A new wave of sextortion scams uses personal data and images to intimidate targets and bypass traditional security measures.


  • Sextortion scams evolve with personalized tactics and increased intimidation.
  • Threat actors exploit billing platforms to bypass email security filters.
  • Robust email filters and training help counter Sextortion threats effectively.

Sextortion scams are becoming more complex and personal, as they now frequently target people from different sectors with greater precision, creating a sense of immediate threat.

Cofense Phish Defense Center (PDC) recently observed a notable evolution in sextortion scams, which unlike previous versions, which relied mainly on generic scare tactics, now use more sophisticated strategies, often bypassing traditional security measures.

scroll to top