Sextortion & Blackmail

What to do if you receive a sextortion email

Receiving a sextortion email is frightening. These messages claim to have footage of you and threaten to send it to your contacts unless you pay. Here's what's actually happening — and exactly what to do.

Quick answer

Sextortion emails claim to have compromising footage of you and threaten to share it unless you pay. In the vast majority of cases, no footage exists — these messages are sent in bulk to thousands of people at once. Paying or engaging with the sender does not make the threat go away. Do not pay, do not reply, do not click any links. Delete the email and block the sender.

If you've received one of these emails, you're not alone. Sextortion emails are sent in enormous quantities — hundreds of thousands of people receive them every year. They are designed to cause maximum anxiety and panic in order to extract payment quickly, before the recipient has time to think clearly.

Reading this guide is already the right move. Take a breath. This page will explain what's happening and what to do next.

What a sextortion email typically claims

Most sextortion emails follow a similar script. The sender claims to have installed spyware or malware on your device. They say they've been recording you through your webcam while you visited adult websites. They claim to have a "split screen" video — your face alongside what you were viewing — and they threaten to send it to your contacts, family, or employer unless you pay a fee within a tight deadline, usually 24–72 hours.

The payment demand is almost always in Bitcoin or another cryptocurrency, precisely because it's harder to trace and reverse.

Some versions of the email include a password you've used before, or a partial phone number. This is designed to convince you the threat is real. The password came from a data breach — publicly available lists of leaked credentials that criminals buy and use in bulk. It does not mean anyone has access to your device.

Why the threat is almost certainly a bluff

Genuine webcam access and screen recording requires sophisticated malware to be installed on your specific device. This is technically possible, but it's not how these emails work. The sextortion email model is a numbers game — send the same threatening email to a million people, a small percentage panic and pay, everyone else deletes it.

If scammers genuinely had footage of everyone they emailed, they would have no need to send bulk messages. They'd send targeted, specific threats — naming your contacts, describing what they have, showing a still from the footage. The generic, templated nature of these emails is itself evidence that the threat isn't real.

The presence of one of your passwords is alarming but explainable. Billions of email address and password combinations from past data breaches are freely available. Criminals use these lists to make generic sextortion emails feel personalised. Check haveibeenpwned.com to see which breaches included your email address — and change any passwords you still use.

What to do right now

Immediate steps if you receive a sextortion email:

  1. Do not pay. Payment confirms your address is active and typically leads to more demands, not resolution
  2. Do not reply — any response confirms your address is monitored
  3. Do not click any links in the email
  4. Take a screenshot of the email for your records before deleting it
  5. Block the sender address
  6. If the email includes a password you still use anywhere, change it now on those accounts
  7. Report the email to Action Fraud at actionfraud.police.uk or 0300 123 2040
  8. Forward a copy to report@phishing.gov.uk
  9. Delete the email

If the email includes one of your passwords

This is the detail that makes sextortion emails feel genuinely frightening, and it's worth addressing directly. That password almost certainly came from a data breach at a website you used — not from anyone accessing your device.

Go to haveibeenpwned.com and enter your email address. It will show you which known data breaches included your information. The password in the sextortion email will match one of those breaches.

Change the password on any accounts where you still use it. Use a different password for every account — a password manager makes this much easier.

What not to do

Do not pay. This is the most important thing. Even if you pay, there is no guarantee the sender will delete anything — and your payment signals that you are willing to pay, which typically results in further demands. In the vast majority of cases, paying simply sends money to criminals with no benefit to you.

Do not engage or try to reason with the sender. Do not threaten to report them in your reply. Do not tell them you're going to the police — just go.

Do not cover your webcam as a reaction (though it's a sensible general habit). The threat isn't typically coming from your camera — it's a bluff designed to make you act without thinking.

If there is a specific, credible threat

Occasionally sextortion threats are genuine — real imagery exists and the threat is credible and targeted. If that is your situation, this is different from a generic bulk email.

Contact your local police station. The Internet Watch Foundation (IWF) at iwf.org.uk can help if content has already been shared online and you need it taken down. The Revenge Porn Helpline at revengepornhelpline.org.uk offers free, confidential support specifically for people affected by non-consensual sharing of intimate images.

Not sure what an email is trying to do?

Paste the email text into Summarly. It will explain what the email appears to say in plain English and flag what's actually going on — without judgement.

Check the email

Frequently asked questions

Is a sextortion email real?

In the vast majority of cases, no — the claims are a bluff. Sextortion emails are sent in bulk to thousands of people simultaneously. The threats about having footage are almost always fabricated. If the email includes one of your passwords, that came from a past data breach, not from access to your device.

Should I pay a sextortion demand?

No. Paying confirms your email address is actively monitored and that you take the threat seriously. It typically leads to further demands rather than the problem going away. The vast majority of these emails are bluffs with no footage to share. Do not pay under any circumstances.

What if the email includes one of my passwords?

The password came from a past data breach — not from access to your webcam or device. Go to haveibeenpwned.com and enter your email address to see which breaches included your information. Change the password on any accounts where you still use it. The presence of a password is a scare tactic, not proof of access.

Should I reply to the email?

No. Do not reply, do not engage, and do not tell the sender you are reporting them. Any response confirms your address is actively monitored and may lead to more targeted threats. Block the sender and delete the email.

How do I report a sextortion email?

Report to Action Fraud at actionfraud.police.uk or 0300 123 2040. Forward the email to report@phishing.gov.uk. If you believe the threat is specific and credible — rather than a generic bulk email — contact your local police. The Revenge Porn Helpline at revengepornhelpline.org.uk provides free, confidential support if real intimate imagery is involved.

↑ Back to top