How to Stop Sextortion Emails: A Step-by-Step Guide
Sextortion emails are one of the most common forms of cyber scams. These emails typically claim that a hacker has gained access to your computer or webcam and threatens to release compromising material unless you pay a ransom. While alarming, most sextortion emails are fake and rely on fear to coerce victims into compliance.
Here’s how you can stop sextortion emails, protect your accounts, and secure your online presence.
1. Recognize Sextortion Emails
Before taking action, it’s important to understand how sextortion emails work:
- Common Claims: The email may allege that your webcam was hacked or that the sender has explicit material of you.
- Password Mentioned: The scammer might include a leaked password to make their threats appear credible.
- Cryptocurrency Demand: The email typically asks for payment in Bitcoin or another cryptocurrency.
- Urgent Threats: Scammers often set a short deadline (e.g., 24–48 hours) to pressure you into acting quickly.
2. Stay Calm and Don’t Respond
Why Staying Calm Matters:
Sextortion emails rely on panic to manipulate victims. Most scammers don’t have the evidence or access they claim to possess.
Avoid Engaging with the Scammer:
- Do not reply to the email.
- Do not pay the ransom or provide any personal information.
- Do not click on any links or download attachments.
3. Secure Your Email Account
A. Change Your Password:
- If the email includes a password you recognize, change it immediately.
- Use a strong, unique password for your email account.
B. Enable Two-Factor Authentication (2FA):
- Add an extra layer of security to your account.
- With 2FA enabled, even if someone has your password, they won’t be able to access your account without the second authentication step.
C. Check for Unauthorized Access:
- Review your email account’s login activity for any suspicious logins.
- Log out of all devices if unauthorized access is detected.
4. Report the Email as Spam or Phishing
Most email providers have tools to report phishing or spam emails.
- Gmail: Open the email, click the three dots in the top-right corner, and select “Report phishing.”
- Outlook: Right-click the email, select “Mark as junk” or “Report phishing.”
- Yahoo: Open the email and click the “More” icon to report spam or phishing.
Reporting the email helps block similar messages in the future.
5. Check If Your Password Has Been Compromised
Use Breach-Checking Tools:
- Visit Have I Been Pwned to see if your email or password has been exposed in a data breach.
- If your credentials were leaked, update your passwords for all affected accounts immediately.
Best Practices for Password Security:
- Use a password manager to create and store strong, unique passwords.
- Avoid reusing passwords across multiple accounts.
6. Block Future Sextortion Emails
Filter Suspicious Emails:
Set up email filters to automatically block or move emails containing specific keywords (e.g., “Bitcoin,” “compromising,” or “ransom”) to your spam folder.
Use Anti-Spam Software:
Invest in anti-spam tools or services that block suspicious emails before they reach your inbox.
7. Protect Your Devices and Accounts
Install Antivirus Software:
- Protect your computer from malware, which could be used to access sensitive information.
- Run regular scans to detect and remove threats.
Update Your Software:
- Keep your operating system, browsers, and apps up-to-date to patch security vulnerabilities.
Cover Your Webcam:
- Use a physical webcam cover to prevent unauthorized access.
8. Report the Incident to Authorities
If you feel targeted or threatened, report the sextortion email to the appropriate authorities:
- In Kenya: Contact the National Computer Incident Response Team (KE-CIRT) through their website.
- Globally: File a report with organizations like the FBI’s Internet Crime Complaint Center (IC3) or local law enforcement.
9. Educate Yourself About Online Scams
Stay Informed:
- Learn to recognize phishing emails and other cyber scams.
- Share what you know with friends and family to help them stay safe online.
Be Skeptical of Unsolicited Emails:
- Verify suspicious claims before taking action.
- Remember, legitimate entities will never ask for cryptocurrency payments or sensitive information via email.
10. Prevent Future Sextortion Attempts
Strengthen Your Online Presence:
- Regularly review your social media privacy settings to limit the amount of personal information visible to strangers.
- Be cautious about accepting friend requests or engaging with unknown users online.
Limit Your Digital Footprint:
- Avoid sharing sensitive photos or videos, even with trusted individuals.
- Think twice before clicking on unknown links or downloading unverified attachments.
Conclusion
Sextortion emails are a common form of cybercrime, but they can be stopped with the right actions. By staying calm, securing your accounts, and reporting the email, you can protect yourself from further threats.
Remember, most sextortion emails are fake and rely on fear to succeed. Strengthening your cybersecurity habits and staying informed about online scams will help safeguard your digital presence in the long run.
FAQs
1. Are sextortion emails always fake?
Most sextortion emails are scams and do not involve actual evidence. However, it’s important to secure your accounts just in case.
2. Can sextortion emails access my webcam?
Unlikely. Scammers usually lack the technical ability to hack webcams. Use a webcam cover for added peace of mind.
3. Should I pay the ransom in a sextortion email?
No. Paying the ransom only encourages scammers and does not guarantee they’ll stop.
4. How can I prevent future sextortion emails?
Use strong passwords, enable 2FA, and avoid sharing personal information online.
5. Where can I report sextortion emails in Kenya?
Report sextortion emails to KE-CIRT or your local law enforcement agency.