{"id":3348,"date":"2024-04-19T00:00:00","date_gmt":"2024-04-19T00:00:00","guid":{"rendered":"https:\/\/digitalinvestigation.com\/blog\/?p=3348"},"modified":"2025-04-10T19:51:23","modified_gmt":"2025-04-10T19:51:23","slug":"what-to-do-with-a-sextortion-email","status":"publish","type":"post","link":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/","title":{"rendered":"What To Do With Sextortion Emails? Effective Strategies and Tips"},"content":{"rendered":"<p data-pm-slice=\"1 1 []\">Two words: \u201cHello, pervert.\u201d They may sound familiar if you\u2019ve received a sextortion email. This phrase is designed to catch you off guard and make you feel judged. Unfortunately, it works. These emails are so popular that scammers send thousands of them every month, hoping to catch innocent victims off guard.<\/p>\n<p>But let\u2019s be clear\u2014sextortion may not have been the scammer\u2019s real intention. These emails aren\u2019t delivered exclusively to you. They are often sent to large numbers of people in similar situations. Scammers claim they\u2019ve hacked your devices and have evidence of you visiting pornographic sites. Why do they do this? Simple: they want your money, and these emails are a tool designed to intimidate and manipulate.<\/p>\n<p>We\u2019re going to explore what\u2019s behind these fishy, poorly written emails and how to determine whether you should seek professional help or simply delete them.<\/p>\n<h2 data-pm-slice=\"1 1 []\"><span class=\"ez-toc-section\" id=\"Why_Did_I_Get_a_Sextortion_Email\"><\/span>Why Did I Get a Sextortion Email?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p data-pm-slice=\"1 1 []\">Regardless of the websites you visit during your private time, it is unlikely that spyware has been installed on your device to let a scammer take control of your webcam. The link in the email claiming to show the scammer\u2019s \u201cevidence\u201d is almost certainly a malware link.<\/p>\n<p>If clicked, this link may install malicious software, giving the scammer access to your device and enabling them to gather personal information for real extortion attempts.<\/p>\n<p>We\u2019re not trying to scare you, but scammers will. They may claim to have accessed your browser history or taken a video of you visiting certain sites, increasing the likelihood that you\u2019ll comply with their demands. They might say something like, \u201cBecause you\u2019ve been poking around those shady sites, I\u2019ve snagged some valuable info about you, and I\u2019ve seen it all.\u201d<\/p>\n<p>Scammers use psychological tactics to play with your mind. Most likely, any personal information they have on you came from a data breach. While this situation may feel like it\u2019s your fault, it\u2019s not. These scammers are skilled manipulators who use fear and guilt to get under your skin. It\u2019s upsetting and inhuman, which is why we want to help you learn how to deal with sextortion emails.<\/p>\n<h3 data-pm-slice=\"1 1 []\"><span class=\"ez-toc-section\" id=\"But_What_if_the_Threat_Is_Real\"><\/span>But What if the Threat Is Real?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p data-pm-slice=\"1 1 []\">Sextortion emails can be real, but legitimate threats have a different structure. In a genuine sextortion case, the blackmailer is usually more willing to share the content they have and will likely provide specific details about how they plan to expose you.<\/p>\n<p>If you receive a legitimate threat, review where you\u2019ve shared sensitive content. Such threats are often the result of a catfishing scam that has escalated.<\/p>\n<p>In this case, please reach out to our <a href=\"\/blog\/sextortion\/how-to-report-a-sextortion-email\/\">Sextortion Helpline<\/a> for insights and proper next steps.<\/p>\n<h3 data-pm-slice=\"1 1 []\"><span class=\"ez-toc-section\" id=\"What_Does_a_Sextortion_Email_Look_Like\"><\/span>What Does a Sextortion Email Look Like?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p data-pm-slice=\"1 1 []\">These emails often include your email address, full name, and possibly other details like a picture of your house or a link. For example:<\/p>\n<p>If you don\u2019t have a webcam, have it covered with tape, or the sender doesn\u2019t provide proof of their claims, the email is 100% a scam. If they include a link to a supposed video or gallery, don\u2019t click it. Their goal is to gain further access to your device or information.<\/p>\n<p>Not all suspicious emails are legitimate threats. Learning to identify the signs of a real sextortion email is the next step to strengthening your digital defenses.]<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Example_of_a_Sextortion_Email\"><\/span>Example of a Sextortion Email.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<figure id=\"attachment_4595\" aria-describedby=\"caption-attachment-4595\" style=\"width: 593px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4595 size-full\" src=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Scammer-Email-Base-Image.png\" alt=\"Sample email containing a sextortion threat. \" width=\"593\" height=\"674\" srcset=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Scammer-Email-Base-Image.png 593w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Scammer-Email-Base-Image-132x150.png 132w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Scammer-Email-Base-Image-264x300.png 264w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Scammer-Email-Base-Image-512x582.png 512w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><figcaption id=\"caption-attachment-4595\" class=\"wp-caption-text\">A sample sextortion email commonly referred to as the &#8220;Hello Pervert&#8221; email<\/figcaption><\/figure>\n<p>As demonstrated in a previous case handled by Digital Investigations, the email contains clues indicating it is not a legitimate sextortion email.<\/p>\n<ol>\n<li>The blackmailer\u2019s story is inconsistent. In the email, they claim to have hacked the victim&#8217;s router but also state they used the victim\u2019s password to gain access. This inconsistency strongly suggests that the data used for this email blast originates from a data breach.<\/li>\n<li>The sender requests payment through a hyperlink embedded in the words &#8220;Click Here To Pay,&#8221; attempting to obscure their true intentions. However, most scammers prefer payment methods that are harder to trace, making a payment link like this suspicious and unlikely.<\/li>\n<\/ol>\n<p>Using this information, we determined that the email was likely part of a malware campaign. After scanning the email, our team identified its source and took appropriate action on behalf of the target.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_To_Do_If_You_Receive_A_Sextortion_Email\"><\/span>What To Do If You Receive A Sextortion Email.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ol>\n<li><strong>Do Not Reply to the Email!<\/strong> If you\u2019ve already opened it, don\u2019t worry. Simply avoid engaging with the sender, clicking links, or downloading attachments.<\/li>\n<li><strong>Report the Email.<\/strong> If you\u2019ve reported it, congratulate yourself on taking a huge step forward. If not, you can report it directly to the FBI\u2019s Internet Crime Complaint Center or the Federal Trade Commission.<\/li>\n<li><strong>Cover Your Webcam.<\/strong> It may sound silly, but using a sticker or tape over your webcam can provide peace of mind. Also, secure your accounts by changing passwords regularly and enabling two-factor authentication (2FA).<\/li>\n<li><strong>Seek Professional Help if the Threat Is Legitimate.<\/strong> If scammers have real content about you or you engaged with them by replying, consider seeking help from cybersecurity experts like Digital Investigations. Our team can verify and secure your devices and digital systems. Contact our Sextortion Helpline for immediate assistance.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"We_Can_Help_You\"><\/span>We Can Help You.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p data-pm-slice=\"1 1 []\">Take a deep breath. Intrusive thoughts of guilt can be overwhelming, but remember: you did nothing wrong. You are a victim, just like the thousands of others that received that email. This situation won\u2019t ruin your life. Lean on our team to help you. With just a quick scan of the email header, we can determine the source of the threat and whether or not there is the need for additional help in protecting your reputation. Connect with us today.<\/p>\n<p><strong>Resources<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.independent.co.uk\/tech\/hello-pervert-email-scam-message-b2593444.html\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/www.independent.co.uk\/tech\/hello-pervert-email-scam-message-b2593444.html<\/a><\/li>\n<li><a href=\"https:\/\/netsafe.org.nz\/scams\/fake-sextortion-email-scam\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/netsafe.org.nz\/scams\/fake-sextortion-email-scam<\/a><\/li>\n<li><a href=\"https:\/\/www.eff.org\/deeplinks\/2024\/09\/new-email-scam-includes-pictures-your-house-dont-fall-it\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/www.eff.org\/deeplinks\/2024\/09\/new-email-scam-includes-pictures-your-house-dont-fall-it<\/a><\/li>\n<\/ul>\n<p><strong>DISCLAIMER: THIS POST IS FOR INFORMATIONAL PURPOSES ONLY AND IS NOT TO BE CONSIDERED LEGAL ADVICE ON ANY SUBJECT MATTER. DIGITAL INVESTIGATIONS CORP. IS NOT A LAWFIRM AND DOES NOT PROVIDE LEGAL ADVICE OR SERVICES.<\/strong>\u00a0By viewing posts, the reader understands there is no attorney-client relationship, the post should not be used as a substitute for legal advice from a licensed professional attorney, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation.<\/p>\n<ol>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"Two words: \u201cHello, pervert.\u201d They may sound familiar if you\u2019ve received a sextortion email. This phrase is designed&hellip;","protected":false},"author":1,"featured_media":4592,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-3348","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sextortion","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What To Do With A Sextortion Email? Effective Strategies and Tips<\/title>\n<meta name=\"description\" content=\"Discover how to tell if a sextortion threat is real or part of a malware attempt in this article What to do with a sextortion email.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What To Do With Sextortion Email? Effective Strategies and Tips\" \/>\n<meta property=\"og:description\" content=\"Discover Actionable Steps On What To Do With Sextortion Emails, Including Practical Strategies &amp; Expert Advice To Safeguard Your Online Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/\" \/>\n<meta property=\"og:site_name\" content=\"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PDInvestigate\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-10T19:51:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2023\/05\/what-to-do-with-sextortion-email.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Derek J. Langford\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What To Do With Sextortion Email? Effective Strategies and Tips\" \/>\n<meta name=\"twitter:description\" content=\"Discover Actionable Steps On What To Do With Sextortion Emails, Including Practical Strategies &amp; Expert Advice To Safeguard Your Online Security\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2023\/05\/what-to-do-with-sextortion-email.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:site\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek J. Langford\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/\"},\"author\":{\"name\":\"Derek J. Langford\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\"},\"headline\":\"What To Do With Sextortion Emails? Effective Strategies and Tips\",\"datePublished\":\"2024-04-19T00:00:00+00:00\",\"dateModified\":\"2025-04-10T19:51:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/\"},\"wordCount\":1088,\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/DI-Sextortion-Email-Redo_.png\",\"articleSection\":[\"Sextortion Victim Support\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/\",\"name\":\"What To Do With A Sextortion Email? Effective Strategies and Tips\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/DI-Sextortion-Email-Redo_.png\",\"datePublished\":\"2024-04-19T00:00:00+00:00\",\"dateModified\":\"2025-04-10T19:51:23+00:00\",\"description\":\"Discover how to tell if a sextortion threat is real or part of a malware attempt in this article What to do with a sextortion email.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/DI-Sextortion-Email-Redo_.png\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/DI-Sextortion-Email-Redo_.png\",\"width\":512,\"height\":384,\"caption\":\"Sextortion emails can be real or they could be a malware attack, lean what separates them here.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/what-to-do-with-a-sextortion-email\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What To Do With Sextortion Emails? Effective Strategies and Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"name\":\"Articles on Sextortion & Blackmail - Expert Advice on the Blog\",\"description\":\"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less\",\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\",\"name\":\"Digital Investigations\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"width\":216,\"height\":65,\"caption\":\"Digital Investigations\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PDInvestigate\",\"https:\\\/\\\/x.com\\\/PDInvestigate\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/digitalinvestigation\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCc5KctfM3-tMserIsMhWUrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\",\"name\":\"Derek J. Langford\",\"description\":\"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.\",\"sameAs\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What To Do With A Sextortion Email? Effective Strategies and Tips","description":"Discover how to tell if a sextortion threat is real or part of a malware attempt in this article What to do with a sextortion email.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/","og_locale":"en_US","og_type":"article","og_title":"What To Do With Sextortion Email? Effective Strategies and Tips","og_description":"Discover Actionable Steps On What To Do With Sextortion Emails, Including Practical Strategies & Expert Advice To Safeguard Your Online Security","og_url":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/","og_site_name":"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog","article_publisher":"https:\/\/www.facebook.com\/PDInvestigate","article_published_time":"2024-04-19T00:00:00+00:00","article_modified_time":"2025-04-10T19:51:23+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2023\/05\/what-to-do-with-sextortion-email.jpg","type":"image\/jpeg"}],"author":"Derek J. Langford","twitter_card":"summary_large_image","twitter_title":"What To Do With Sextortion Email? Effective Strategies and Tips","twitter_description":"Discover Actionable Steps On What To Do With Sextortion Emails, Including Practical Strategies & Expert Advice To Safeguard Your Online Security","twitter_image":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2023\/05\/what-to-do-with-sextortion-email.jpg","twitter_creator":"@PDInvestigate","twitter_site":"@PDInvestigate","twitter_misc":{"Written by":"Derek J. Langford","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/#article","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/"},"author":{"name":"Derek J. Langford","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82"},"headline":"What To Do With Sextortion Emails? Effective Strategies and Tips","datePublished":"2024-04-19T00:00:00+00:00","dateModified":"2025-04-10T19:51:23+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/"},"wordCount":1088,"publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Sextortion-Email-Redo_.png","articleSection":["Sextortion Victim Support"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/","url":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/","name":"What To Do With A Sextortion Email? Effective Strategies and Tips","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/#primaryimage"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Sextortion-Email-Redo_.png","datePublished":"2024-04-19T00:00:00+00:00","dateModified":"2025-04-10T19:51:23+00:00","description":"Discover how to tell if a sextortion threat is real or part of a malware attempt in this article What to do with a sextortion email.","breadcrumb":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/#primaryimage","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Sextortion-Email-Redo_.png","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/04\/DI-Sextortion-Email-Redo_.png","width":512,"height":384,"caption":"Sextortion emails can be real or they could be a malware attack, lean what separates them here."},{"@type":"BreadcrumbList","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/what-to-do-with-a-sextortion-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalinvestigation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What To Do With Sextortion Emails? Effective Strategies and Tips"}]},{"@type":"WebSite","@id":"https:\/\/digitalinvestigation.com\/blog\/#website","url":"https:\/\/digitalinvestigation.com\/blog\/","name":"Articles on Sextortion & Blackmail - Expert Advice on the Blog","description":"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less","publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalinvestigation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalinvestigation.com\/blog\/#organization","name":"Digital Investigations","url":"https:\/\/digitalinvestigation.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","width":216,"height":65,"caption":"Digital Investigations"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PDInvestigate","https:\/\/x.com\/PDInvestigate","https:\/\/www.linkedin.com\/company\/digitalinvestigation","https:\/\/www.youtube.com\/channel\/UCc5KctfM3-tMserIsMhWUrg"]},{"@type":"Person","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82","name":"Derek J. Langford","description":"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.","sameAs":["https:\/\/digitalinvestigation.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/comments?post=3348"}],"version-history":[{"count":11,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3348\/revisions"}],"predecessor-version":[{"id":5494,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3348\/revisions\/5494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media\/4592"}],"wp:attachment":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media?parent=3348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/categories?post=3348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/tags?post=3348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}