Network

Home / ACC Tip / Sextortion email playbook

Victim of cybercriminals? Report your incident to help prevent further attacks.

Sextortion email playbook

Receiving a sextortion email can be alarming.

The message may claim that your device was hacked, your webcam was accessed, and private recordings were captured. It usually threatens to send the supposed footage to your contacts unless you pay money, often in cryptocurrency.

These emails are designed to create panic and pressure victims into paying quickly.

In most cases, the claims are false.

Understanding how sextortion emails work makes them much easier to handle.


What a Sextortion Email Typically Looks Like

Most sextortion emails follow a predictable script.

They may claim that:

Your computer was infected with malware
Your webcam recorded private activity
Your browser history was captured
Your contacts list was copied
A video of you was created

The message then demands payment to prevent the release of the material.

Payment is usually requested in cryptocurrency.


Why These Emails Feel Convincing

Sextortion emails often include psychological tricks.

Common tactics include:

Urgent deadlines
Threats of sending content to friends or coworkers
Technical language to appear credible
Mention of a password from an old data breach

Sometimes attackers include an old password from a previous breach to make the message appear legitimate.

In reality, this password was likely obtained from leaked databases.


Key Signs the Email Is a Scam

Look for these warning signs.

The email contains generic accusations without real evidence.
The message was sent to many recipients using the same script.
No actual video or screenshots are attached.
Payment is demanded in cryptocurrency.
The sender claims total device control but cannot demonstrate it.

These messages are mass spam campaigns.

Thousands of identical emails are sent hoping a small percentage will panic and pay.


What Attackers Actually Know

In most cases, the attacker does not have access to your device.

What they may have:

Your email address
A password from a past data breach
Basic publicly available information

They do not have webcam recordings or access to your files.


What To Do If You Receive One

Follow these steps.

Do not respond to the email.
Do not send payment.
Do not click any links.
Mark the message as spam.
Delete the message.

If the email included a password you recognize, change that password immediately on any accounts where it was used.


Additional Protective Steps

Change reused passwords across your accounts.
Enable multi factor authentication where possible.
Use a password manager to generate unique credentials.
Run a security scan if you are concerned.

These actions strengthen your overall security.


Why Paying Makes Things Worse

Paying does not guarantee anything.

Attackers may:

Ask for more money
Continue threatening you
Target you again later

Payment confirms that you are willing to respond.

Ignoring the message removes their leverage.


Final Thoughts

Sextortion emails rely on fear and embarrassment.

Their power comes from panic.

Pause and analyze the message calmly.

Most of these threats are empty.

Do not engage.
Secure your accounts if needed.
Report or delete the message.

Awareness removes the pressure scammers depend on.

Back
Report a Scam
Contact Us
Get Help

Support the Fight Against Cybercrime

One-time contribution. No subscriptions.
 
Awareness Support
Helps educate people to recognize scams and digital threats.
$15
Builder
Supports
Supports educational tools and scam-prevention resources.
$35
Mission Accelerator
Directly strengthens the fight against cybercrime worldwide.
$50
Donate a Custom Amount
Choose an amount that matches the impact you want to make.

*Your contribution supports education, awareness, and community-driven cybercrime prevention

;