Sextortion Scams Shaming Victims

Let's talk about sex-tortion – an online blackmail scam targeting students where criminals may threaten to share explicit images or compromising personal information.

On day three of Scams Awareness Week, South Australia Police (SAPOL) is shining a spotlight on this form of sexual exploitation, where the typically unknown offender creates a fake online profile and tricks or coerces the victim into sending sexual images of themselves.

The sophistication of these scams is largely attributed to advancements in AI and the availability of personal data from recent large-scale data breaches.

"Scammers are now employing Artificial Intelligence to create 'deepfake' or edited images by superimposing a victim's face onto another body, accompanied by threatening messages and demands for payment for the image to be deleted," Detective Chief Inspector Brett Featherby said.

"Historically, young men have mainly been targeted in sextortion scams, however, in the past financial year a distinct spike in matters involving female victims has occurred.

"The increase does not relate to AI or photoshopped images but are much more likely to involve intimate images previously shared by the victim, either directly to previously trusted individuals or on intimate websites, or through images obtained through social media account take overs."

Sextortion scam data is incorporated in the Online Image Abuse (OIA) category of reporting.

In South Australia, 339 OIA reports saw more than $127,000 lost to scammers in 2023/2024, noting the data relates to Cyber Issue Reporting System (CIRS) reporting only.

In the 2024/2025 financial year more than $101,000 was lost across 284 OIA reports, with the majority still male victims.

"Victims under 18 are overrepresented in this offence type, with minors being vulnerable to this type of offending," Detective Chief Inspector Featherby added.

"Embarrassment or fear can prevent people asking for help.

"Know that anyone can become a victim of sextortion, and that if you are preyed on, you are not at fault."

Red flags:

  • Conversation quickly turns intimate, with the scammer asking for explicit images.
  • Their profile has little to no photos and you have no mutual friends with them.
  • The messages might be written in broken English, have typos or an unusual use of common phrases. Their profile details might not add up with what you see.
  • They may send intimate images or videos to "prove" they are real.
  • The person is extremely attractive, and it may appear too good to be true.
  • Attempts are made to move the conversation off of the original platform.

Tips to help keep you safe:

  • Refuse friend requests from people you do not know personally.
  • Avoid sending intimate images and videos online as you never know where they may end up.
  • Conduct research on their account such as how long the account has been active and who their followers are.
  • Beware what you share online and ensure your settings are on private. Some scammers may include their own 'personal' information, which could be a local area they live at nearby. They could have obtained information off your account that makes them appear more legitimate.
  • Refuse demands for payments which may include gift cards and cryptocurrency.
  • Protect children by keeping all computer/phone use to common family areas.
  • Install parental controls on mobile devices to prevent calls or texts to strangers.
  • Younger people should speak to a trusted adult for support or are encouraged to engage with family, mental health services or other community support services.

Real-life example:

John was scrolling through reels on social media, when an attractive young woman messaged him. After a quick back and forth, John was keen to explore this potential love interest. She asked him to add her on a separate messaging app, as it was easier to share images. Although John didn't know this person, the idea of dating someone so attractive was too good to ignore, so he added her on the other platform and continued the conversation. Things soon turned heated, with the woman sending an intimate image, asking for John to do the same. He obliged, but shortly after the image was sent, the woman began threatening John, telling him his nude image would be sent to his friends and family unless he paid her $2000. John agreed, not wanting the image shared, but after he paid, she requested more money. Unable to pay anymore, John approached his parents who were supportive and understood his traumatic mistake and helped him report the incident to police. The image was never released by the scammer.

Report

- If you have suffered harm or loss because of a scam, make a report at www.cyber.gov.au/report or attend your local police station.

Support

- Talk to friends and family.

- eSafety Commissioner – www.esafety.gov.au

- Victims of Crime SA – www.voc.sa.gov.au

- Lifeline – 13 11 14 or www.lifeline.org.au

- Rebuild Victim Counselling – www.rasa.org.au

-

- If you're under 18, the best way to get help is to report it to the Australian Centre to Counter Child Exploitation (ACCCE)

- If you're 18 years or older, report it to any platforms or services where the blackmailer contacted you. If your intimate image or video is shared, you can report it to eSafety.

Have you been a victim of sextortion? Make a report to Report Cyber or attend your local police station to speak with an understanding police officer, like Cybercrime Constable Max Allison.

Risk Warning: Cryptocurrency is a unregulated virtual notoriously volatile instrument with a high level of risk. Any news, opinions, research, data, or other information contained within this website is provided for news reporting purposes as general market commentary and does not constitute investment or trading advice.

/Public Release. This material from the originating organization/author(s) might be of the point-in-time nature, and edited for clarity, style and length. Mirage.News does not take institutional positions or sides, and all views, positions, and conclusions expressed herein are solely those of the author(s).View in full here.