
August 18, 2025
What to look for in a business email service (and why it matters)
Key features to help you stay organized, write better emails, and keep your data secure.
Learn moreWhen our lives are intricately intertwined with technology, we must be vigilant against the myriad of online threats that lurk in the shadows. One such threat is “sextortion:” It’s a type of phishing attack that harasses victims with the threat that their devices have been taken over, and that a hacker has recorded video footage of their victims’ personal lives.
Learn about the world of sextortion scams and how these malicious schemes work, so you can arm yourself with essential information to protect yourself from losing your personal information or financial resources.
Sextortion is a portmanteau of two words: “sex” and “extortion.” At its core, sextortion involves the act of using sexually explicit or compromising content as leverage to manipulate, threaten, or blackmail the victim. This alarming and deeply invasive form of online exploitation is on the rise, targeting individuals across the globe, regardless of age, gender, or background.
Stay safer online with one easy-to-use app1
1Microsoft 365 Personal or Family subscription required; app available as separate download
In a sextortion scam, a hacker or cybercriminal will contact a victim and claim that over the course of a certain timeframe, they have secretly been watching the victim through a device’s built-in webcam and recording their personal and private lives. Perhaps they have records of the victim visiting adult sites, or they claim to have compromising footage of the victim when they believe that they’re alone at home. The hacker then threatens the victim to pay up in order to protect their privacy and keep this blackmail information secure.
In other forms of sextortion, scammers may strike up a conversation online to gain your trust, establishing a level of intimacy and engaging in what appears to be a genuine connection. Perhaps they express attraction or strong flattery, or they will send racy images to you first in a way to tempt you into doing the same. Once trust is established, the scammer might convince you to share intimate photos, videos, or engage in explicit conversations. Unbeknownst to you, they are collecting this sensitive material with sinister intent. Ultimately, if it sounds too good to be true, it most likely is.
The hacker’s ultimate goal is to coerce you into sending more explicit content or money under the threat of exposing your intimate moments to friends, family, or colleagues. This scam works by convincing you that not only has someone broken into your computer, but they’ve also gained access to your email contacts and can leverage the threat of sending compromising information to those who matter most in your life.
The first step in safeguarding yourself against sextortion scams is to remain vigilant. Use these methods in case you see a suspicious message.
While a gateway to numerous opportunities and connections, our online activity can also be our vulnerability. Scammers exploit this by capitalizing on our digital footprints, extracting personal information and using it as ammunition.
It’s crucial to understand that sextortion goes beyond the threat of exposing explicit content. The emotional and psychological impact can be devastating. Victims often experience anxiety, depression, and fear, leading to severe emotional distress. However, the power to stay safe online lies in your hands, so stay vigilant, learn how to guard your privacy, and seek support if you ever find yourself ensnared in this deeply personal form of blackmail.
The powerful productivity apps and creativity tools in Microsoft 365 just got better. Work, play, and create better than ever before with the apps you love and Microsoft Copilot by your side.
Try for free