InícioNewsSextortion scams become more threatening in 2025

Sextortion scams become more threatening in 2025

Sextortion scams are becoming more threatening as cybercriminals leverage artificial intelligence (AI) and large-scale data breaches to develop them in highly convincing ways. A recent analysis by Avast, a leader in digital security and privacy and part of GenTM (NASDAQ: GEN), revealed that in 2025, so far, despite being increasingly sophisticated, there has been a 26% reduction in the risk of being targeted by sextortion scams in Brazil. 

Avast researchers are observing how countries worldwide are impacted by these highly manipulative scams. In the U.S., the likelihood of being targeted by sextortion scammers increased by 137% in the first months of 2025, while the risk in Australia rose by 34%. Avast also revealed the top 10 countries most vulnerable to these scams, with Japan, Singapore, Hong Kong, South Africa, Italy, Australia, the United Arab Emirates (UAE), the UK, Switzerland, and the Czech Republic facing the highest sextortion risk rates last year.

New threatening and intrusive tactics

Criminals are refining their tactics, thanks to AI and a wealth of victims’ personal data available from recent large-scale breaches. As AI sophistication grows, the explicit extortion emails sent by scammers also become more threatening. Scammers are using AI to create “deepfake“, fake explicit photos made by superimposing a victim’s face onto another body, along with threatening messages to distribute them.

Michal Salat, Director of Threat Intelligence at Avast, highlights: “Our analysis shows that sextortion victims often receive threatening messages claiming access to their private videos and images. These scams become even more convincing with the use of stolen passwords from previous data breaches, creating an alarming sense of credibility.”

“The fear of exposure, especially when personal details seem accurate, often pressures victims into complying with ransom demands. However, we strongly advise against engaging with these scammers, no matter how real the threats may appear,” he concludes.

Using Google Maps makes the approach more invasive and personalized

One of the latest techniques used by cybercriminals involves Google Maps and is designed to employ a more invasive and personalized approach, which can truly shock and intimidate victims into complying with demands.

Criminals—using names, addresses, and emails readily available on the Dark Web due to data breaches—can craft highly targeted emails to victims containing fabricated footage, disturbing information, and real images of their homes. Scammers also claim to have gained access to victims’ devices to blackmail them, threatening to share sexual content or sensitive information. Avast cybersecurity experts have identified over 15,000 unique Bitcoin wallets linked to the Google Maps scam, though the operation’s scope is likely much larger.

Avast experts emphasize the importance of proactive protection against sextortion scams and urge people never to engage with messages that may be from scammers. The following actions help combat sextortion efforts:

  • Do not pay ransom demands or respond to threats.
  • Do not engage with these emails, texts, or calls, nor open attached PDFs.
  • Always report incidents to major cybercrime units. In Brazil, victims can contact local authorities and the Safernet Brazil National Reporting Center.
  • Use a trusted password manager to ensure unique passwords for all accounts and prevent reuse.
  • Enable multi-factor authentication (MFA) whenever possible to enhance account security.
  • Monitor your data for breaches using dark web monitoring services through products likeAvast Secure Identity, to be alerted when sensitive information is exposed and take swift action to protect your accounts.
  • Do not panic—stay informed and take steps to secure your accounts.

As sextortion scams grow more advanced, it’s crucial that people remain cautious and take steps to protect their digital privacy. Public awareness and vigilance remain critical in combating these threats.

MATÉRIAS RELACIONADAS

DEIXE UMA RESPOSTA

Por favor digite seu comentário!
Por favor, digite seu nome aqui

RECENTES

MAIS POPULARES

[elfsight_cookie_consent id="1"]