Sextortion Help: What to Do If You Are Being Blackmailed Online
Posted: March 31, 2026 to Cybersecurity.
Sextortion Help: What to Do If You Are Being Blackmailed Online
Sextortion is a form of online blackmail where someone threatens to distribute intimate images or videos unless the victim pays money, sends more explicit content, or complies with other demands. It is a federal crime under multiple statutes, including extortion, computer fraud, and child exploitation laws. Whether the images were shared voluntarily, obtained through hacking, or generated using deepfake technology, the person making the threat is committing a serious criminal offense.
The scale of this crime is staggering. The FBI reported that sextortion complaints to the Internet Crime Complaint Center (IC3) more than doubled between 2022 and 2024, with over 12,000 complaints filed in 2024 alone. The National Center for Missing and Exploited Children (NCMEC) received more than 186,000 reports of online enticement, including sextortion, in a single year. These numbers represent only the cases that are actually reported. The FBI estimates that fewer than 1 in 5 victims ever comes forward due to shame, fear, and confusion about what to do.
If you are being blackmailed right now, you are not alone, and this is not your fault. This guide provides a complete, step-by-step plan for responding to sextortion, reporting it to the right authorities, and getting the professional help you need to end the threat. Petronella Technology Group's digital forensics team works with sextortion victims and law enforcement to trace attackers, preserve evidence, and stop the distribution of intimate content.
What Is Sextortion and How Does It Work?
Sextortion is a specific type of online blackmail that uses intimate or sexual content as leverage. The attacker either obtains real intimate images of the victim or claims to possess them, then threatens to send those images to the victim's family, friends, employer, or social media contacts unless the victim pays or complies with demands. Understanding how these attacks happen is the first step toward protecting yourself and responding effectively.
Catfishing and Social Media Grooming
The most common method begins on dating apps, social media platforms, or messaging services. The attacker creates a fake profile using stolen or AI-generated photos of an attractive person. They initiate a conversation, build rapport, and gradually steer the interaction toward exchanging intimate photos or engaging in video chat. Once the victim shares explicit content or appears on camera in a compromising situation, the attacker reveals their true intent and demands payment.
This approach is highly effective because it exploits normal human behavior. The victim believed they were in a private, consensual interaction with someone they were getting to know. On platforms like Snapchat, Instagram, and Tinder, where exchanging photos is part of the culture, victims often do not realize they are being set up until the threat arrives.
Webcam Manipulation
Some sextortion attacks involve live video manipulation. The attacker initiates a video call, often on platforms like Skype, Zoom, Google Meet, or FaceTime, and either performs or shows pre-recorded explicit content to encourage the victim to undress or engage in sexual activity on camera. The attacker secretly records the victim's side of the conversation. In many cases, the attacker was never actually live on camera at all. They were playing a looped video while recording the victim through the platform's screen capture tools.
Hacked Accounts and Cloud Storage
Not all sextortion starts with willing participation. Attackers may gain access to a victim's cloud storage (iCloud, Google Photos, Dropbox), email accounts, or phone backups through credential stuffing, phishing, or purchasing stolen credentials on dark web marketplaces. Once inside, they search for intimate photos or videos and use them as blackmail material. Victims in these cases never voluntarily shared the content with anyone.
Deepfake and AI-Generated Threats
A growing category of sextortion involves deepfake technology. The attacker takes public photos from the victim's social media profiles and uses AI tools to create realistic fake nude images or explicit videos. The victim never actually appeared nude or engaged in any explicit activity, but the fabricated content looks convincing enough to cause severe reputational damage if shared. The FBI issued a specific public service announcement in 2023 warning about the rise of deepfake sextortion, noting that victims include adults, teenagers, and even children whose school photos were manipulated.
Types of Sextortion
Financial sextortion is the most common type. The attacker demands money, typically through cryptocurrency, gift cards, wire transfer, or payment apps like Venmo, Cash App, or Zelle. Demands often start at $200 to $500 but escalate rapidly if the victim pays. Financial sextortion disproportionately targets teenage boys and young men aged 14 to 30.
Sexual sextortion involves demands for additional explicit images, videos, or sexual acts. The attacker uses existing content as leverage to coerce the victim into producing more. This type is particularly common in cases targeting minors and is classified as child sexual exploitation under federal law.
Revenge-based or spite-based sextortion occurs when a former intimate partner threatens to distribute images shared during the relationship as retaliation after a breakup. While sometimes called "revenge porn," when it involves threats and demands, it meets the legal definition of extortion. Every state in the U.S. now has laws addressing nonconsensual distribution of intimate images, and most explicitly criminalize the use of such images for coercion.
What to Do Immediately If You Are Being Sextorted
If someone is threatening to share your intimate images, follow these steps in order. Acting quickly and correctly in the first 24 to 48 hours significantly affects the outcome.
1. Do Not Pay or Comply With Any Demands
This is the single most important step. Research from the Thorn organization and multiple law enforcement agencies shows that paying the attacker leads to escalation in more than 80% of cases. Once you pay, the attacker knows you are willing to send money, and they increase their demands. Victims who pay once typically receive a second demand within days, often for a larger amount. The threat does not end with payment. It intensifies.
Similarly, do not send additional explicit images. Providing more content only gives the attacker more leverage and more material to distribute. No matter what the attacker promises, compliance does not lead to the images being deleted or the threats stopping.
2. Do Not Delete Any Evidence
Your instinct may be to delete the threatening messages and try to forget the situation. Do not do this. Those messages, emails, usernames, phone numbers, payment details, and screenshots are the evidence that law enforcement and forensic investigators need to identify the attacker and build a case. Before blocking the attacker (which you should do next), take screenshots of everything:
- All messages and threats, including timestamps
- The attacker's profile name, username, and profile photo
- Phone numbers, email addresses, or other contact information the attacker used
- Any payment details they provided (cryptocurrency wallet addresses, Venmo handles, Cash App cashtags, gift card redemption instructions)
- URLs of any websites where they threatened to post content
- Your own sent messages (to establish the full conversation timeline)
Store these screenshots in a secure location such as a password-protected folder, encrypted cloud storage, or a USB drive kept in a safe place.
3. Block the Extortionist on All Platforms
After preserving evidence, block the attacker on every platform where they have contacted you. This includes social media accounts, messaging apps, email addresses, and phone numbers. Blocking does not delete previous messages on most platforms, so your evidence is preserved. If the attacker creates new accounts to contact you, block those as well and screenshot them first.
4. Secure All Your Accounts
Change passwords on every account associated with your email address, especially social media, email, cloud storage, and banking accounts. Enable two-factor authentication (2FA) using an authenticator app (not SMS, which is vulnerable to SIM swapping). If the attacker gained access through a compromised account, this step prevents further access to your personal data. Review your social media privacy settings and restrict who can see your friends list, followers, and tagged photos, as attackers often use these to identify people to send your images to.
5. Report to the Platform
Every major platform has specific reporting mechanisms for sextortion and intimate image abuse. File reports on every platform the attacker used to contact you or threatened to use to distribute your images. Platforms can remove the attacker's account, block content from being shared, and in many cases provide information to law enforcement. Detailed instructions for each platform are provided in the section below.
6. File an FBI IC3 Report
The FBI's Internet Crime Complaint Center at ic3.gov is the primary federal reporting mechanism for sextortion and all internet-based crimes. Filing an IC3 report creates an official federal record and feeds into FBI databases that track sextortion operations across the country. When multiple victims report the same attacker, it builds the case for a federal investigation. Include all evidence you have collected: screenshots, usernames, payment details, and a detailed timeline of events.
7. File a Local Police Report
Contact your local police department and file a report. Even if local police do not have the resources for a full investigation, the police report creates an official record that can be used for platform takedown requests, insurance claims, and future legal proceedings. Ask for the case number and the name of the officer assigned to the report.
8. Contact NCMEC If a Minor Is Involved
If the victim is under 18 years old, or if the sextortion involves any images of a minor, contact the National Center for Missing and Exploited Children's CyberTipline immediately at 1-800-843-5678 or online at missingkids.org/gethelpnow/cybertipline. NCMEC works directly with the FBI and local law enforcement to investigate child exploitation cases. The production, possession, or distribution of intimate images of a minor is a federal crime regardless of the circumstances under which the images were created.
9. Engage Digital Forensics to Preserve Evidence and Trace the Attacker
Professional digital forensics investigators can do what victims and general-purpose law enforcement often cannot: trace the attacker's digital footprint across platforms, analyze metadata in messages and images, identify IP addresses and device information, preserve evidence in a forensically sound manner that is admissible in court, and work with platforms and law enforcement to identify the person behind the threats. The earlier forensic investigators are engaged, the more evidence is available before attackers delete accounts and cover their tracks.
If you are being blackmailed or extorted online, our digital forensics investigators can help preserve evidence, trace the attacker, and coordinate with law enforcement. Every consultation is confidential. Request an urgent consultation or call 919-348-4912.
Is Sextortion Illegal? Federal and State Laws
Sextortion is a serious crime under both federal and state law. Understanding the legal framework helps victims recognize that the law is on their side and that attackers face severe criminal penalties.
Federal Laws
18 U.S.C. § 875(d) — Interstate Extortion: This statute makes it a federal crime to transmit any communication in interstate or foreign commerce containing a threat to injure the reputation of another person with intent to extort money or anything of value. Sextortion fits squarely within this statute because the threat to distribute intimate images constitutes a threat to injure reputation, and the demand for payment constitutes extortion. Conviction carries a penalty of up to 2 years in federal prison.
18 U.S.C. § 1030 — Computer Fraud and Abuse Act (CFAA): When sextortion involves unauthorized access to a victim's computer, phone, cloud storage, or social media account to obtain intimate images, the attacker violates the CFAA. This applies to cases where images were obtained through hacking rather than voluntary sharing. Penalties range from 5 to 20 years depending on the specific subsection violated and whether the offense caused serious harm.
18 U.S.C. § 2252 and § 2252A — Sexual Exploitation of Children: When sextortion involves a minor, these statutes apply regardless of whether the attacker knew the victim's age. Production of child sexual abuse material (CSAM) carries a mandatory minimum of 15 years and a maximum of 30 years in federal prison. Distribution carries 5 to 20 years. Possession carries up to 10 years. If the offense involves coercion or threats (as sextortion inherently does), enhanced penalties apply.
18 U.S.C. § 1591 — Sex Trafficking: The Department of Justice has prosecuted some sextortion cases under sex trafficking statutes when the coercion was used to compel the victim to engage in sexual acts. Conviction carries a penalty of 15 years to life in federal prison.
18 U.S.C. § 2261A — Stalking and Cyberstalking: Sextortion that involves repeated threats, monitoring, or harassment may also constitute federal stalking, which carries penalties of up to 5 years, or up to life in prison if the victim suffers serious bodily injury or death.
North Carolina State Laws
N.C. Gen. Stat. § 14-118.4 — Extortion: North Carolina criminalizes extortion as obtaining property or compelling action through threats to accuse of a crime, injure person or property, or expose any secret affecting reputation. Sextortion involving threats to distribute intimate images fits this statute. Classified as a Class F felony, carrying 10 to 41 months of imprisonment.
N.C. Gen. Stat. § 14-190.5A — Disclosure of Private Images (Revenge Porn Law): North Carolina specifically criminalizes the nonconsensual disclosure of intimate images. This applies to both actual distribution and threats to distribute. Classified as a Class H felony, carrying 4 to 25 months of imprisonment.
N.C. Gen. Stat. § 14-458.2 — Cyber-Stalking: When sextortion includes ongoing threats and harassment, North Carolina's cyberstalking statute provides additional criminal exposure for the attacker.
Victims should understand that they are not in legal trouble for being sextorted, even if they voluntarily shared intimate images. The crime is committed by the person making the threats, not the person being threatened. Minors who shared images of themselves are treated as victims under federal law, not as offenders.
Platform-Specific Reporting: How to Report Sextortion
Each platform has its own process for reporting sextortion and intimate image abuse. Report on every platform the attacker used, even if you have already blocked them. Platform reports trigger internal investigations, account removals, and in many cases direct cooperation with law enforcement.
Go to the attacker's profile, tap the three-dot menu, and select "Report." Choose "It's posting content that shouldn't be on Instagram" and then "Nudity or sexual activity" or "Bullying or harassment." For sextortion specifically, visit the Instagram Help Center and search for "sextortion" to access the dedicated reporting form. Instagram's parent company Meta has committed to removing sextortion content within one hour of detection and proactively identifies and removes accounts engaged in sextortion.
Snapchat
Snapchat is one of the most common platforms used in sextortion attacks, particularly targeting teenagers. To report, press and hold on the attacker's name in your chat list, tap "More," then "Report." Select "Harassment or bullying" or "Threats." You can also report at support.snapchat.com. Snapchat has a dedicated law enforcement response team and cooperates with police investigations. Despite the platform's disappearing message feature, Snapchat retains data that can be accessed by law enforcement with proper legal process.
TikTok
Long-press the message from the attacker and select "Report." Choose the appropriate category for the violation. You can also report the attacker's profile by going to their page, tapping the three-dot menu, and selecting "Report." TikTok's safety team reviews reports and can remove accounts, block content, and preserve evidence for law enforcement requests.
Facebook and Messenger
On the message thread, click the name at the top, select "Something's Wrong," and follow the prompts to report the conversation. For profiles, go to the profile page, click the three-dot menu, and select "Find support or report." Facebook also offers a dedicated tool at facebook.com/safety/notwithoutmyconsent specifically for reporting non-consensual intimate images, even images that have not been shared yet but that someone is threatening to distribute.
Open the chat, tap the contact's name at the top, scroll down, and select "Report contact." You can also email WhatsApp's support team at support@whatsapp.com with details and screenshots. WhatsApp messages are end-to-end encrypted, but metadata (phone numbers, timestamps, IP addresses) is available to law enforcement with proper legal process.
Discord
Right-click the message, select "Report Message," and follow the prompts. For serious cases including sextortion and CSAM, email Discord's Trust and Safety team directly at abuse@discord.com. Discord is required to report any child sexual exploitation material to NCMEC under federal law.
Twitter/X
Click the three-dot menu on the offending message or tweet, select "Report," and choose the appropriate violation category. For intimate image abuse specifically, X has a dedicated form for reporting non-consensual nudity in their Help Center. X cooperates with law enforcement subpoenas and can provide account information including IP addresses, phone numbers, and email addresses associated with the attacker's account.
How Digital Forensics Helps Sextortion Victims
Most sextortion victims feel powerless against an anonymous online attacker. Professional digital forensics changes that dynamic by applying investigative tools and techniques that can identify who is behind the threats and build the evidence needed for criminal prosecution.
Petronella Technology Group's digital forensics team provides the following capabilities specifically relevant to sextortion investigations:
IP Address Tracing and Account Attribution: Every online interaction leaves a digital trail. Forensic investigators analyze message headers, login records, and platform data to identify IP addresses associated with the attacker. When combined with geolocation databases and ISP records (obtained through law enforcement subpoenas), IP tracing can narrow an attacker's location to a specific city, neighborhood, or internet service provider. In cases where the attacker used a VPN or Tor, additional analysis of timing patterns, device fingerprints, and behavioral indicators can still provide attribution leads.
Evidence Preservation and Chain of Custody: Digital evidence is fragile. Messages can be deleted, accounts deactivated, and metadata altered. Forensic investigators use write-blocking tools, hash verification, and certified forensic imaging software to create tamper-proof copies of all evidence. Every step is documented with timestamps and cryptographic verification to ensure the evidence is admissible in both criminal and civil proceedings. This level of documentation is critical because improperly preserved evidence can be challenged and excluded at trial.
Device Forensics: If the victim's phone, computer, or tablet was compromised as part of the sextortion attack (for example, through malware, a hacked account, or unauthorized access), forensic examination of the device can reveal how the attacker gained access, what data they extracted, and whether any malware or spyware remains on the device. This is particularly important in cases involving hacked cloud accounts or intimate partner surveillance.
Dark Web Monitoring: In cases where images have already been distributed, forensic investigators can monitor dark web forums, image boards, and file-sharing networks for the victim's content. When leaked content is identified, the investigator works with hosting providers, platform operators, and law enforcement to request takedowns and identify who uploaded or distributed the material.
Platform Cooperation and Legal Process Support: Forensic investigators work with platform legal and safety teams to expedite data preservation requests, emergency disclosures (in cases involving imminent harm), and responses to law enforcement subpoenas. Having a professional forensic team interface with platforms typically results in faster responses and more complete data production than individual victim reports alone.
Coordination With Law Enforcement: Petronella's forensic team prepares investigation packages formatted for FBI, Secret Service, and local law enforcement use. These packages include technical analysis in language that non-technical investigators and prosecutors can understand, along with the forensic detail needed to support search warrants, arrest warrants, and prosecution.
Petronella's digital forensics team traces attackers, preserves evidence for court, and works directly with law enforcement to stop sextortion. Every case is handled with complete confidentiality. Contact us for a confidential assessment or call 919-348-4912.
Protecting Yourself From Sextortion
While no prevention measure is foolproof, these practices significantly reduce your risk of becoming a sextortion victim and limit the damage if an attack does occur.
Be cautious with new online contacts. Sextortion begins with a conversation. Be skeptical of strangers who reach out on dating apps, social media, or messaging platforms, especially if they quickly move the conversation toward intimate topics. Reverse image search their profile photos using Google Images or TinEye. If the photos appear on multiple accounts with different names, you are dealing with a catfish.
Never share intimate content with someone you have not met in person. This is the most effective prevention against the most common form of sextortion. No matter how strong the online connection feels, the person on the other end may not be who they claim. Even in established relationships, consider that images shared digitally can be stored, copied, and used in ways you did not intend.
Cover your webcam when not in use. A simple webcam cover or piece of tape prevents both remote access attacks and webcam-based sextortion. If someone asks you to video chat on an unfamiliar platform, decline. Legitimate contacts will use standard platforms like Zoom, Google Meet, or FaceTime.
Use strong, unique passwords and enable 2FA on every account. Many sextortion cases begin with account compromise. Use a password manager to generate and store unique passwords for every service. Enable two-factor authentication using an authenticator app (Google Authenticator, Authy, or Microsoft Authenticator) rather than SMS, which is vulnerable to SIM swapping. These steps protect your cloud storage, email, and social media accounts from unauthorized access.
Review your social media privacy settings. Restrict who can see your friends list, followers, and tagged photos. Attackers often threaten to send images to specific people from your contact list. If your friends list is private, the attacker has less ammunition. On Instagram, switch to a private account or at minimum restrict who can send you DMs. On Facebook, limit past posts and restrict who can see your friend list.
Be aware of deepfake threats. Even if you have never shared intimate content, public photos on social media can be manipulated using AI. Keeping your social media profiles private and limiting the availability of clear, full-face photos reduces the raw material available to deepfake tools. This is especially important for teenagers and young adults, who are increasingly targeted by deepfake sextortion.
Know the warning signs. Common red flags in new online contacts include: conversations that escalate to sexual topics unusually quickly, requests to move from a dating app to a private messaging platform, reluctance to video chat or meet in person, stories that seem too good to be true, and any request for intimate images regardless of the context. Trust your instincts. If something feels off, it probably is.
Organizations should include sextortion awareness in their security awareness training programs. Employees who fall victim to sextortion at home may also face compromise of work accounts and corporate data, making this a business risk as well as a personal one.
Sextortion Targeting Minors: What Parents Need to Know
The FBI has identified financial sextortion of minors as one of the fastest-growing threats to children online. In 2024, the Bureau issued multiple public warnings specifically about sextortion targeting boys aged 14 to 17. At least 20 minors have died by suicide in connection with sextortion attacks in the United States since 2022, making this a life-and-death issue for families.
How Minors Are Targeted
Attackers target minors primarily on Instagram, Snapchat, and gaming platforms like Roblox, Fortnite, and Discord. The attacker typically poses as an attractive peer or slightly older teenager. They build a friendly connection, often over several days, then move to exchanging photos. Once the minor sends a single intimate image, the attacker immediately reveals the trap and demands money, threatening to send the image to the minor's parents, school, or classmates.
Financial sextortion targeting minors is distinct from other forms because the attacker demands relatively small sums ($100 to $500) paid immediately through gift cards, Cash App, or cryptocurrency. The urgency and fear of exposure are so intense that many teens pay without telling anyone. The attacker then demands more, and the cycle continues. Some attackers demand payment within minutes, creating extreme psychological pressure on a young person who may not have any adult to turn to in the moment.
Warning Signs Parents Should Watch For
- Sudden, unexplained withdrawal from family and friends
- Visible anxiety, depression, or emotional distress, especially related to phone or computer use
- Spending time online late at night or hiding screens when adults enter the room
- Requests for money or gift cards without clear explanation
- Deleted message apps, new social media accounts, or use of unfamiliar platforms
- Expressions of hopelessness, shame, or talk about wanting to disappear
- Declining grades or loss of interest in activities they previously enjoyed
What to Do If Your Child Is Being Sextorted
Stay calm. Your child is a victim of a crime, and they need your support and reassurance, not anger or punishment. Tell your child explicitly that they are not in trouble and that this is not their fault. Report immediately to the CyberTipline at 1-800-843-5678 and to the FBI at ic3.gov. Do not attempt to contact the attacker. Do not pay any demands. Preserve all evidence and seek professional help immediately.
If your child is in immediate emotional crisis, contact the 988 Suicide and Crisis Lifeline by calling or texting 988. The Crisis Text Line is also available: text HOME to 741741.
Resources for Minors and Families
- NCMEC CyberTipline: missingkids.org — 1-800-843-5678
- Thorn: thorn.org — Technology-driven organization fighting child sexual exploitation
- StopBullying.gov: stopbullying.gov — Federal resources for cyberbullying and online harassment
- Take It Down (NCMEC): takeitdown.ncmec.org — Free tool to help remove intimate images of minors from the internet
- 988 Suicide and Crisis Lifeline: Call or text 988
North Carolina Resources for Sextortion Victims
Victims in North Carolina and the Raleigh-Durham area have access to both state and local resources in addition to federal agencies:
- FBI Charlotte Field Office — Covers the Raleigh-Durham area for federal cybercrime investigations. Call 704-672-6100
- North Carolina State Bureau of Investigation (SBI) — Computer Crimes Unit handles online exploitation and extortion cases statewide
- North Carolina Attorney General's Office — Consumer Protection Division accepts complaints related to online fraud and extortion. File online at ncdoj.gov/file-a-complaint or call 877-566-7226
- Raleigh Police Department — Cyber Crimes Unit handles local reports of online extortion and harassment
- Wake County Sheriff's Office — Accepts reports for incidents occurring in unincorporated Wake County
- InterAct of Wake County — Provides crisis intervention, counseling, and support for victims of sexual violence and exploitation. Call the 24-hour crisis line at 919-828-3005
- NC Stop Bullying — State resources for cyberbullying and online harassment affecting children and teens
Petronella Technology Group is headquartered at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606, and works with local and federal law enforcement on cybercrime investigations. Our proximity to victims and agencies in the Triangle area means we can provide same-day response, attend in-person meetings with investigators, and testify in North Carolina state and federal courts.
Related Cybercrimes: How Sextortion Connects to Broader Online Threats
Sextortion does not happen in isolation. It often intersects with other forms of online crime, and understanding these connections helps victims and families recognize the full scope of the threat.
Pig Butchering Scams: In some cases, sextortion evolves from or overlaps with pig butchering scams, where attackers build romantic relationships to defraud victims financially. If intimate content was shared during the "relationship" phase, the attacker may pivot from investment fraud to sextortion. For a detailed guide on pig butchering scams and recovery, see our post on pig butchering scam identification, reporting, and recovery.
Romance Scams: Traditional romance scams and sextortion share the same entry point: a fake online relationship. The difference is in the endgame. Romance scams focus on extracting direct payments through fabricated emergencies, while sextortion uses intimate content as the leverage mechanism. Many victims experience both in sequence.
Phishing and Account Compromise: Sextortion that begins with a hacked account is a downstream consequence of phishing, credential stuffing, or password reuse. Protecting yourself against these threats through strong passwords, 2FA, and phishing awareness directly reduces your sextortion risk.
Ransomware and Data Extortion: The psychological model behind sextortion (threatening to release damaging information unless payment is made) is identical to the model behind ransomware and corporate data extortion. The same criminal organizations that run sextortion campaigns often operate ransomware and business email compromise operations.
Key Takeaways
- Sextortion is a federal crime carrying penalties of up to 20 years or more in prison depending on the specific charges. You are the victim, not the criminal
- Do not pay or comply with demands. Paying leads to escalation in over 80% of cases. The threats do not stop with payment
- Preserve all evidence before blocking the attacker: screenshots of messages, usernames, payment details, and a timeline of events
- Report to law enforcement: File an FBI IC3 report at ic3.gov, a local police report, and platform-specific reports on every platform the attacker used
- If a minor is involved, contact the NCMEC CyberTipline at 1-800-843-5678 and the 988 Suicide and Crisis Lifeline immediately
- Secure your accounts: Change all passwords, enable 2FA with an authenticator app, and review social media privacy settings
- Professional digital forensics can trace attackers, preserve evidence for court, monitor for leaked content, and work with platforms and law enforcement to stop the threat
- Prevention works: Be cautious with new online contacts, never share intimate content with strangers, use strong passwords and 2FA, cover your webcam, and monitor children's online activity
Being targeted by sextortion is a frightening experience, but you have more options and more legal protection than most victims realize. The attacker is counting on silence, shame, and isolation to maintain control. Breaking that cycle by reporting the crime, preserving evidence, and seeking professional help is the most effective path to ending the threat and holding the attacker accountable.
If you or someone you know is being sextorted or blackmailed online, contact Petronella Technology Group for a confidential consultation. Our digital forensics team has the tools, experience, and law enforcement relationships to investigate sextortion cases and help victims regain control. Call 919-348-4912 or visit our incident response page for immediate assistance.