Online sextortion — where criminals coerce minors into sharing explicit images and then use those images to extort money or further exploitation — is one of the fastest-growing threats facing children today. In 2025, the National Center for Missing and Exploited Children (NCMEC) received 1.4 million reports of online enticement, a 156% increase from the previous year. At least 36 teenage boys have died by suicide after being victimized. Every parent needs to understand how this crime works and what they can do to prevent it.
What Is Online Sextortion?
Sextortion occurs when someone — typically an adult predator posing as a teenager — manipulates a minor into sharing sexually explicit images or videos, then threatens to distribute those images unless the victim pays money or provides additional explicit content. There are two primary forms:
- Financial sextortion: The predator demands money, gift cards, or cryptocurrency in exchange for not sharing the images. This form has exploded in recent years, with reports jumping from 13,842 in the first half of 2024 to 23,593 in the first half of 2025 — a 71% increase.
- Sexual sextortion: The predator demands additional explicit images or sexual acts, using the initial material as leverage for ongoing exploitation.
Both forms are federal crimes. Both cause devastating psychological harm. And both are far more common than most parents realize — according to a 2025 report by the child safety nonprofit Thorn, 1 in 5 teens have experienced sextortion.
Boys Are the Primary Targets of Financial Sextortion
While sextortion affects children of all genders, financial sextortion overwhelmingly targets teenage boys. Boys ages 14 to 17 represent 90% of detected victims of financial sextortion. Many parents assume their sons are less vulnerable to online sexual exploitation than their daughters, but the data shows the opposite is true for this specific crime. Talk to your sons about this threat — their lives may depend on it.
How Predators Operate
Understanding how sextortion schemes work is essential to helping your child recognize and avoid them. Here is the typical pattern:
Step 1: Initial Contact
The predator creates a fake profile, usually posing as an attractive teenager. They send a friend request or direct message to the target on social media. According to NCMEC data, Instagram is the platform of initial contact in 45% of financial sextortion cases, followed by Snapchat at 32%. Together, those two platforms account for more than three-quarters of all initial sextortion contacts with minors. Predators also target victims through gaming platforms like Roblox and Discord, as well as messaging apps.
Step 2: Building Trust
The predator engages in conversation, compliments the victim, and builds a sense of connection. This phase can last hours or days. The predator may move the conversation to a different platform — commonly Snapchat or Google Chat — where they believe monitoring is less likely.
Step 3: Soliciting Images
Once trust is established, the predator steers the conversation toward sexual content. They may share fake explicit images first to normalize the exchange, or dare the victim to send something. Many teens do not realize they are being manipulated until it is too late.
Step 4: Extortion
The moment the predator has explicit material, the tone changes immediately. They threaten to send the images to the victim's friends, family, school, or post them publicly unless the victim pays — usually through Venmo, Cash App, gift cards, or cryptocurrency. The demands escalate. Paying does not make it stop. It only leads to more demands.
Who Is Behind This?
These are not isolated predators. NCMEC data shows that the perpetrators of financial sextortion are predominantly members of organized criminal networks concentrated in Nigeria (47% of identified perpetrators) and Cote d'Ivoire. They operate at scale, targeting hundreds of victims simultaneously.
The Rise of AI-Generated Sextortion
A disturbing new trend has emerged: predators no longer need real explicit images to extort victims. Using widely available AI deepfake tools, criminals can generate realistic fake explicit images of a child using nothing more than their publicly available social media photos. The victim may never have shared anything inappropriate, yet the predator creates convincing fake material and threatens to distribute it.
In 2025, NCMEC reported a surge in reports involving AI-generated child sexual abuse material. This development means that any child with a public social media profile is potentially vulnerable — even those who have never shared explicit content.
Warning Signs Your Child May Be a Victim
Children who are being sextorted often feel intense shame and fear. They may not come to you for help because they believe they will get in trouble. Watch for these signs:
- Sudden withdrawal from family and friends
- Unexplained anxiety, depression, or mood changes
- Secretive behavior around their phone or computer
- Staying up late on devices, especially if the behavior is new
- Requests for money they cannot explain
- Declining grades or loss of interest in activities
- Expressions of hopelessness or talk of self-harm
If you notice these signs, approach your child with compassion, not anger. Making them feel safe to talk is the most important thing you can do.
How to Protect Your Child
Have the Conversation Early and Often
The single most effective protection is open, ongoing communication. Talk to your children about sextortion before they encounter it. Make sure they know:
- Predators create fake profiles that look like real teenagers
- Anyone who asks for explicit images — even someone they think they know — could be a criminal
- If something goes wrong, they can come to you without fear of punishment
- Paying a sextortionist never makes it stop — it always gets worse
- This is not their fault — they are the victim of a crime
Lock Down Social Media and Online Accounts
- Set all accounts to private so strangers cannot view photos or send direct messages
- Turn off location data on social media and nonessential apps
- Use initials or nicknames instead of full names on profiles
- Avoid posting identifying details like school names, team uniforms, or home locations
- Disable friend/follower requests from strangers on platforms that allow it
Establish Device Rules
- Keep phones and devices out of bedrooms at night — the majority of sextortion contacts happen during unsupervised late-night hours
- Use parental controls appropriate to your child's age
- Know which apps and platforms your child uses — predators follow teens to the newest platforms
- Cover or disable webcams when not actively in use
Reduce Your Family's Digital Footprint
Predators use publicly available personal information to research their targets and make their threats more convincing. When a criminal can tell your child they know their home address, school, or family members' names, the threats become terrifyingly specific and harder to ignore.
Remove the Personal Data Predators Use
Data broker sites publish your family's names, addresses, phone numbers, and other personal details that predators exploit to threaten victims. PrivacyOn monitors and removes your information from 100+ data broker sites and provides dark web monitoring to alert you if your family's data appears in breach databases. Family plans cover up to 5 people — protecting both parents and children — starting at just $8.33 per month with 24/7 continuous monitoring. Removing this data takes away a key tool predators use to intimidate their victims.
What to Do If Your Child Is Being Sextorted
If your child tells you they are being sextorted, or if you discover it on your own, take these steps immediately:
- Stay calm and reassure your child. Tell them this is not their fault and they are not in trouble. Your reaction in this moment determines whether they will continue to communicate with you or shut down.
- Stop all communication with the predator. Do not respond, do not pay, and do not try to negotiate. Block the account but do not delete the conversation.
- Preserve all evidence. Screenshot all messages, profiles, payment requests, and threats before anything is deleted. Note usernames, platform names, and timestamps.
- Report to the platform. Use the in-app reporting tools on Instagram, Snapchat, or whatever platform was used. Request removal of any shared explicit content.
- File a report with NCMEC. Submit a CyberTipline report at report.cybertip.org or call 1-800-843-5678. NCMEC works directly with law enforcement and platforms to investigate these cases and remove content.
- Contact the FBI. Call your nearest FBI field office or the FBI tip line at 1-800-CALL-FBI (1-800-225-5324). Sextortion is a federal crime and the FBI actively investigates these cases.
- Contact local law enforcement. File a report with your local police department as well.
- Seek professional support. Connect your child with a therapist or counselor experienced in trauma. The emotional impact of sextortion is severe, and professional help can be critical.
If your child is in immediate danger or expressing thoughts of self-harm, call 988 (the Suicide and Crisis Lifeline) or text "HELLO" to 741741 (the Crisis Text Line).
This Threat Is Not Going Away
Online sextortion is growing more sophisticated and more widespread every year. Organized criminal networks are scaling their operations. AI tools are giving predators new capabilities. And children are spending more time online than ever before.
But parents are not powerless. Open communication, strong privacy settings, established device rules, and reducing your family's digital footprint all make your child a harder target. And if the worst happens, knowing exactly what to do — report, preserve evidence, and get help — can make the difference between a crisis that escalates and one that gets resolved.
Start the conversation with your child today. It may be uncomfortable, but it is far less painful than the alternative.