Cyber Sextortion Scam

Modified on Mon, 5 Aug at 10:15 AM

Cyber Sextortion Scam typically involves the threat of sharing explicit or embarrassing photos or videos of the victim unless they pay a specified amount of money.

 

How Cyber Sextortion Scam Works

1. Initial Contact

The scammer initial contact with the victim through various online platforms, such as social media, dating apps or chat rooms. 

2. Building Trust

The scammer engaging victim in romantic or sexual conversation.

3. Sharing Explicit Content

The victim may willingly or be asked to share explicit photos or videos.

4. Threats and Coercion

After obtaining explicit material, the scammer threatens to expose the explicit content unless the victim complies with their demands.

5. Demands for Money

Scammer typically demand money for not disclosing the initial content.


Things to keep in mind:

  • DO NOT engage in explicit or intimate conversations with strangers online.
  • DO NOT share explicit content with anyone, even if you know them. Be mindful of the potential consequences of sharing explicit content.
  • DO NOT click on suspicious links, it might download malware on your device that can activate your device’s camera remotely.
  • Educate yourself and your loved ones, especially children and teenagers, about online safety, and the importance of privacy.
  • Tighten your device's security by using a trusted antivirus, and make sure to regularly update their operating systems.
  • If you receive threatening messages related to explicit content, do not immediately comply with demands. Seek advice from law enforcement, a cybersecurity expert, or a trusted person.


To report this issue, please get in touch with us


Rest assured that CelcomDigi is actively taking measures to ensure our customers do not fall prey to such scams.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article