{"id":10984,"date":"2025-05-15T12:36:55","date_gmt":"2025-05-15T12:36:55","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=10984"},"modified":"2025-08-05T21:09:01","modified_gmt":"2025-08-05T21:09:01","slug":"what-to-do-if-you-get-an-email-threatening-to-leak-a-video","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/","title":{"rendered":"Email Claiming to Have Videos of Me &#8211; What to Do When They Threaten Exposure"},"content":{"rendered":"\n<p>Email is a tool that is often exploited by cybercriminals. According to a 2025 study from Digital Forensics Corp., email is one of the most used <a href=\"\/blog\/news\/sextortion-report-press-release\/\">platforms for extortion.<\/a> A recent and growing tactic involves a scammer sending an email claiming to have videos of a victim. These claims of surveillance and video recordings can be terrifying to face. However, the claims are rarely what they seem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-email-scam-threatening-to-expose-video\"><span class=\"ez-toc-section\" id=\"What_Is_the_Email_Scam_Threatening_to_Expose_Video\"><\/span>What Is the Email Scam Threatening to Expose Video<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>This cybercrime begins with a direct email from the cybercriminal. The email contains a terrifying statement \u2014 that they have hacked your device and captured an incriminating video using your webcam. They typically claim to have recorded the explicit footage while you were browsing adult websites. The message will also make threats to send the video to your family or friends within hours. The only way to stop them from exposing the video is to pay the perpetrators as soon as possible.<\/p>\n\n\n\n<p>However, it\u2019s rare that the cybercriminal actually possesses anything incriminating on the victim. The email claiming to have videos of you may be a direct result of a data breach exposing your contact information. These emails threatening to release videos are typically empty threats. They send their emails to hundreds of people, hoping that the message aligns with someone\u2019s real-life behavior. All it takes is one person to believe the message for the scheme to be effective.<\/p>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/01\/Red_Flags_of_Fake_Video_Email_Threats-1-scaled.jpg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/01\/Red_Flags_of_Fake_Video_Email_Threats-scaled.jpg\"\n      alt=\"Red Flags of Fake Video Email Threats - Infographics\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-variations-of-the-email-video-threat-scam\"><span class=\"ez-toc-section\" id=\"Variations_of_the_Email_Video_Threat_Scam\"><\/span>Variations of the Email Video Threat Scam<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Some of the emails claiming to have videos of victims are designed with different purposes. The criminals may not rely solely on threats to force compliance. Instead, they may include a malicious link or attachment as an added email video threat tactic. Furthermore, some sophisticated campaigns now reference <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/\">fake video calls<\/a> or AI-generated clips to trick you into believing they have actual footage from your camera. When you click on the link or attachment, malware is deployed onto your device. This gives the perpetrator access to your sensitive data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-the-email-claiming-to-have-filmed-me-includes-personal-details\"><span class=\"ez-toc-section\" id=\"Why_the_Email_Claiming_to_Have_Filmed_Me_Includes_Personal_Details\"><\/span>Why the Email Claiming to Have Filmed Me Includes Personal Details<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Another email video threat tactic involves using the personal details of the victim \u2014 found in data breaches or on public profiles \u2014 to seem more credible. This can include full names, phone numbers, addresses, home photos, and more. Scammers do this to make the message feel real, even though the entire threat is fake.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-email-saying-someone-has-video-of-me-sent-from-my-own-account\"><span class=\"ez-toc-section\" id=\"Email_Saying_Someone_Has_Video_of_Me_Sent_From_My_Own_Account\"><\/span>Email Saying Someone Has Video of Me Sent From My Own Account<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Some victims have even received emails claiming to have videos of them from their own address. Cybercriminals pull off this email video tactic by spoofing their email addresses to appear as though they\u2019ve hacked into the target\u2019s email account. It\u2019s a scare tactic that feeds into their fake story that they have been spying on you.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recognizing-fake-video-email-threats\"><span class=\"ez-toc-section\" id=\"Recognizing_Fake_Video_Email_Threats\"><\/span>Recognizing Fake Video Email Threats<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Emails saying someone has a video of you are rarely targeted or personal. It\u2019s more likely that your email was a part of a huge spam campaign sent to hundreds of users. These scammers typically follow a similar script, repeating common email video threat tactics that can also be easily identifiable warning signs. If you receive an email claiming to have videos of you, look for the following red flags.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The email will make threats without any proof. <\/strong>An email claiming to have videos of you will often make threats without including any actual proof. The message relies on fear and intimidation to pressure you into compliance.<\/li>\n\n\n\n<li><strong>They include an old password. <\/strong>The fake email saying they have a video of you rarely includes the incriminating video or image. However, they will use other personal information to make the threat seem real. This could include an old password exposed in a data breach or an image of your home from Google Maps.<\/li>\n\n\n\n<li><strong>The email comes from your own address. <\/strong>If you receive an email that seems like it\u2019s coming from your own address, you should verify the source. Check the sender information to see if it matches your own. You should also check your \u201cSent\u201d folder for any unfamiliar messages.<\/li>\n\n\n\n<li><strong>Awkward phrasing and misspellings. <\/strong>Many of these fake emails are created by people who are not fluent in English. They tend to make repeated errors like phrasing that doesn\u2019t sound natural to native speakers or misspelling words.<\/li>\n\n\n\n<li><strong>Emails will have a lot of urgency. <\/strong>Criminals intend to make their victims panic with their threats. They use urgent deadlines and imminent exposure to pressure victims into acting without thinking.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-to-do-about-an-email-threatening-to-release-videos\"><span class=\"ez-toc-section\" id=\"What_to_Do_About_an_Email_Threatening_to_Release_Videos\"><\/span>What to Do About an Email Threatening to Release Videos<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you receive an email video threat, you need to keep a clear head. It\u2019s important to remember that most email video threats are empty and that criminals depend on scare tactics. Whether the email is real or not, there are steps you should take to protect yourself. Here is what you should do if you receive an email threatening to release videos of you.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Look for signs of account breaches. <\/strong>The cybercriminal may have used information from a data breach to gain access to your email account. Check for any strange activity, such as a changed password, unfamiliar logins, or suspicious emails.<\/li>\n\n\n\n<li><strong>Collect evidence. <\/strong>Take screenshots of the conversations with the perpetrator. Be sure to include all the information you can provide, including the date and time. This can help the police establish a timeline of events.<\/li>\n\n\n\n<li><strong>Notify the email service provider and FTC. <\/strong>Make sure to report the email to the platform provider. This could lead to the sender getting blacklisted or blocked.<\/li>\n\n\n\n<li><strong>Seek help from law enforcement. <\/strong>Your local police department is a valuable resource for victims. Even if the criminal is making empty threats, many departments have cybercrime units that specialize in identifying anonymous perpetrators. The FBI\u2019s <a href=\"\/blog\/extortion\/report-cybercrime-to-the-fbi\/\">Internet Crime Complaint Center (IC3)<\/a> is the national hub for tracking cybercrimes. You should also report the scam to IC3 to notify the FBI and help them track national trends.<\/li>\n\n\n\n<li><strong>Work with cybersecurity professionals. <\/strong>Private cybersecurity firms can trace the criminal\u2019s digital footprint and discover any exposed information in data breaches. They will also help you strengthen the security on your devices and online accounts.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-real-life-case-ontario-woman-receives-an-email-claiming-to-have-filmed-her\"><span class=\"ez-toc-section\" id=\"Real-Life_Case_Ontario_Woman_Receives_an_Email_Claiming_to_Have_Filmed_Her\"><\/span>Real-Life Case: Ontario Woman Receives an Email Claiming to Have Filmed Her<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In 2024, an Ontario woman received an email claiming to have videos and photographs of her. The perpetrator <a href=\"https:\/\/www.ctvnews.ca\/toronto\/article\/it-was-very-unnerving-ontario-woman-receives-sextortion-email-demanding-bitcoin-or-have-compromising-photos-leaked\/\" target=\"_blank\" rel=\"noopener\">threatened to share the content<\/a> with her loved ones unless she paid the fraudster $1,900 in Bitcoin. The message stated that they remotely took over the woman\u2019s computer, recording compromising videos and images of the woman while she was visiting adult websites.<\/p>\n\n\n\n<p>The email did not contain the videos or images. However, they did include her name, home address, email, cell phone number, and an image of the street that her house is on. The woman recognized it was a scam because she never visited such websites and immediately contacted the police.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-avoid-these-mistakes-if-you-receive-an-email-threatening-to-release-your-videos\"><span class=\"ez-toc-section\" id=\"Avoid_These_Mistakes_If_You_Receive_an_Email_Threatening_to_Release_Your_Videos\"><\/span>Avoid These Mistakes If You Receive an Email Threatening to Release Your Videos<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Being targeted with claims of surveillance and incriminating recordings is frightening and can cause significant emotional distress. Many victims feel compelled to pay the ransom to protect themselves in case the cybercriminal is telling the truth. However, that would be a mistake. Just as there are actions you should take, there are also many behaviors that can make the situation worse. The following are examples of what you shouldn\u2019t do when receiving an email claiming to have videos of you.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/do-blackmailers-give-up-if-you-ignore-them\/\">Don\u2019t ignore Threats<\/a>. <\/strong>If you\u2019re being targeted in an email video scam, it\u2019s likely that your information was exposed in a data breach. They may attempt to access your online accounts or steal financial information.<\/li>\n\n\n\n<li><strong>Don\u2019t pay. <\/strong>You should never comply with a cybercriminal\u2019s demands. Not only does this encourage them to demand more money from you, but it also may make their threats more aggressive.<\/li>\n\n\n\n<li><strong>Don\u2019t respond or delete the email. <\/strong>Any reply to the email claiming to have videos of you only enables the perpetrator to make more demands. However, deleting the message is also discouraged. Doing so removes any digital footprint the perpetrator may have left behind. It\u2019s best to preserve the email for law enforcement or cybercrime experts to use in their investigations.<\/li>\n\n\n\n<li><strong>Don\u2019t click on links or attachments. <\/strong>Always exercise caution with all links and attachments, especially those coming from unfamiliar email addresses. They may contain malicious content and can create an even larger issue.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-update-your-password-and-enable-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"Update_Your_Password_and_Enable_Two-Factor_Authentication\"><\/span>Update Your Password and Enable Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When it comes to receiving an email claiming to have videos of you, it\u2019s best to assume that your personal information was involved in a data breach. Perpetrators may even include an old password in their threatening email to make the message feel more legitimate, often trying to convince you that <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/hacked-and-blackmailed\/\">you\u2019ve been hacked and blackmailed<\/a> even when they have no real access to your device. You need to update all your passwords to ensure your accounts are secure. Enabling two-factor authentication is also an essential step in preventing hackers from gaining access to your accounts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-digital-forensic-corp-supports-victims-of-email-video-threats\"><span class=\"ez-toc-section\" id=\"How_Digital_Forensic_Corp_Supports_Victims_of_Email_Video_Threats\"><\/span>How Digital Forensic Corp. Supports Victims of Email Video Threats<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you are a victim of <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/identifying-the-signs-of-a-real-sextortion-email\/\">email blackmail or sextortion threats<\/a>, you don\u2019t have to go through the experience alone. At Digital Forensic Corp., our mission is to protect individuals from bad actors looking to exploit them. We are available 24\/7 to help victims of cybercrimes.<\/p>\n\n\n\n<p>Don\u2019t panic if you have received an email claiming to have videos of you. <a href=\"\/blog\/online-blackmail\/top-resources-for-victims-of-online-blackmail\/\">Contact DFC Blackmail Helpline<\/a> today to have experts working alongside you to protect your privacy and fight back against the culprit.<\/p>\n","protected":false},"excerpt":{"rendered":"Email is a tool that is often exploited by cybercriminals. According to a 2025 study from Digital Forensics&hellip;","protected":false},"author":132,"featured_media":10985,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[767],"tags":[],"class_list":{"0":"post-10984","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sextortion-online","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Email Threatening to Expose a Video? We Help to Spot the Scam!<\/title>\n<meta name=\"description\" content=\"Email claiming to have videos of me? Get expert help to spot the scam, protect your data, and act with confidence at every step.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to Do if You Get an Email Threatening to Leak a Video\" \/>\n<meta property=\"og:description\" content=\"Got an email claiming to have a video of you? Learn what steps to take and how to protect yourself from email sextortion threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-15T12:36:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T21:09:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Email-Threatening-to-Expose-Video-10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benjamin Carpenter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What to Do if You Get an Email Threatening to Leak a Video\" \/>\n<meta name=\"twitter:description\" content=\"Got an email claiming to have a video of you? Learn what steps to take and how to protect yourself from email sextortion threats.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Email-Threatening-to-Expose-Video-3.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benjamin Carpenter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/\"},\"author\":{\"name\":\"Benjamin Carpenter\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/773c64cac299aa62d21e9e41427e37b6\"},\"headline\":\"Email Claiming to Have Videos of Me &#8211; What to Do When They Threaten Exposure\",\"datePublished\":\"2025-05-15T12:36:55+00:00\",\"dateModified\":\"2025-08-05T21:09:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/\"},\"wordCount\":1626,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Email-Threatening-to-Expose-Video-3.jpg\",\"articleSection\":[\"Resources for Victims of Internet Sextortion\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/\",\"name\":\"Email Threatening to Expose a Video? We Help to Spot the Scam!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Email-Threatening-to-Expose-Video-3.jpg\",\"datePublished\":\"2025-05-15T12:36:55+00:00\",\"dateModified\":\"2025-08-05T21:09:01+00:00\",\"description\":\"Email claiming to have videos of me? Get expert help to spot the scam, protect your data, and act with confidence at every step.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Email-Threatening-to-Expose-Video-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Email-Threatening-to-Expose-Video-3.jpg\",\"width\":1280,\"height\":560,\"caption\":\"Email Threatening to Expose Video\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources for Victims of Internet Sextortion\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Claiming to Have Videos of Me &#8211; What to Do When They Threaten Exposure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/773c64cac299aa62d21e9e41427e37b6\",\"name\":\"Benjamin Carpenter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"caption\":\"Benjamin Carpenter\"},\"description\":\"Cybercrime Content Strategist and Victim Advocacy Writer \\\"Online abuse can happen to anyone \u2014 my job is to make sure they know what to do next.\\\" \u2014 Benjamin Carpenter &#xa0; Benjamin Carpenter is a digital safety content specialist dedicated to empowering individuals and organizations with the knowledge and tools to defend themselves against cybercriminals. With a background in communication and a deep understanding of online threats, Benjamin focuses on creating content that bridges the gap between a general unawareness of cyber threats and application of the best online safety practices. &#xa0; Expertise Benjamin\u2019s work centers around some of the most pressing and emotionally charged areas in cybersecurity today: \u2022 Data breach response and regulatory compliance \u2022 Legal protections against non-consensual image sharing (NCII) \u2022 Blackmail and sextortion response strategies \u2022 Victim-centered resources and education \u2022 Analysis of trending cybercrime tactics &#xa0; Role at Digital Forensics Corp. At Digital Forensics Corp., Benjamin plays a critical role in creating valuable educational content for victims, families, and corporate teams. He collaborates with cybercrime experts and legal professionals to ensure accuracy, and his work helps readers navigate crises with confidence. Benjamin\u2019s content has become a go-to resource for individuals facing cybercrime, and he has developed subject-matter depth in: \u2022 Sextortion and blackmail targeting minors and adults \u2022 U.S. and international legislation related to image-based sexual abuse \u2022 Incident response frameworks for individuals, families, and organizations under attack &#xa0; Notable Publications &amp; Projects \u2022 \u201cSextortion Targeting Minors: A Booklet for Parents\u201d \u2013 A parent-friendly resource on how to identify warning signs, talk to children at risk, and prevent manipulation by online predators. \u2022 LinkedIn Educational Campaign for IT Security Professionals \u2013 A content series exploring digital privacy law, NCII laws, and organizational incident response plans. \u2022 \u201cSextortion: A Comprehensive Guide\u201d \u2013 A long-form resource going through sextortion tactics, victim support organizations, and the value of cybercrime experts. &#xa0; Professional Values Benjamin believes digital safety content should be practical, empathetic, and transparent. His approach combines: \u2022 Insights from cybersecurity experts \u2022 Real accounts from cybercrime victims \u2022 Empirical data from industry research &#xa0; Education \u2022 B.S. in Communication and Media Studies Ohio University &#xa0;\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/benjamin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Email Threatening to Expose a Video? We Help to Spot the Scam!","description":"Email claiming to have videos of me? Get expert help to spot the scam, protect your data, and act with confidence at every step.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/","og_locale":"en_US","og_type":"article","og_title":"What to Do if You Get an Email Threatening to Leak a Video","og_description":"Got an email claiming to have a video of you? Learn what steps to take and how to protect yourself from email sextortion threats.","og_url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-05-15T12:36:55+00:00","article_modified_time":"2025-08-05T21:09:01+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Email-Threatening-to-Expose-Video-10.jpg","type":"image\/jpeg"}],"author":"Benjamin Carpenter","twitter_card":"summary_large_image","twitter_title":"What to Do if You Get an Email Threatening to Leak a Video","twitter_description":"Got an email claiming to have a video of you? Learn what steps to take and how to protect yourself from email sextortion threats.","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Email-Threatening-to-Expose-Video-3.jpg","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Benjamin Carpenter","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/"},"author":{"name":"Benjamin Carpenter","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/773c64cac299aa62d21e9e41427e37b6"},"headline":"Email Claiming to Have Videos of Me &#8211; What to Do When They Threaten Exposure","datePublished":"2025-05-15T12:36:55+00:00","dateModified":"2025-08-05T21:09:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/"},"wordCount":1626,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Email-Threatening-to-Expose-Video-3.jpg","articleSection":["Resources for Victims of Internet Sextortion"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/","url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/","name":"Email Threatening to Expose a Video? We Help to Spot the Scam!","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Email-Threatening-to-Expose-Video-3.jpg","datePublished":"2025-05-15T12:36:55+00:00","dateModified":"2025-08-05T21:09:01+00:00","description":"Email claiming to have videos of me? Get expert help to spot the scam, protect your data, and act with confidence at every step.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Email-Threatening-to-Expose-Video-3.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Email-Threatening-to-Expose-Video-3.jpg","width":1280,"height":560,"caption":"Email Threatening to Expose Video"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-you-get-an-email-threatening-to-leak-a-video\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources for Victims of Internet Sextortion","item":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/"},{"@type":"ListItem","position":3,"name":"Email Claiming to Have Videos of Me &#8211; What to Do When They Threaten Exposure"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/773c64cac299aa62d21e9e41427e37b6","name":"Benjamin Carpenter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","caption":"Benjamin Carpenter"},"description":"Cybercrime Content Strategist and Victim Advocacy Writer \"Online abuse can happen to anyone \u2014 my job is to make sure they know what to do next.\" \u2014 Benjamin Carpenter &#xa0; Benjamin Carpenter is a digital safety content specialist dedicated to empowering individuals and organizations with the knowledge and tools to defend themselves against cybercriminals. With a background in communication and a deep understanding of online threats, Benjamin focuses on creating content that bridges the gap between a general unawareness of cyber threats and application of the best online safety practices. &#xa0; Expertise Benjamin\u2019s work centers around some of the most pressing and emotionally charged areas in cybersecurity today: \u2022 Data breach response and regulatory compliance \u2022 Legal protections against non-consensual image sharing (NCII) \u2022 Blackmail and sextortion response strategies \u2022 Victim-centered resources and education \u2022 Analysis of trending cybercrime tactics &#xa0; Role at Digital Forensics Corp. At Digital Forensics Corp., Benjamin plays a critical role in creating valuable educational content for victims, families, and corporate teams. He collaborates with cybercrime experts and legal professionals to ensure accuracy, and his work helps readers navigate crises with confidence. Benjamin\u2019s content has become a go-to resource for individuals facing cybercrime, and he has developed subject-matter depth in: \u2022 Sextortion and blackmail targeting minors and adults \u2022 U.S. and international legislation related to image-based sexual abuse \u2022 Incident response frameworks for individuals, families, and organizations under attack &#xa0; Notable Publications &amp; Projects \u2022 \u201cSextortion Targeting Minors: A Booklet for Parents\u201d \u2013 A parent-friendly resource on how to identify warning signs, talk to children at risk, and prevent manipulation by online predators. \u2022 LinkedIn Educational Campaign for IT Security Professionals \u2013 A content series exploring digital privacy law, NCII laws, and organizational incident response plans. \u2022 \u201cSextortion: A Comprehensive Guide\u201d \u2013 A long-form resource going through sextortion tactics, victim support organizations, and the value of cybercrime experts. &#xa0; Professional Values Benjamin believes digital safety content should be practical, empathetic, and transparent. His approach combines: \u2022 Insights from cybersecurity experts \u2022 Real accounts from cybercrime victims \u2022 Empirical data from industry research &#xa0; Education \u2022 B.S. in Communication and Media Studies Ohio University &#xa0;","url":"https:\/\/www.digitalforensics.com\/blog\/author\/benjamin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/132"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=10984"}],"version-history":[{"count":13,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10984\/revisions"}],"predecessor-version":[{"id":13012,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10984\/revisions\/13012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/10985"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=10984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=10984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=10984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}