Skip to main content
Microsoft 365
October 13, 2023

Sextortion Scams: a deeply personal approach to blackmail

When our lives are intricately intertwined with technology, we must be vigilant against the myriad of online threats that lurk in the shadows. One such threat is “sextortion:” It’s a type of phishing attack that harasses victims with the threat that their devices have been taken over, and that a hacker has recorded video footage of their victims’ personal lives.

Learn about the world of sextortion scams and how these malicious schemes work, so you can arm yourself with essential information to protect yourself from losing your personal information or financial resources.

A sign at a protest that reads “Save Our Internet”

Understanding sextortion

Sextortion is a portmanteau of two words: “sex” and “extortion.” At its core, sextortion involves the act of using sexually explicit or compromising content as leverage to manipulate, threaten, or blackmail the victim. This alarming and deeply invasive form of online exploitation is on the rise, targeting individuals across the globe, regardless of age, gender, or background.

Microsoft Defender Banner
Microsoft 365 Logo

Microsoft Defender

Stay safer online with one easy-to-use app1

1Microsoft 365 Personal or Family subscription required; app available as separate download

Learn more

In a sextortion scam, a hacker or cybercriminal will contact a victim and claim that over the course of a certain timeframe, they have secretly been watching the victim through a device’s built-in webcam and recording their personal and private lives. Perhaps they have records of the victim visiting adult sites, or they claim to have compromising footage of the victim when they believe that they’re alone at home. The hacker then threatens the victim to pay up in order to protect their privacy and keep this blackmail information secure.

In other forms of sextortion, scammers may strike up a conversation online to gain your trust, establishing a level of intimacy and engaging in what appears to be a genuine connection. Perhaps they express attraction or strong flattery, or they will send racy images to you first in a way to tempt you into doing the same. Once trust is established, the scammer might convince you to share intimate photos, videos, or engage in explicit conversations. Unbeknownst to you, they are collecting this sensitive material with sinister intent. Ultimately, if it sounds too good to be true, it most likely is.

The hacker’s ultimate goal is to coerce you into sending more explicit content or money under the threat of exposing your intimate moments to friends, family, or colleagues. This scam works by convincing you that not only has someone broken into your computer, but they’ve also gained access to your email contacts and can leverage the threat of sending compromising information to those who matter most in your life.

“Our online presence, while a gateway to numerous opportunities and connections, can also be our Achilles’ heel. Scammers exploit this vulnerability by capitalizing on our digital footprints, extracting personal information and using it as ammunition.”

How to protect yourself from sextortion scams

The first step in safeguarding yourself against sextortion scams is to remain vigilant. Use these methods in case you see a suspicious message.

  • Be aware. Learn the techniques to recognize phishing scams via email or phone, as this is the easiest way for bad actors to get into your system. Be cautious when engaging with strangers online, especially if you don’t recognize the conversation starter or they quickly push for intimate conversations or photos.
  • Guard your privacy. Protect your personal information and be selective about what you share online. Be sure to update your passwords regularly with a powerful password generator that can create strong, unique passwords for your accounts, and be wary of the information you disclose.
  • Report the message or scammer. You can forward phishing emails to the Federal Trade Commission (learn how here). Use Outlook’s built-in phishing reporting tools to send suspicious messages to Microsoft, so that Outlook can better understand how to detect and filter out malicious emails.
  • Seek support. If you become a victim of sextortion and are concerned that your privacy might be breached, remember that you’re not alone. Reach out to law enforcement, a trusted friend, or a counselor who can provide guidance and support during this challenging time.

While a gateway to numerous opportunities and connections, our online activity can also be our vulnerability. Scammers exploit this by capitalizing on our digital footprints, extracting personal information and using it as ammunition.

It’s crucial to understand that sextortion goes beyond the threat of exposing explicit content. The emotional and psychological impact can be devastating. Victims often experience anxiety, depression, and fear, leading to severe emotional distress. However, the power to stay safe online lies in your hands, so stay vigilant, learn how to guard your privacy, and seek support if you ever find yourself ensnared in this deeply personal form of blackmail.

Get started with Microsoft 365

It’s the Office you know, plus the tools to help you work better together, so you can get more done—anytime, anywhere.

Buy Now

Topics in this article

Microsoft 365 Word, Excel, PowerPoint, Outlook, OneDrive, and Family Safety Apps
Microsoft 365 Logo

Everything you need to achieve more in less time

Get powerful productivity and security apps with Microsoft 365

Buy Now

Explore Other Categories