SPUScam Prevention University

Sextortion Scam

Scammers threaten to release fake or stolen intimate material unless paid.

Severity: HighPrevalence: CommonLast Updated: 2026-02-10
Sextortion Scam visual placeholder

Channels

Target Audiences

How It Works

Victims receive an email or message claiming that a hacker has accessed their webcam and recorded them in compromising situations. The scammer often includes a real password (from a data breach) to seem credible. They demand payment – usually in Bitcoin or another cryptocurrency – threatening to send the alleged recordings to the victim's contacts. In most cases, no actual recording exists; the scammer is bluffing. However, in some variants, the scammer may have actual intimate images obtained through catfishing or hacking.

Red Flags

  • Claims of hacked webcam – generic emails claiming "I've been watching you" are almost always mass-sent scams.
  • Generic threats – the message doesn't contain specific details about you (beyond perhaps an old password), indicating it's a template sent to thousands.
  • Payment demands in cryptocurrency – legitimate organizations never demand payment in Bitcoin to resolve issues.

Protect Yourself

  • Don't engage or respond – replying confirms your email is active and may lead to more targeting.
  • Cover webcams when not in use as a general privacy practice.
  • Use strong, unique passwords for every account and enable 2FA – if a password in the email is one you still use, change it immediately.

Visual Examples

Sextortion Scam email placeholder
Channel example: email
Sextortion Scam messaging placeholder
Channel example: messaging

What To Do If You've Been Scammed

  1. Do not pay – paying does not guarantee the scammer will stop and may encourage further demands.
  2. Change any passwords mentioned in the email and enable two-factor authentication on those accounts.
  3. Report the extortion to police and to the National Cyber Directorate (hotline 119 in Israel).

Related Scams