retaliation, and you won’t be able to track the perpetrator’s actions. It’s best to leave them unblocked and use delay tactics while you seek assistance.
  • Gather Evidence. You will want to document the sextortionist’s Snapchat account, threatening messages, and timestamps of the interaction. You’ll be able to recreate an accurate timeline of the crime using this evidence. This is necessary to legally combat the sextortionist.
  • Secure Your Account. You should check your sessions and log out of any devices you don’t recognize. Update your password and enable two-factor authentication (2FA) if you haven’t already. You should also increase your privacy settings to limit who can interact with you.
  • Notify the Authorities. With the evidence you’ve gathered, file a formal statement of the crime with the proper authorities. You should inform both Snapchat and law enforcement of the sextortion nude scam. We provide an in-depth breakdown of this process in our article on reporting sextortion nude scams on Snapchat.

Real-World Cases of Snapchat Sextortion Nude Scams

Like learning about any topic, real examples can be beneficial to better understand sextortion nude scams on Snapchat. Tangible examples display different tactics used by perpetrators and the corresponding responses of victims. Looking back on them allows us to learn what approaches are effective in combating these schemes.

English Backpacker Targeted by Snapchat Sextortionist

21-year-old Charlie Wade had recently reached Perth on his global backpacking trip when he received a new friend alert. He hadn’t had the chance to socialize in the new space, so he was excited to have some companionship.

The account, going by “Amelia”, quickly asked to exchange nudes. Wade expressed shock but went along with his new friend’s request. But once he pressed send, “Amelia” dropped the façade and threatened to send the images to his online contacts.

The perpetrator demanded £500 to keep the photos private. Wade initially tried to send the money, but the transaction was declined. After this, he decided to block the perpetrator. He has continued his life since then, but the sextortionist did eventually leak the photos.

Wade has gone on to share his story and spread awareness of Snapchat sextortion nude scams. He’s met fellow victims, one of which sent £1,500 and still had their nudes leaked. This example shows how calculated sextortionist’s approach can be, like targeting a traveler in an unfamiliar place. It also demonstrates the potential ramifications of paying or blocking the scammer.

Australian Teen Victimized by Deepfake

Mateo Veneracion was 19 years old when he was added by a stranger on Snapchat. Not thinking anything of it, he engaged the account. However, the interaction quickly took a turn for the worse. The account created a deepfake nude of Veneracion and even claimed that he’d sent it to a minor.

The perpetrator threatened to send the image to Veneracion’s family and friends if he didn’t send them $500. They sent messages such as “I’ll make you more miserable than you can even think of” and “I’ll make you think until you die.”

Veneracion expressed extreme emotional distress, despite knowing the images were fake. The scam caused intense fear and anxiety, prompting him to say, “I’ve never felt so hopeless in my life.”

He even discussed having considered paying the perpetrator, a response Commissioner for Consumer Protection Trish Blake advises against. It’s not clear how Veneracion resolved his case. However, this example still serves as a valuable reminder that anyone can be targeted, explicit content can be manufactured, and you should never pay the sextortionist.

How to Avoid a Snapchat Sextortion Nude Scam in the Future

Whether you’ve previously fallen victim or not, it’s important to be proactive with your Snapchat security. The threat of a sextortion nude scam on Snapchat will never go away, but you can safeguard yourself. Our experts suggest you take the following measures.

  • Avoid Oversharing. You shouldn’t share personally identifiable information online. This includes your home address, place of work, and travel habits.
  • Vet Your Friends. There is a sense of validation that comes with a high friend count. But unless you’re using the account professionally, it’s best to be selective.
  • Be Selective with Sexting. It’s safest to abstain from sexting completely. If you do choose to participate, verify the recipient and ensure it’s someone you trust in real life.
  • Stay Informed. Cybercriminals are always adapting their tactics. You need to continue growing your cybersecurity knowledge, and you can start by checking out our blog.
  • Trust Your Gut. If your new friend seems fishy, end the interaction. It’s better to cut off an innocent internet stranger than continue speaking with a sextortionist.

And if you need additional assistance with a Snapchat sextortion nude scam, reach out to Cyber Investigation right away. Our team is trained in online sextortion and has the know-how to handle your case discreetly. You can contact our Snapchat Sextortion Helpline 24/7 to speak with one of our specialists.

Read More
Leak Nudes

Nothing can truly prepare you for the moment you see your nudes shared online. The uncertainty of the exposure, wondering if friends, family, or coworkers have seen the content, can be overwhelming. The shock can trigger a flood of thoughts and emotions, leaving you unable to decide what to do next. Despite everything you may be experiencing, protecting yourself from further abuse is the top priority. Continue reading to learn everything you need to know to take action after non-consensual intimate image abuse.

How Nudes Get Leaked

The perpetrators can be anyone: friends, family members, partners, acquaintances — and of course, strangers. However, most victims of non-consensual intimate image (NCII) abuse know their offender. According to a report from the Revenge Porn Helpline, almost 60% of identifiable perpetrators in NCII abuse cases were current or former partners.

Many instances of victimization stem from sexting. After engaging in a sexually intimate relationship, partners or former partners may feel slighted by a conflict in the relationship and retaliate by sharing nudes. Another common way nudes are shared is through unauthorized access to your device or accounts, either in-person or via hacking.

What Happens If My Nudes Get Leaked?

Unfortunately, having your nudes posted online can affect many areas of your life — like your relationships, career, and reputation. The platform used to share the nudes plays a vital role in how it will impact you.

Social media is a common platform for NCII abuse. While most platforms have community guidelines against nudity for public posts, these rules do not apply to direct messages. Perpetrators can exploit this by sending NCII content directly to the victim’s followers or friends.

On Twitter/X, for example, sexually explicit posts do not necessarily go against community guidelines. This allows cybercriminals to publicly share NCII material with minimal pushback from the platform since it struggles to differentiate between consensually and non-consensually distributed content. There are, of course, sexually explicit websites where this content can be hosted as well. These websites are more difficult to work with, which can make removing the content challenging.

What to Do If Your Nudes Get Leaked

Whether you are panicking or frozen in shock, your feelings are valid and normal to have. It’s extremely common to panic in the midst of having your intimate images exposed. However, this can often lead to hasty decisions that are not the best for your situation. There are actions you can take to protect yourself and mitigate the damage from the leaked nudes. However, you will need to act with urgency.

Infographic with 9 steps to take if your nudes get leaked, including don't blame yourself, identify leak source, remove content, secure accounts, preserve evidence, report to authorities, use victim support, talk to someone, and work with digital investigators

Don’t Blame Yourself

Revenge porn is a crime and a complete betrayal of trust. However, it’s normal to feel guilty after being betrayed. Victims often blame themselves when their nudes are leaked. However, it is never their fault that someone else invaded their privacy. Many of these criminals use emotional manipulation and vulnerabilities to gain the trust of unsuspecting victims only to exploit that confidence.

Assess Where the Leak Came From

Before you can take steps to protect yourself, you need to identify where the leak came from. We’ve discussed the most common perpetrators of NCII abuse. Based on the content that was shared along with other contextual details, you can narrow down if this was a former partner, someone you know, or a stranger. Once you have a good idea of how it was shared, you can take the proper steps to protect yourself.

Get Your Nudes Removed

Many online platforms and search engines have built-in tools that help victims get NCII content removed. Social media platforms have a reporting system that allows users to notify the platform about content that violates their community standards. Search engines like Google also have a content removal form specifically for NCII abuse, which can remove offending links from Google Search results.

Update Your Privacy and Security Settings

The uncertainty around how your nudes were leaked highlights the importance of victims securing their accounts and devices and protecting themselves from further abuse. Making your online profiles private can help prevent strangers with harmful intentions from targeting you with a scheme.

You should also enable two-factor authentication wherever possible. This setting can prevent account takeovers — even if your login credentials are compromised. The cornerstone of online security is passwords. In the modern age, passwords need to be complex and unique to keep your information safe.

Preserve All Evidence

When it comes to what to do if someone posts your nudes, protecting yourself is important — and so is taking action against your offender. Whether the perpetrator is anonymous or not, preserving the evidence of NCII abuse is essential to holding them accountable. Be sure to take screenshots of any communication with the attacker and the profile that originally shared the images or videos. You can also look for any evidence of account breaches, including the date and time they occurred, to establish a possible timeline of events.

Report to Law Enforcement

Reporting the NCII abuse to the authorities is always recommended when asking what you should do if someone shares your nudes. The police can help you file an official report that includes your collected evidence and helps build a case against the cybercriminal responsible.

For anonymous perpetrators, some local police departments have cybercrime units that specialize in cases like NCII abuse and can investigate the incident to uncover the offender’s identity. The FBI also has the Internet Crime Complaint Center (IC3), the national hub for reporting cybercrimes. Filing a report to the IC3 not only helps the FBI track trends, but they can also collaborate with international law enforcement agencies to pursue perpetrators — even if they are located outside of the U.S.

Use Victim Support Resources

There are many non-profits and online tools created to support victims and provide help on what to do if someone shares their nudes. Here are the main resources to look into:

  • Cyber Civil Rights Initiative (CCRI): A non-profit that supports victims of NCII with legal guidance, a 24/7 hotline for emotional support, and educational resources.
  • StopNCII.org: A global tool that allows victims to submit the content being posted without their consent and have it removed from certain social media platforms and websites.
  • National Domestic Violence Hotline: A free and confidential service that focuses on domestic abuse but also supports victims of NCII. You can call, chat online, or text the hotline to get in contact with a live advocate.

Talk to Someone

Being a victim of NCII abuse can be devastating on many levels. There is a lot of distress, fear, anger, and anxiety that can come from being exposed. However, what can make things harder is facing all of it alone. Talking to someone during this experience can alleviate the overwhelming emotions you are feeling. It can also help calm your mind, allowing you to make informed decisions. This person can be a trusted friend, family member, therapist, or advocate at a non-profit.

Identify the Perpetrator with Digital Investigators

The criminals responsible for NCII abuse tend to hide behind anonymity. This protects them from being held accountable and allows them to operate in secrecy. However, cybersecurity experts can investigate anonymous incidents and trace the exposure back to its original source. Using digital forensics, they can trace the digital footprint to the culprit’s geolocation and, in some cases, identify the perpetrator. The findings from the digital investigation can be used as evidence in court proceedings against the offender.

What to Do When Nudes Leak? Call Cyber Investigation for Help

Cyber Investigation has a team of cybercrime experts that know exactly what to do if your nudes are leaked. Using state-of-the-art technology, we can follow the digital trail of NCII abuse to its original source through methods like metadata analysis and IP tracking, which can help uncover the criminal’s geolocation. From there, we can work to identify the perpetrator and use their exposed identity as leverage to pressure them into removing the NCII content and stopping any further abuse.

We also work quickly to remove any private content that was posted online without your consent and offer an ongoing monitoring service that tracks any further postings after the initial incident has been handled. At Cyber Investigation, we provide all of this and more to protect your online reputation and to mitigate any damage from exposure. You don’t have to experience this alone. Reach out today and let our experts help you through it.

Read More
Report Sextortion on Snapchat

Snapchat is among the most popular social media platforms, especially among young people. While sharing photos and videos with friends can be a lot of fun, certain risks are associated with using the app. One of the most dangerous is sextortion, where a scammer threatens to release compromising images or videos if the victim does not pay up. Keep reading to find out all you need to know on how to report sextortion on Snapchat.

Snapchat Safety Features

Before we dive into the specifics of reporting sextortion, it is imperative to understand some of the safety features already built into Snapchat. For example, the app allows users to block and report other users. This means that if someone is harassing you or sending you inappropriate content, you can take action to make sure they cannot contact you anymore. Snapchat also has a “Report a Safety Concern” feature, which allows users to report potential security or privacy issues to the app’s team.

Another great feature is Ghost Mode, which lets you keep your location hidden from possible scammers. Without Ghost Mode set, anyone can easily see your location by scrolling over the snap map. Another handy feature is 2-factor authentication, which adds an extra layer of security to protect your account from scammers. Overall, Snapchat offers a variety of benefits to enhance your user experience.

How to Track a Snapchat Scammer?

If a sextortion scammer on Snapchat has targeted you, you may wonder if there is any way to track them down and report them. Unfortunately, it can be challenging to do this, as many scammers use fake usernames, profiles, and locations to avoid detection. However, there are some steps you can take to try and identify the scammer.

  1. First, screenshot any photos the scammer sent without notifying them. Use privacy tools like Private Screenshots or the screen recorder on your phone.
  2. Once you have taken a screenshot, then you are going to run it through a reverse image search on Google. This can uncover other accounts the scammer may be using.
  3. Next, you can check their location. Check the Snapchat map to see if the criminal has left their location sharing on. Scammers often operate from different countries, such as Nigeria, the Philippines, or Ivory Coast.
  4. Finally, comb through their friends and followers on your other social media profiles. Scammers commonly follow their fake accounts with their real profiles to appear more legitimate.

By taking these additional steps, you can protect yourself from scammers and avoid falling prey to their tricks.

How to Report Sextortion on Snapchat?

If you are a victim of sextortion on Snapchat, it is vital that you report it immediately to protect yourself and others. The good news is that there are many steps you can take to do just that. First and foremost, report the incident directly to Snapchat by navigating to the “Support” section of the app and selecting “Report a Safety Concern.” Be sure to provide as much detail as possible, including relevant screenshots or other evidence. Rest assured that Snapchat takes these reports seriously and thoroughly investigates all incidents.

Furthermore, reporting the crime to the FBI’s Internet Crime Complaint Center is crucial. This will assist law enforcement in tracking down and prosecuting the person responsible. Finally, it is a good idea to report the crime to your local authorities and contact friends and family for additional support during this difficult time. Remember, speaking up can safeguard yourself and prevent others from becoming victims in the future.

Summary:

Sextortion is a serious issue, and it is something that everyone who uses Snapchat should be aware of. However, by taking the steps outlined in this post, you can protect yourself from scammers and report any incidents to Snapchat. Remember always to be cautious online and never give in to the demands of a sextortion scammer. By working together, we can make Snapchat a safer and more enjoyable place for everyone.

Cyber Investigation is here to help! If you or someone you know needs additional information on how to report incidents of sextortion on Snapchat, contact our sextortion helpline! Our expert team is dedicated to providing you with the necessary resources and guidance.

Read More
Should I Block a Sextortionist?

Victims of sextortion experience a flood of thoughts and emotions while reading the threats on their screen. One question that is universally asked is, “Should I block a sextortionist?” The answer is mixed among online responses. Search results often deliver a decisive “Yes”, but doing so can potentially leave you in ruin. Blocking serves as an immediate means of cutting them off, but it won’t remove their ability to expose you. Keep reading to learn if you should block a scammer.

Online advice often tells you to block a sextortionist immediately, but be careful with it

Online advice often tells you to block a sextortionist immediately, but be careful with it

Should You Block a Sextortionist?

Our experts advise against blocking a sextortionist — at least right away. Many people think that blocking is an effective method for preventing further abuse. After all, blocking the perpetrator removes their access to your account.

However, this does not guarantee your attacker will not be able to reach you entirely. Blackmailers don’t always give up if you ignore them and may follow through on their threats. Furthermore, the negative ramifications of blocking can far outweigh any benefits of blocking.

Why Do So Many Results Suggest Blocking?

Many resources, especially AI-fueled responses, suggest blocking the sextortionist. This advice stems from the idea that a blackmailer can hurt you if they can’t reach you. Unfortunately, limiting a cybercriminal is not as simple as clicking block. What seems like a simple solution could actually expediate the scam. Where these suggestions and others based on them fall short, we are here to mend the gaps.

Potential Ramifications of Blocking

After asking yourself, “Should I block a sextortionist?”, the natural follow-up question is “Why shouldn’t I block a sextortionist?” Below are the reasons our analysts advise against it.

Loss of Evidence

If you block a scammer, you run the risk of permanently deleting critical evidence. As we will cover below, the entire interaction holds valuable evidence. You can use this data to identify the perpetrator and hold them accountable.

Blocking their account will delete the conversation and any evidence it contains. Even digital forensics professionals might be unable to retrieve this data.

Retaliation

Some suggest you block a sextortionist because they believe they will simply move on to a more willing victim. While this does happen, there are also cases with less appealing results. Cybercriminals are unpredictable and may act irrationally if they feel they are losing control. The perpetrator may have personal motives, such as a disgruntled former partner.

Some victims may read this and feel undeterred by the risk of exposure. However, it’s important to understand that risk does exist. You should consider the suggested path of stalling for time and seeking professional assistance.

Left in the Dark

This is arguably the worst consequence if you block a scammer. Blocking them leaves you completely unaware if they decide to follow through on their threats. The stress of not knowing can be as detrimental to your wellbeing as the fallout from potential exposure. Furthermore, it can elongate the exposure since you will be unable to respond if you don’t know it occurred.

Real-World Consequences of Blocking a Scammer

In one case shared to Reddit, an anonymous WhatsApp user was being targeted by a scammer on the platform. They expressed that the platform issued some warning after they selected the block option. However, they were not made aware the entire chat would be deleted. The user noted irony in WhatsApp support’s suggestion to report the instance to law enforcement after deleting the evidence.

Another user detailed an experience that included a barrage of spoofed texts and calls after blocking a scammer. These included messages designed to appear as if they came from a fellow victim of the scammer. The onslaught came just moments after blocking the scammer. These are just a couple examples of how blocking the perpetrator can worsen the victim’s situation.

What Do Our Experts Suggest Instead of Blocking?

We’ve told you that the answer to “Should I block a sextortionist?” is no. You are now probably wondering what you should do instead. Don’t worry, we have you covered. Our experts recommend you take the following response toward sextortionist, blackmailers, and other online scammers.

Use Delay Tactics

At this point, you understand that you should never pay a sextortionist. However, you want the sextortionist to believe that you are willing to cooperate. If the sextortionist believes they cannot get money out of you, they may release your content in retaliation. This is why our experts suggest using delay tactics. They allow you to maintain contact without divulging any further funds or information.

The key to a good delay tactic is to be creative, yet realistic. You will want enough details that it doesn’t sound like a lie off the top of your head. However, too many minute details can make your claim feel scripted. Some phrases you can use to buys yourself some time include:

  • “I don’t get paid until Friday.”
  • “I need time to gather funds/sell items.”
  • “My account is frozen, and the bank said it could take a few days.”
  • “I tried setting up a crypto wallet and it will take a few days to verify.”

Secure Your Network

Regardless of what information the blackmailer has, you’ll want to make sure your device and accounts haven’t been compromised. Check your network for any unusual or unauthorized behavior. You should also run a reputable malware scan on your devices.

Additionally, take time to increase the privacy settings on any online accounts that the perpetrator could access. You should regularly update all of your passwords and use strong, unique passwords for each account. Use two-factor authentication (2FA) whenever it’s available for an extra layer of protection.

Collect Evidence

You will need proof of the crime that has been committed against you. Take the time you’ve gained through delay tactics to record the details of the attack. You should store this evidence on a separate, secure device. Name the files in a way that allows you to easily identify what each piece of evidence represents.

You should document the following variables of the crime:

  • The profile or contact information of the perpetrator.
  • Any images, files, attachments, or other content that was shared.
  • Any threatening or relevant messages.
  • Timestamps of when these exchanges occurred.

This may pose issues to individuals handling the investigation on their own. There is often crucial evidence that is inaccessible to the average internet user. It can be a huge help to seek the services of professional cyber investigators.

Get The Help You Need

Cybersecurity experts can help you gather evidence hidden within the code of your online interactions. They use proprietary tools and technology to execute techniques like IP tracking and metadata analysis. This can uncover critical evidence such as the geolocation, device network, and identity of the criminal.

Furthermore, expert cyber investigators will ensure your evidence is properly collected, documented, and preserved. They follow a strict chain of custody to maintain the integrity of their report. Each step is documented so the findings of the report are admissible as evidence in legal proceedings.

At Cyber Investigation Inc., we base our advice on our experience handling these cases. We recommend that you avoid blocking the scammer if you plan to proceed with a professional investigation. If you plan to handle the case alone, we still suggest you collect evidence before blocking. It’s ultimately your decision, and you should act as you see fit.

Read More
Should I Ignore Sextortion Emails

It’s a quiet afternoon and you’re relaxing on your computer when you see an email you would never expect. It makes an unsettling claim: the sender has been secretly tracking your activity and recording you through your webcam. They allegedly have compromising footage and promise to expose it unless you pay $1,000 in Bitcoin. You’re startled and baffled, wondering what footage they could have. You consider responding, but you also ask yourself: Should I ignore a sextortion email?

Sextortion is a rapidly growing cybercrime that is a threat to people of all ages worldwide. Awareness of sextortion is becoming essential in the digital age, especially when it comes to sextortion emails.

What Are Sextortion Emails?

Phishing scams are most often associated with email, while social media scams are commonly linked to catfishing and sextortion. However, sextortion via email is becoming more common.  Criminals take a different approach to carrying out sextortion through email. Instead of luring victims into a fraudulent relationship, perpetrators will immediately issue threats, whether they have leverage or not.

The Pegasus Email Threat

Pegasus spyware is a tool sold only to governments and nation-states to aid cybersecurity surveillance. However, sextortion emails will claim the perpetrator has obtained Pegasus spyware and accessed the victim’s data for months. The perpetrator suggests that the victim was secretly recorded in an embarrassing act and uses that for extortion. This is all an effort to push the recipient into a panic.

However, it’s important to note that these claims are often complete fabrications. They send this email hoping that the claims match up to the circumstances of a victim’s real life. Sextortionists attempt to force the victim to see meeting the financial demands of the criminal as the only solution.

Making Fake Threats Seem Credible

Sextortionists don’t just rely on empty threats to induce panic. They will also use manipulative tactics to make their claims seem convincing. In some of the more personalized sextortion emails, criminals will research the home address associated with a victim and attach a Google Maps screenshot to the email. Others may include a password that was exposed in a past data breach linked to your email. These details are meant to trick you into believing that they have compromised your devices, even when they’re secure.

Using Malware

Sextortionists may use emails designed to coerce victims into compliance. However, the intention can also be to trick victims into giving the cybercriminal access to their sensitive data. Perpetrators often claim possession of incriminating footage and may include an attachment or link with the supposed “evidence.” But the attachment or link is actually just malware, waiting to be downloaded onto your device. When a victim clicks on the link or attachment, they put their actual sensitive data at risk of exposure.

Common Phrases Used in Sextortion Emails

Sextortionists will use similar scripts, sending the same email to large amounts of people. The most common variation is known as the “Hello Pervert” email because it typically opens with that greeting. From there, the email typically uses shaming language to claim that they possess incriminating footage of you. The effectiveness of these emails relies on the recipient’s lack of awareness of their tactics. To help you recognize them, we’ve compiled a list of phrases typically found in these emails.

  • “I want to inform you about a very bad situation for you.”
  • “Have you heard of Pegasus?”
  • “It’s been a few months since I installed it on your devices.”
  • “I’ve recorded many videos of you.”
  • “Every number in your contact list will receive these videos of you.”
  • “This message was sent from your own Microsoft account.”
  • “You have a sick perversion.”
  • “I doubt you’d want your friends, family, and co-workers to know about it.”
  • “I can destroy your life in a second.”

Why Am I Being Targeted?

Gone are the days when someone actually needed your private information to extort you. Now, anyone can be a target for sextortion. If you’ve received one of these emails, it’s likely that your email appeared in a previous data breach. Scammers will use exposed email addresses in their mass spam campaigns to target victims. However, in some cases, a sextortion email could come from someone you know with more personal motives. You can verify if your email address has been exposed by visiting Have I Been Pwned.

Should I Ignore a Sextortion Email?

While sextortion emails may contain false claims, they still should not be ignored. You need to be proactive to protect your privacy and help put a stop to the sextortionist’s schemes. Many victims of sextortion emails feel compelled to immediately block the sender. However, this can worsen the situation if the claims are actually true. If you ignore a sextortion email and the threats are real, the attacker may expose explicit content in retaliation. The same is true if you block them. It’s important to verify the claims or threats before deciding what to do next.

How to Respond to Sextortion Emails

So, if you aren’t supposed to ignore a sextortion email, what should you do? How victims respond to sextortion emails is an important factor in what the outcome will be. It can also factor into whether the sextortionist will continue operating without consequence. There are best practices for victims to follow to protect themselves and maintain their peace of mind. Here are the best steps to take if you’re being targeted with a sextortion email.

  • Do not click any links or attachments. Sextortionists will often include links or attachments that inject malware onto your device when opened. Then, they will gain access to your sensitive data and anything compromising.
  • Verify the claims safely. Perpetrators typically allege to have recorded you performing explicit acts while watching adult content. However, it should be straightforward to verify the possible truth of these claims. Is any of the evidence provided? Does the email feel copied and pasted? You should also check your devices for any malware or unauthorized access.
  • Preserve the evidence. Take screenshots of the email and the header details. Keep the original message in a safe location like a special folder or archive. Make sure to also take note of date, time, and any actions you subsequently took.
  • Use delay tactics. In cases where the threats or demands are fabricated, it makes sense to ignore a sextortion email. However, any real threat needs to be handled strategically. You can use delay tactics to buy time before a deadline will need to be met. Make sure the excuses are believable, such as “I have to wait until I get my next paycheck” or “I have to get the money together.” Delay tactics are effective when you are also seeking out assistance from experts or law enforcement in the meantime.
  • Report to the email provider. You can report the email to the provider to help them improve the filtering of spam. Providers may also block a particular email address, domain, or IP address if enough users report the sender.
  • Notify the authorities. The local police are an essential resource for victims of sextortion. They can help you file a report, documenting the crime officially. The local authorities can also help you verify the validity of the threat. If a cybercrime unit is present, they may even launch an investigation into the criminal responsible for sending the email.
  • Work with cybersecurity experts. Private cybersecurity firms can help you verify if a threat is credible immediately. They can also scan your devices for any malicious programs and help strengthen your security. Certain firms specialize in protecting victims of sextortion from exposure, even detecting and removing non-consensual postings off the internet. Many of these experts, like the ones at Cyber Investigation Inc., offer immediate support. This ensures that victims can get help at any time.

If you have received a sextortion email and aren’t sure what to do next, reach out to Cyber Investigation Inc. We have experts available 24/7 to provide professional support. Contact us today to speak with one of our specialists.

Read More
Should You Ignore Sextortion on Facebook?

One of the most common responses to sextortion on Facebook is to simply ignore it. Victims will delete messages or block the sextortionist in hopes that the criminal was making empty threats. However, this is not the most effective way to respond to sextortion. In many cases, ignoring the perpetrators will only make the situation worse. We’ve created a resource that addresses three of the most common questions about responding to sextortion: Do sextortionists follow through? Can sextortion ruin your life? And should you ignore sextortion on Facebook?

Do Sextortionists Follow Through on Facebook?

A 2023 survey found that 42% of sextortionists do follow through, even if the victim pays. This may look like an alarming number. However, the likelihood of exposure depends on many key factors. Take note of the following determinants.

  • Vulnerability of the victim. Celebrities, politicians, and high net worth individuals are often targeted by sextortionists. Perpetrators are also more likely to make good on their threats toward these individuals since they heavily value their reputation.
  • Targeted attacks. If a sextortionist is targeting you, they have likely invested time to research you and your close connections. This increases the likelihood that they’ll directly share the compromising content with those people if their demands are not met.
  • Likelihood of compliance. Entertaining the attacker’s demands in messages or sending them money is never a good idea. Compliance of any kind will only bolster the criminal to continue sending their threats.
  • Type of incriminating content. Some scammers will use AI deepfake technology to create fake explicit content to threaten victims. They may also threaten to use compromising content that does not clearly show your face or other identifiable features. This content is not as incriminating and can reduce the risk of exposure.
  • Impulsiveness of the sextortionist. There is no telling how likely an anonymous sextortionist is to make good on their threat. These criminals can be impulsive and unpredictable, releasing the content out of anger or vindictiveness.
  • The victim’s response. How the victim responds to the sextortionist can increase or decrease the likelihood of exposure. There are best practices victims can follow to protect themselves in case they are targeted. When it comes to the question of should you ignore sextortion on Facebook or not, it’s important to be proactive and strategic in your response.

Can Sextortion on Facebook Ruin Your Life?

It is possible for sextortion to ruin your life, but that is not often the case. Even in cases of exposure, there are tools that can quickly remove the content from certain platforms. However, sextortionists do want their victims to believe that they can ruin their lives. That’s why they will make malicious threats against the victim’s reputation to induce panic. It’s important to be aware of possible ramifications while also knowing the scare tactics sextortionists use.

Career

Sextortionists are aiming to cause extreme emotional distress and they will often threaten your career to cause that. Using LinkedIn or other investigative methods, they will look for co-workers or supervisors to coerce you into compliance. Public-facing careers, such as teachers and police officers, are also more vulnerable to sextortion. These careers value reputations and how they can reflect on their institutions.

Financial Ruin

Victims should never pay a sextortionist. Not only does it communicate that you have the money to pay, but it also signals that you are susceptible to their threats. Unfortunately, many victims pay the sextortionist to maintain their online reputation, losing thousands of dollars. There have been cases where victims have exhausted their life savings to appease sextortionists, with the demands continuing indefinitely.

Personal Relationships

The main threat that sextortionists will make is toward the victim’s relationship with family, friends, and peers. They will research the target to discover the online accounts of their close connections, threatening to send the explicit content directly to them. On Facebook, they may even create a group chat with your friends for more leverage. In many cases, perpetrators will send explicit content to some followers or in group chats before moving onto another target.

Should You Ignore Sextortion on Facebook?

Many victims feel compelled to completely ignore threats of sextortion out of extreme anxiety. They often will block the sextortionist on Facebook. However, this can lead to devastating consequences. Sextortionists can notice when they are blocked and may publicly expose the explicit content in retaliation.

So, should you ignore sextortion on Facebook? While not responding to the sextortionist is a good step, not taking any further action is a common mistake. There are additional steps you should take to ensure the incident is reported and protect yourself — even if exposure occurs.

What Should You Do When Facing Sextortion on Facebook?

We’ve covered whether you should ignore sextortion on Facebook or not. Now, let’s walk through what you should do when facing sextortion. Follow these steps to protect yourself and respond to sextortion effectively.

  • Keep communication open with the criminal. When considering should you ignore sextortion on Facebook, it’s best to leave the line of communication open. However, you shouldn’t engage any of their demands. Instead, our experts suggest using delay tactics to stall for time while you connect with the proper experts.
  • Preserve all the evidence. You need evidence of the sextortion in order to report the crime to law enforcement. You can take screenshots of messages, the profiles involved, and anything else that is relevant.
  • Report the user on Facebook. Sextortion goes against Facebook’s community standards. Users can report the user on the platform along with posts or messages. Make sure to report the perpetrator, as it can lead to account removal.
  • Notify the authorities. Your evidence can be used to file a report with local law enforcement. The report will be officially documentation of the crime, which can support future legal actions. You should also report the crime to the FBI’s Internet Crime Complaint Center (IC3). The FBI has federal jurisdiction and connections to law enforcement in other countries.
  • Work with cybersecurity experts. Experts at private cybersecurity firms can work to protect the privacy of victims and mitigate the damage of any exposure. They also offer services to investigate and unmask the criminal responsible.
  • Reach out for emotional support. Being a victim of sextortion is overwhelming to go through, especially on your own. It’s important to confide in a trusted friend, family member, or a counselor to alleviate some of the emotional burden of the incident.

Tulsa Victim Speaks Out: Should You Ignore Sextortion on Facebook?

In 2024, a woman named “Jane” received a text message from the hacker group that calls themselves “Anonymous”. The message demanded that she pay 1K Bitcoin within an hour or else they will post explicit images on her Facebook. There was also a file attached. Jane responded with “Whatever, you’re bluffing,” and clicked on the link. The link contained multiple images.

However, minutes later, the file appeared in the comments of her Facebook posts. Jane then deleted the comments and made her profile private. What Jane didn’t know is that clicking the link granted the hackers access to her device and any images on it. Jane decided to file a report with her local police department about the incident.

How to Protect Yourself on Facebook

Facebook provides multiple tools for users to prevent being targeted by sextortionists in the first place. You should also follow online safety practices to protect your privacy from scammers. Here is how you should protect yourself on Facebook.

  • Lock down your account. Scammers will often scour the platform for possible targets. Make your account private to limit the exposure of your profile.
  • Be cautious with friend requests. Catfishers will begin relationships with targets on Facebook with unsolicited friend requests and messages. You need to stay vigilant when accepting and responding to message requests.
  • Adjust privacy settings. Facebook allows users to control who can message them or view their profile details, friends list, and posts.
  • Avoid sharing intimate content. Sharing explicit content online is always a huge risk. Even though sexting is common, there is no telling what the person on the other end will do with the content. Even if you are messaging a significant other, a falling out can lead to sextortion years later.
  • Strengthen security settings. Make sure your password is complex and two-factor authentication is enabled. You can also check if your password has been exposed by visiting Have I Been Pwned.
Read More
Report Sextortion on Instagram

Instagram’s entire platform revolved around sharing photos and videos. Their logo is a camera, after all. As with many platforms where exchanging media is possible, sextortion has become a growing problem on Instagram. The evolution of generative AI and deepfake technology has made sextortion possible in cases where no intimate content was shared. As a result, all users need to be aware of the risks of Instagram sextortion and how to report it.

How Sextortion Occurs on Instagram

The scam typically kicks off with the perpetrator contacting you through a fake account created with fabricated details and stolen images. A more technically-savvy sextortionist may even compromise the account of a trusted individual. Regardless, they often begin buttering you up by using the information they’ve learned from your profile to appeal to your interests.

Things quickly become steamy as the perpetrator begins aggressively flirting before proposing the idea of exchanging nudes. Instagram allows users to share images both publicly and in private DMs, making this possible without having to switch platforms. The sextortionist may even send a fake or stolen image to initiate the swap.

Once the victim agrees to send an intimate photo, the curtain is pulled back and the perpetrator’s true intentions become clear. They begin threatening to expose your nudes unless you pay them. They may send you a screenshot with a drafted message containing your content ready to be sent to a group chat with your followers. What’s more, they may opt to post your content publicly.

How Does Instagram Help Sextortion Victims?

Instagram has tools in place to allow victims to report sextortion on the platform and receive help and support from dedicated resources. Furthermore, they are currently testing new features to be implemented that will expedite this process.

Tools to Prevent NCII Abuse

  • Take It Down Tool: Meta was one of the founding members of Take It Down, a tool run by the National Center for Missing and Exploited Children (NCMEC). The tool helps remove intimate images of minors and prevent their resharing, and it can be accessed through Instagram’s platform.
  • org: Similar to Take It Down, StopNCII.org is a tool for adult users who have had their nudes shared non-consensually. Likewise, Instagram provides an avenue for users to access this tool within the platform.
  • Lantern: Instagram is a participant in the Lantern program, an initiative to connect technology companies and allow them to share intel on sextortionists across platforms. This is integral since many perpetrators operate through numerous accounts on multiple online networks.
  • Blurred Content and Warnings: Instagram is preparing to roll out features that blur nude content in direct messages and warn recipients prior to opening. Additionally, users will be warned before sending explicit content. These features will be automatically enabled for minors, and adults will be prompted to enable them.
  • Sextortion Account Detection: Instagram is also developing technology that recognizes accounts that are participating in sextortion-related activities. Direct Messages from these accounts will be sent straight to the recipients hidden requests folder. Furthermore, minor accounts will not be reachable by flagged accounts.

How to Report Instagram Sextortion: Who Should Victims Inform?

Victims of Instagram sextortion need to act quickly to notify the proper authorities of the offense. This helps mitigate the damage and connects the victim with resources who can help them take action. Furthermore, it allows law enforcement and social media providers to gain insight into the latest cybercrime trends, creating a safer environment for all users.

Reporting Options on the Platform

Instagram provides an avenue for users to report profiles and shared content on the platform. The reporting process varies slightly for each, so we will cover the processes below:

  • Reporting an Account:
    • Open the profile you wish to report
    • Click the three dots next to their username
    • Select the ‘Report’ option
    • Follow the on-screen instructions and submit your report
  • Reporting a Post:
    • Open the post containing your intimate photos
    • Click the three dots above the post
    • Select the ‘Report’ option
    • Follow the on-screen instructions and submit your report
  • Reporting a Direct Message:
    • Open the chat and hover over the message you’d like to report
    • Click the three dots next to the message
    • Select the ‘Report’ option and choose the reason which best fits your situation
    • Follow the on-screen instructions and submit your report

Reporting to Law Enforcement

  • Local Police: As with any cybercrime, you should begin notifying the authorities by filing a report with your local police precinct. They may be able to help if your sextortionist is within close proximity to you. If not, you’ve successfully ruled out a local threat and have valuable documentation of the crime committed against you.
  • National Agency: Your next step should be to inform your national law enforcement agency. In the United States, the FBI is responsible for fielding reports of cybercrime. You can file a report at your local FBI field office or online through their Internet Crime Complaint Center (IC3).

How Professional Investigators Can Help

Dealing with the emotional toll of Instagram sextortion is exhausting enough on its own. Having to collect evidence, maintain the chain of custody, and produce the findings in accordance with regulations is a tall task for one individual to handle — if at all possible.

This is where professional digital investigators can be a huge asset. These experts can investigate your case, using advanced techniques like IP-tracing and metadata analysis to uncover the culprit and prove their guilt.

Reputable investigation firms will document their entire process, which ensures that the chain of custody is preserved. Your report can then be used to build your case and serve as evidence in future legal proceedings.

Staying Safe Moving Forward: How to Protect Yourself Online

Unfortunately, the threat of Instagram Sextortion is never a zero-risk. As new safety features are implemented, creative cybercriminals will find a way to work around them. This doesn’t mean you can’t enjoy the platform and feel secure in your interactions. Be mindful of these suggested practices to increase your safety and enjoyment on Instagram:

  • Increase Your Privacy Settings: Set your profile to private, limit who can reach you through DMs, and heavily vet your followers. We understand that a high follower count can feel like a symbol of social status, but it’s not worth the risk for accounts that aren’t run for business.
  • Use Strong Passwords: Use unique passwords that use a combination of cases, numbers, and special characters and update them regularly. You should also enable two-factor authentication (2FA) on Instagram and any online platforms that provide the option.
  • Avoid Oversharing: Instagram is like a window into your life. You wouldn’t leave the curtains drawn and the window open for anyone to enter your home. Instagram is much the same. Avoid revealing personal information to limit your potential exposure on the platform.
  • Trust Your Gut: If something feels off about an interaction online, listen to your instincts and end the conversation. It is possible that the person on the other end could be harmless, but the presence of sextortionists on the platform requires a zero-trust approach.
Read More
Do Sextortionists Follow Through?

Victims of sextortion are flooded with a variety of intense thoughts and feelings. As their head spins and they try to digest the situation at hand, one question stands out above the rest: “Will they actually follow through?” The answer is not cut-and-dried. There are many factors at play that can alter the exposure risk. Read on to learn if your sextortionist will follow through, what could cause or deter them from doing so, and what you can do to protect yourself.

Will Your Sextortionist Follow Through?

Unfortunately, there is no foolproof answer to the question of whether your sextortionist will follow through. Some studies have shown as low as 10% of perpetrators follow through, while others have found as high as 45% carry out their threats. However, the chances of a sextortionist following through are heavily dependent on the victim and how they respond.

What Causes a Sextortionist to Follow Through?

Whether a cybercriminal follows through with sextortion threats depends on several variables. Our team has determined that the following four factors can increase the risk of the victim’s content being exposed:

  • The Victim: The social status of the victim can heavily determine the exposure risk of a sextortion threat. If the victim is a celebrity or a high-profile individual, the sextortionist may be more inclined to follow through due to the potential reputational damage it would cause.
  • Previous Compliance: If a victim meets the sextortionist’s demands, it creates an expectation for future payments. It can also push sextortionists to follow through as a means to ramp up their attacks.
  • Confrontation: Many sextortion victims try to push back against their assailant through their digital conversations. It is natural to feel angry after receiving such threats. However, responding confrontationally may drive them to release the content in retaliation.
  • Hasty Decisions: Cybercriminals are unpredictable and ruthless in their pursuit of your money. They can act irrationally if they sense you will not comply, and this may lead them to impulsively release their leverage.

What Deters a Sextortionist from Following Through?

  • Loss of Leverage: The entire sextortion scheme is contingent upon leveraging the threat of exposing the victim’s content. If the perpetrator follows through on their sextortion threats, they can no longer hold the content over their victim’s head.
  • Increased Chance of Being Caught: By releasing the content, the sextortionist adds another crime to their record: non-consensual intimate image (NCII) abuse. With federal laws like the TAKE IT DOWN act, there is a higher risk of being held accountable if they follow through.
  • Professional Assistance: Working with cyber security experts can help you obtain the evidence necessary to get your sextortionist to back off. Through advanced techniques, these experts can uncover the identity and location of the perpetrator. This information can then be used to encourage them to abandon their attack.

The Role of Online Platforms

If a sextortionist does follow through on their threats, they need a platform to spread their victim’s intimate content. Some platforms have put in place safeguards with various degrees of success. Others provide little-to-no support for victims of NCII abuse.

Platforms that Enable Sextortion Follow Through

  • WhatsApp: The messaging platform fails to provide content controls, allowing for exposure without any blurring or warning. Instead, WhatsApp currently relies on users to flag and remove accounts associated with sextortion, which can take time and is often ineffective.
  • Discord: Gaming platforms were the fourth-highest entry point for sextortion, according to a 2025 Study from Digital Forensics Corp. As one of the most popular gaming communication platforms, Discord servers allow explicit images to be shared and received without any preventative measures. Users have to inform Discord administrators of the situation to prevent nude leaks on the platform.
  • Twitter/X: The social media network does not have any safety procedures in place that would prevent exposure through the platform. Currently, the only option for victims is flagging the posts and the sextortionist’s account to the system administrator.

Platforms that are Taking Action Against Sextortion

  • Meta: The social media conglomerate employs AI-based filters on both Instagram and Facebook to detect and blur explicit media and issue a “sensitive content” warning. However, it does not stop the recipient from viewing the post. Instead, they require users to flag the content as NCII abuse for it to be removed and utilize hash-based matching tools to prevent its resharing.
  • Snapchat: Snapchat also uses AI-powered detection to flag and warn users before viewing explicit content. However, it does not prevent viewing unless the recipient is a minor or has parental controls enabled.
  • TikTok: The video platform is one of the only social media networks where sextortion follow-through cannot occur. The social network prevents the sharing of any sexually explicit media — consensual or otherwise. Additionally, they have implemented safety features that issue warnings for links that lead to external exposure sites.

What You Can Do When Facing Sextortion

  • Cut off Communication: Avoid blocking the sextortionist until you’ve completed your investigation, but don’t engage them any further besides stalling for time. Never indulge their demands, as this only emboldens them to push further.
  • Collect Evidence: Take screenshots of any information that could potentially reveal the perpetrator’s identity and any messages or content that will help you reconstruct the timeline of events.
  • Report the Sextortionist: Inform law enforcement and the platform administrator of the crime that has been committed. Doing so can hold the criminal accountable and prevent them from harming you or others in the future.
  • Ask for Help: We know that sextortion is an extremely embarrassing and isolating crime. However, you don’t need to face it alone. Talking to your family, friends, or a trusted professional can take some of the weight off your shoulders.

Resources for Victims: Who Can Help if Your Sextortionist Follows Through?

Sextortion is something no victim should ever have to face alone. There are numerous resources available that can help victims respond to sextortion and have their intimate content removed from the internet. They include:

  • Take It Down: This free online tool is designed to help victims of sextortion remove images of them that were taken when they were under 18 years of age. The tool uses hash-based matching to remove such images and prevent their resharing.
  • StopNCII.org: Similar to “Take It Down”, StopNCII.org is a hash-based matching tool for adult victims of NCII abuse. Operated by the Revenge Porn Hotline, the tool has helped remove over 200,000 intimate images with a removal rate above 90%.
  • Cyber Investigation Inc: Our experts see cases like this every day. Through proprietary technology and advanced techniques in metadata analyses and IP-to-location, we can uncover the identity of the perpetrator and initiate the deletion of your private data.
Read More
How to Deal with Facebook Sextortion

If you’re using Facebook, you need to be vigilant. Sextortion is growing at a rapid pace, and Facebook is one of the largest platforms for the crime. The social media giant is plagued with billions of fake accounts. In fact, Facebook estimates that 3% of their monthly active users are fake accounts. Though some of these fraudulent profiles are harmless, many of them are run by sextortionists just waiting to target their next victim. So, how do you protect yourself from Facebook sextortion, and how can you deal with it if you’re being targeted? Continue reading to find out.

How Does Sextortion on Facebook Work?

Sextortion is when a person threatens to expose someone else’s explicit images or videos unless the victim meets their demands. On Facebook, sextortionists will use a fake profile with stolen images or an account impersonating someone you know. They will initially use the profile to send you a friend request and a direct message, showing interest in you. Once you engage with their message, they begin spinning a deceptive web disguised as an authentic connection.

Gaining Your Trust

At this stage, the main goal of a sextortionist is to gain your trust. They will weaponize excessive flattery, provide constant attention, and fake emotional vulnerability to create the illusion of a deep connection. Mirroring is also a common manipulative tactic by perpetrators, adapting their interests, beliefs, and life experiences to match the victim’s.

After enough trust is built with the victim, they will attempt to fast-track the relationship to an intimate level and move the conversation off Facebook to instant messaging platforms. Many of these messaging platforms have less oversight, ensuring that there is no disruption to their scheme.

A Cruel Trick

This is when the sextortionist will suggest trading explicit images or videos, typically offering to go first to dispel any suspicions. However, this is their cruel trick. They lure unsuspecting users into sending explicit images or videos of themselves, at which point they drop their friendly façade and threaten to publicly expose the content. The only way they offer to keep the content private is if the victim meets their demands.

How To Deal with Facebook Sextortion

When your privacy is weaponized against you, it creates a sense of violation, betrayal, and fear that can have long-lasting effects. Victims may feel a loss of control over their own body image and personal life. If you are dealing with Facebook sextortion, you may feel isolated, helpless, and afraid. However, you can take back control. Here are some steps to take when facing sextortion.

  • Do Not Cooperate: A sextortionist will have demands that they want you to meet. They will also expect a response to their threats. However, you should never comply with the perpetrator and instead cease communication when the threat of sextortion is made. Any further responses will only encourage the culprit to continue targeting you.
  • Preserve Evidence: Cybercrime experts in law enforcement and private firms rely on evidence to perform an investigation. That’s why it’s essential to preserve the proof of sextortion. You can do this by taking screenshots of the messages and profiles used, along with anything else that is relevant to the case.
  • Notify the Platform: Facebook has an anonymous, built-in system for reporting any behavior that violates their community standards. Threats of sextortion can be flagged on the platform, and in many cases, Facebook will respond by removing the account.
  • Notify the Authorities: Local law enforcement is an essential resource for victims of sextortion. They can help you file an official complaint, which may be used to launch an investigation or serve as evidence in future court proceedings.

How Widespread Is Sextortion on Facebook?

Facebook has transformed into a hub of online activity, offering functions like Marketplace, Dating, and Groups for community building. However, all these features have also provided scammers with more ways to lure in potential victims. A key statistic comes from a 2024 Sextortion Study from Digital Forensic Corp.

The private security firm analyzed 1,000 sextortion cases in late December 2024. Of the sextortion cases that originated on social media platforms, 42% of them were traced back to Facebook. Sextortion has become one of the fastest growing cyber threats, and Facebook is one of the primary platforms used to commit the crime.

How Facebook Is Addressing the Rise in Sextortion

Meta has been combating sextortion and non-consensual intimate image abuse on their platform for close to a decade. In 2017, Meta partnered with Thorn to launch ‘Stop Sextortion’, a guide for sextortion victims, and to create educational articles about sextortion on Facebook’s Safety Center.

Meta also co-founded Lantern, the first cross platform signal-sharing program for online platforms to improve enforcement on child safety policies. The program brings tech companies together to investigate the activity of predators across platforms, allowing these platforms to uncover the full picture of harm.

Preventing the Spread of Intimate Image Abuse

Meta has taken many steps to fight intimate image abuse, but one of the most effective initiatives was supporting tools that proactively prevent the spread of nudes.

  • For those under the age of 18, Meta co-founded the Take It Down tool, a platform run by the NCMEC to get rid of and prevent the reposting of CSAM on online platforms.
  • For those over the age of 18, Meta has continued to support StopNCII.org, a tool created by the Revenge Porn Helpline to get rid of non-consensual intimate images and videos posted online.

Removing Fake Accounts

To reduce the number of scammers, Facebook is using automated systems to identify and get rid of fake accounts preemptively. In both the second and third quarters of 2024, they took action against over a billion fake accounts, many of them created with malicious intent.

Meta is also using investigative methods to discover malicious accounts before they can do harm. In the summer of 2024, Facebook found over 7,000 assets on the platform that were linked to a small group of Nigerian scammers. Despite all these efforts, Facebook sextortion has continued to rise and is only becoming more of a problem.

How to Stay Protected While Using Facebook

Facebook has been taking proactive steps to combat sextortion and scammers on their platform. They have also implemented many safety features to prevent scammers from reaching users. Consider the following tips on how to stay protected while using Facebook.

  • Lock Down Your Account: Make sure your profile is set to private to limit who can view your posts. You can also limit who can send you friend requests by enabling the ‘Friends of Friends’ setting. Lastly, make sure your ‘Friends List’ is set to be viewed by ‘Only Me’. These privacy settings lower your risk of being targeted.
  • Be Cautious with Friend Requests and Messages: Perpetrators will send unsolicited messages and friend requests to hundreds of people, looking for anyone to respond.
  • Enable Two-Factor Authentication (2FA): If your password gets compromised, 2FA protects your account from being taken over. Make sure you have it enabled in your settings for extra protection.
  • Stay Up to Date on Sextortion: Our blog at Cyber Investigation Inc. is full of educational articles that inform internet users of what they need to know about cybercrime. You’ll find valuable resources on how to prevent, respond to, and recover from sextortion as well as other common scams. Visit our blog to stay aware of the sextortion trends and the latest developments in cybercrime.
Read More