Sextortion scams differ from targeted sextortion in that they are industrialized. Perpetrators purchase breach data containing email addresses and passwords, then send millions of emails claiming to have recorded the recipient via their webcam. Most of these claims are false — no actual intimate image exists — but the psychological impact is significant. Recipients are told their contacts, family, or employer will receive the video unless they pay. Estimates suggest the industry generates hundreds of millions of dollars annually. The FBI advises recipients not to pay. If actual intimate images exist and have been posted, the TAKE IT DOWN Act provides a removal pathway.

Key facts about this term

  1. Most mass sextortion scams are bluffs Industrialized sextortion campaigns typically do not possess actual intimate images. They use breach data (your email and an old password) to appear credible. Do not pay.
  2. Targeted sextortion is different and more serious If a perpetrator has sent you a real image, the threat is targeted and not a mass scam. This requires both law enforcement reporting and content removal action.
  3. Forward scam emails to the FBI's IC3 Even if you did not pay, reporting sextortion emails helps law enforcement track criminal networks. Report at ic3.gov.

Frequently asked questions

My email appeared in the sextortion message — does that mean they hacked my webcam?

Almost certainly not. Perpetrators purchase breach databases containing billions of email-password pairs. The inclusion of your email or old password is meant to create credibility, not evidence of actual access.

What if someone I know received the same threat?

Mass sextortion campaigns reach millions of people simultaneously. Your contacts likely received the same message. The best response is to ignore, not pay, and report to the FBI's IC3.