• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 

U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

 | 

Microsoft issues emergency patches for SharePoint zero-days exploited in "ToolShell" attacks

 | 

SharePoint zero-day CVE-2025-53770 actively exploited in the wild

 | 

Singapore warns China-linked group UNC3886 targets its critical infrastructure

 | 

U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 54

 | 

Security Affairs newsletter Round 533 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Radiology Associates of Richmond data breach impacts 1.4 million people

 | 

Fortinet FortiWeb flaw CVE-2025-25257 exploited hours after PoC release

 | 

Authorities released free decryptor for Phobos and 8base ransomware

 | 

Anne Arundel Dermatology data breach impacts 1.9 million people

 | 

LameHug: first AI-Powered malware linked to Russia’s APT28

 | 

5 Features Every AI-Powered SOC Platform Needs in 2025

 | 

Broadcom patches critical VMware flaws exploited at Pwn2Own Berlin 2025

 | 

Stormous Ransomware gang targets North Country HealthCare, claims 600K patient data stolen

 | 

United Natural Foods Expects $400M revenue impact from June cyber attack

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • FBI warns on sextortion scams targeting teenagers

FBI warns on sextortion scams targeting teenagers

Pierluigi Paganini July 05, 2019

The Federal Bureau of Investigation (FBI) issued a warning on Twitter regarding sextortion campaigns that are targeting teenagers in the United States.

The FBI issued a warning on Twitter regarding sextortion attacks that are targeting teenagers in the United States.

The internet connects you with the world. Do you know who in the world is connecting with you? Sending one explicit image can start a scary cycle. Don’t send photos to anyone you don’t know in real life, and don’t be afraid to ask for help. #StopSextortion https://t.co/nHe8lp2D9Z pic.twitter.com/W9E5CJ6PvT

— FBI (@FBI) July 3, 2019

A post published by Feds cites the cases of young people that were victims of the disconcerting and awful criminal practice,

“One victim was a 14-year-old boy from West Virginia. Another victim from Michigan was only 12. Yet another was a 17-year-old girl from Ohio who attempted suicide in a desperate try to escape the situation.” states the FBI.

“In total, the FBI was able to identify 20 young people who were harassed, threatened, and sexually exploited online by an Indiana man who had served as a youth minister in his community. “

The agency recommends youngsters to block or ignore anything that comes in from someone you don’t know in real life.

FBI is seeing a significant increase in activity involving sextortion, “a federal crime that happens when an adult coerces a child to produce sexually explicit photographs or video of themselves and then send it to them over the Internet.”

The police warn of possible channels used by predators to contact the young victims, such as social networks, dating chat apps, and gaming platforms.

Sextortion is a crime that involves an adult coercing a minor to create & send sexually explicit images or video. The FBI has seen an increase in sexual exploitation & sextortion against children who use the internet, ages 10-17. Help the #StopSextortion. https://t.co/nHe8lp2D9Z pic.twitter.com/ES7oeE1HSd

— FBI (@FBI) June 25, 2019

“the FBI is seeing an increasing number of cases start on connected gaming systems, where the competition is intense and the offer of game credits or codes is enough to convince a child to create an explicit image.” explained FBI Special Agent Brian Herrick.

“Whatever technique pushes the young person to produce the first image, fear, coercion, and manipulation keep the crime going. In addition to the threats and coercion of the criminal, young victims often feel that they have done something wrong and will be punished by parents or caregivers or prosecuted by law enforcement if their actions are discovered.”

The FBI provided the following answers to those interested in have more info on the sextortion scams:

What is sextortion?
Sextortion occurs when an adult, through threat or manipulation, coerces a minor into producing a sexually explicit image and sending it over the Internet.
Why would any child or teen agree to do such a thing?
The individuals carrying out this crime are skilled and ruthless and have honed their techniques and approaches to maximize their chances at success. The entry point to a young person can be any number of mobile or online sites, applications, or games. The approach may come as compliments or flattery or the pretense of beginning a romantic relationship.Another entry point is to offer the child something they value in exchange for a taking a quick picture. This could be the possibility of a modeling contract; online game credits or codes; or money, cryptocurrency, and gift cards.
The third common point of entry is to go right to threats by either claiming they already have an image of the young person that they will distribute or threatening to harm the child or other people or things the child cares about.Once the perpetrator has the first image, they use the threat of exposure or other harm to keep the child producing more and more explicit material.
But my child would never do that.
The FBI has interviewed victims as young as 8, and the crime affects children of both genders and crosses all ethnic and socioeconomic groups. The victims are honor-roll students, the children of teachers, student athletes, etc. The only common trait among victims is Internet access.
Why don’t the victims tell someone or ask for help?
The cycle of victimization continues because the child is afraid—afraid of the repercussions threatened by the criminal and afraid they will be in trouble with their parents, guardians, or law enforcement. By the time a child is a victim, they have done something that may be generating deep feelings of shame and embarrassment. The criminal may also be telling them they have produced child pornography and will be prosecuted for it. In addition, they may fear their access to their phone or computer will be taken away from them as a result of their actions.
How do I protect the young people I know?
Information-sharing and open lines of communication are the best defense. Young people need to know this crime is happening and understand where the risks are hiding. Explain to the children in your life that people can pretend to be anyone or anything online, a stranger reaching out to them online may be doing so with bad intent, and no matter what the platform or application claims, nothing “disappears” online. If they take a photo or video, it always has the potential to become public.
You may choose to place certain limits on your children’s Internet use or spot check their phones and other devices to see what applications they are using and with whom they are communicating. This can be part of an open and ongoing conversation about what it and is not appropriate online. It also may be worth considering a rule against devices in bedrooms overnight or shutting off Wi-Fi access in the overnight hours. Caregivers may also want to review the settings on a young person’s social media accounts with them. Keeping accounts private can prevent predators from gathering their personal information.
The other crucial element is to keep the door open to your child so that they know he or she can come to you and ask for help. Let them know that your first move will be to help—always. These predators are powerful because of fear and the victims suffer ever more negative consequences as the crime carries on over days, weeks, and months.If you are the adult a child trusts with this information, comfort them, help them understand they have been the victim of a crime, and help them report it to law enforcemen
t.

Victims can contact the FBI through the following channels:

• To report suspected sextortion, call the nearest FBI field office or 1-800-CALL-FBI (225-5324).
• To make a CyberTipline Report with the National Center for Missing & Exploited Children (NCMEC), visit report.cybertip.org.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – FBI, sextortion)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

Cybercrime FBI hacking news information security news Pierluigi Paganini Security Affairs Security News sextortion

you might also like

Pierluigi Paganini July 22, 2025
SharePoint under fire: new ToolShell attacks target enterprises
Read more
Pierluigi Paganini July 22, 2025
CrushFTP zero-day actively exploited at least since July 18
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SharePoint under fire: new ToolShell attacks target enterprises

    Hacking / July 22, 2025

    CrushFTP zero-day actively exploited at least since July 18

    Hacking / July 22, 2025

    Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

    Security / July 22, 2025

    MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

    APT / July 21, 2025

    U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

    Hacking / July 21, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT