The Fake Sextortion Scam: What to Do When You're Threatened

6 min read

1174 words

In today’s digital age, online threats like fake sextortion scams are on the rise, leaving many feeling panicked and vulnerable. If you’ve received a threatening message claiming you’re involved in illegal activity or that sensitive information will be shared unless you pay a ransom, you’re not alone. Understanding how to respond calmly and effectively is key to protecting yourself. Let’s break down what you need to know.

What is the Fake Sextortion Scam?

Sextortion Scam

Hi, today I have some sad news for you.

Your device was infected with my private malware.

Your browser wasn’t updated, in this case, it is enough to just visit a website where my iframe is placed to get automatically infected.

If you want to find out more, Google: Drive-by exploit.

My malware has given me full access to all your accounts, complete control over your device, and it was also possible to spy on you through your camera.

If you think this is some bad joke, no, I know your password:

I collected all your private data and I RECORDED YOU (through your camera) SATISFYING YOURSELF!

After that, I removed my malware to leave no traces, this email was sent from a hacked server.

If you still doubt my serious intentions, it only takes a couple of mouse clicks to share the video of you with your friends, relatives, all email contacts, on social networks, the darknet, and to publish all your files.

You can stop me, and only I can help you in this situation.

The only way to stop me is to pay exactly $800 in Bitcoin (BTC).

It’s a very good offer compared to all the horrible things that will happen if I publish everything.

You can easily buy Bitcoin (BTC) here:

You can send the Bitcoin (BTC) directly to my wallet, or install the free software: Atomic Wallet or Exodus Wallet, then receive and send to mine.

My Bitcoin (BTC) wallet address is: 18dGWwhCC7iMoa3VdRwyUn3ksAmGy9n6ec

Yes, that’s how the wallet/address looks, copy and paste it, it’s (cAsE-sEnSEtiVE).

I give you 3 days to pay.

Since I have access to this email account, I will know if this email has already been read.

After receiving the payment, I will remove everything, and you can live your life in peace like before.

Don’t worry, I keep my promise!

Next time, make sure that your device has the latest security updates.

The sextortion scam is a high-volume email phishing scheme designed to scare you into paying a ransom. The scammer’s script is typically the same:

  • The Accusation: They claim to have infected your device with malware, allowing them to record you through your webcam while you were visiting an adult website.
  • The “Proof”: They claim to have your password or phone number to “prove” they have access to your data.
  • The Threat: They threaten to release this fabricated video to all of your email and social media contacts within a short timeframe (usually 24-48 hours).
  • The Demand: They demand payment in untraceable cryptocurrency like Bitcoin, promising to delete the footage upon payment.

The reality? In over 99% of cases, the scammer has no video at all. They are playing a numbers game, sending thousands of these emails in the hope that a small percentage of recipients will be scared enough to pay.

How to Deal with a Sextortion Email: Your Step-by-Step Plan

Your response is critical. Follow these steps precisely to handle the situation safely and effectively.

  1. DO NOT PAY. This is the golden rule. Paying the scammers does not guarantee they will go away. In fact, it marks you as a willing victim, and they may come back demanding more money. Remember, they likely don’t have a video to delete.
  2. DO NOT REPLY. Do not engage with the scammer in any way. Replying to the email confirms that your account is active and that you’ve read their message, which can lead to more scam attempts.
  3. SECURE YOUR ACCOUNTS IMMEDIATELY. This is the most important practical step you can take. Change the password for the email account that received the message. Because these scammers often use passwords from old data breaches, it’s wise to change the password for any other important account that might have used the same or a similar one. Enable Two-Factor Authentication (2FA) on all your critical accounts (email, banking, social media) for an extra layer of security.
  4. DOCUMENT AND REPORT. Take a screenshot of the email for your records. Then, report the incident to your local law enforcement and the FBI’s Internet Crime Complaint Center (IC3) at ic3.gov. Also, report the email as phishing/spam through your email provider (Gmail, Outlook, etc.). This helps them block the sender and protect other users.
  5. DELETE THE EMAIL. Once you’ve documented and reported it, delete the email. Do not click on any links or download any attachments.

Common Fears and Questions Addressed

It’s normal to feel terrified and have specific questions about the threats made in the email. Let’s break them down.

Should I Ignore Sextortion?

Yes and no. You should ignore the scammer’s demands and threats by not paying or replying. However, do not ignore the situation entirely. Take it seriously by following the steps above: secure your accounts and report the attempt. Think of it as “ignoring the scammer, but not the problem.”

Should I Be Worried About a Sextortion Email?

It’s completely understandable to be worried—that’s the reaction the scammers are counting on. However, you should shift your mindset from panic to caution. This is a mass-produced, generic threat. The scammers have no specific information about you beyond what they’ve bought from old data lists. They are trying to intimidate you with shock value, not with genuine, targeted surveillance.

The Sextortion Email Includes My Old or Current Password!

This is the scariest part for many people and it’s what makes the threat feel real. But here’s how they got your password: it wasn’t from hacking your computer. It was almost certainly from a massive data breach from years ago (like LinkedIn, Adobe, or other services you may have used). Scammers buy huge lists of these old email/password combinations on the dark web for pennies and use them to add credibility to their scams. This is why changing your passwords is so crucial.

The Sextortion Email Includes My Phone Number!

Just like your password, your phone number was likely obtained from a separate data breach, a people-search website, or through software that scrapes public information. It does not mean they are tracking you in real-time. It’s simply another piece of data they use to make their threat seem more personal and credible.

You Are in Control

Receiving a sextortion scam email is a jarring experience, but knowledge is your best defense. By understanding that it’s a high-pressure bluff and taking clear, decisive action, you strip the scammers of all their power.

Remember: Do not pay, do not reply, and secure your digital life. You’ve got this.

By Rose DesRochers

When it comes to the world of blogging and writing, Rose DesRochers is a name that stands out. Her passion for creating quality content and connecting with her audience has made her a trusted voice in the industry. Aside from her skills as a writer and blogger, Rose is also known for her compassionate nature.

Leave a Reply

Your email address will not be published. Required fields are marked *