{"id":9560,"date":"2026-02-13T10:54:39","date_gmt":"2026-02-13T10:54:39","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=9560"},"modified":"2026-02-13T20:13:10","modified_gmt":"2026-02-13T20:13:10","slug":"sextortion-report-press-release","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/","title":{"rendered":"Digital Forensics Corp. 2025 Sextortion Report and Case Study Findings"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-foreword\"><span class=\"ez-toc-section\" id=\"FOREWORD\"><\/span><strong>FOREWORD<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>At Digital Forensics Corp., our mission is to provide clients with exceptional cybersecurity solutions and expert guidance to navigate the complexities of cybercrime. Every case we handle and every resource we share is backed by our team of licensed private investigators, certified forensic examiners, and ethical hackers, who bring extensive knowledge of digital threats, security protocols, and forensic methodologies.<\/p>\n\n\n\n<p>This report is designed to equip victims, law enforcement, and the public with critical insights into this growing issue. It offers seasoned expertise and proactive strategies to combat today&#8217;s most prevalent sextortion threats. Utilizing court-approved forensic applications and software, our team ensures precise and legally sound digital investigations that stand up to scrutiny.<br>We take pride in upholding the highest standards of professionalism, ethics, and confidentiality, ensuring that our clients feel secure and supported every step of the way.<br><strong><a href=\"\/blog\/author\/sean1\/\">Sean Quellos<\/a><\/strong> Senior Forensic Engineer Digital Forensics Corp.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1333\" height=\"1902\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/Frame-1.svg\" alt=\"RESOURCES FOR VICTIMS\" class=\"wp-image-14329\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>At Digital Forensics Corp., we have long been at the forefront of cybersecurity, helping individuals and organizations safeguard their digital lives against cyber threats. However, in recent years, one crime has risen at an alarming rate\u2026sextortion.<br>As a cybersecurity firm, we first encountered sextortion through distressed clients seeking help in reclaiming control over their digital presence. This form of online blackmail, where perpetrators manipulate victims into paying money in exchange for silence, has become a growing epidemic with devastating financial and emotional consequences.<br>Recognizing the scale of the issue, we expanded our services to provide remediation and support for victims, helping them mitigate the damage and seek justice.<br>This report is based on a small collection of processed cases from December 2024 through January 2025. It aims to demystify sextortion by breaking down real-world data. This includes who is being targeted, cyber criminals&#8217; chosen platforms, and the financial toll victims face. Our analysis of nearly 1,000 sextortion cases revealed some troubling trends.<br>While the numbers are staggering, there is a way forward. If you or someone you know is a victim of sextortion, <strong>DO NOT PAY YOUR BLACKMAILER<\/strong>. These crimes thrive on secrecy, and compliance only encourages further exploitation. Instead, the incident should be reported to local law enforcement agencies specializing in cybercrime. Digital evidence can be traced, and intervention is possible.<br>At Digital Forensics Corp., we remain committed to combating this cybercrime by providing victims with the tools and support to reclaim control. We hope this report serves as both a warning and a resource in the fight against sextortion.<\/p>\n\n\n\n<p><br><strong>RESOURCES FOR VICTIMS<\/strong><br>Sextortion impacts people of all ages. If you or someone you love is targeted, please seek help from the following organizations.<br><strong>Resources for Adults:<\/strong><br>\u2022 FBI Internet Crime Complaint Center (IC3)<br>\u2022 ic3.gov or call 1-800-CALL-FBI<br><strong>Resources for Minors:<\/strong><br>\u2022 National Center for Missing &amp; Exploited Children<br>\u2022 <a href=\"https:\/\/report.cybertip.org\/\" target=\"_blank\">https:\/\/report.cybertip.org\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p><a href=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/DFC_sextortion_2025.pdf\" target=\"_blank\">DOWNLOAD THE FULL REPORT HERE<\/a><\/p><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-executive-summary\"><span class=\"ez-toc-section\" id=\"EXECUTIVE_SUMMARY\"><\/span>EXECUTIVE SUMMARY<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Sextortion has rapidly evolved into one of the most prevalent and financially devastating forms of cybercrime. As a leading cybersecurity firm, Digital Forensics Corp. has worked closely with victims seeking remediation, uncovering alarming patterns in how these crimes occur, who is being targeted, and the scale of financial loss.<br>This report, based on 942 cases analyzed over two months, provides critical insights into the mechanics of sextortion, shedding light on the platforms exploited, the demographic groups most at risk, and the tactics used by perpetrators.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-takeaways\"><span class=\"ez-toc-section\" id=\"TAKEAWAYS\"><\/span>TAKEAWAYS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>&nbsp;Sextortion thrives on secrecy and fear. Many victims comply out of desperation, believing that paying will stop the threats, but compliance often leads to repeated demands.<br>If you or someone you know is being targeted:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Do not pay your blackmailer<\/strong>. Paying only encourages further exploitation.<\/li>\n\n\n\n<li><strong>Document all communications<\/strong> (screenshots, emails, messages) as potential evidence.<\/li>\n\n\n\n<li><strong>Report the crime immediately<\/strong> to law enforcement agencies that specialize in cybercrime.<\/li>\n\n\n\n<li><strong>Seek professional cybersecurity assistance<\/strong> to secure your digital accounts and prevent further breaches.<\/li>\n<\/ol>\n\n\n\n<p><em>*Values based on a sample dataset of 942 cases collected between December 2024 and January 2025, providing a focused analysis of emerging sextortion threats within this period.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-findings\"><span class=\"ez-toc-section\" id=\"KEY_FINDINGS\"><\/span>KEY FINDINGS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>98.83%<\/strong> &#8211; Of processed cases involved perpetrators demanding money in exchange for not leaking the victim&#8217;s content.<br><strong>62%<\/strong> &#8211; Of victims complied with their blackmailer&#8217;s initial demands, emboldening criminals and fueling repeat threats.<br><strong>98%<\/strong> &#8211; Of victims never reported the crime to law enforcement, with even less reporting to platform administrators, allowing perpetrators to continue exploiting others.<\/p>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/key_findings_vs.svg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/key_findings_s%E2%80%A8.svg\"\n      alt=\"KEY FINDINGS SEXTORTION REPORT 2025\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-victims\"><span class=\"ez-toc-section\" id=\"THE_VICTIMS\"><\/span>THE VICTIMS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Sextortion is often misunderstood. Many assume that victims are primarily women or minors, or that only those who engage in risky online behavior are at risk. Instead, it is an indiscriminate crime that can target anyone, regardless of gender, age, or background. The perpetrators behind these schemes do not select victims based on reckless behavior. They exploit social engineering techniques to trick victims into sending their intimate content.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-who-is-most-at-risk\"><span class=\"ez-toc-section\" id=\"WHO_IS_MOST_AT_RISK\"><\/span>WHO IS MOST AT RISK<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Sextortion does not discriminate\u2014it affects people of all ages, backgrounds, and digital habits. However, our data reveals a stark divide between younger and older victims. <strong>Those under 40 make up 59.32% of cases, while those 40 and older account for 40.68%.This trend suggests that younger adults are at the highest risk<\/strong>, likely due to their active presence on dating apps, social media, and messaging platforms. Meanwhile, older victims may be targeted through scams that exploit financial stability and professional reputations.<br>Younger victims were heavily represented in our study of sextortion cases, with the <strong>highest percentage of victims falling between 18-24 years old<\/strong>. These individuals are more likely to engage in online interactions, including dating apps, casual social media exchanges, and private messaging platforms. Many may also lack awareness of the tactics used by scammers, making them more vulnerable.<br>While older adults were less frequently targeted than their younger counterparts, older victims still represent a significant share of cases. Many in this category are approached under the guise of professional or romantic interest, particularly through platforms like Facebook, LinkedIn, or encrypted messaging apps. Scammers may use long-term grooming tactics, building trust before initiating tactics to gain intimate content and blackmail their victims.<br><strong>Age Breakdown: Under 40 vs. Over 40<\/strong><br>\u2022 Victims Under 40 (59.32% \/ 560 Cases)<br>\u2022 Victims Over 40 (40.68% \/ 384 Cases)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sextortion-cases-based-on-age\"><span class=\"ez-toc-section\" id=\"SEXTORTION_CASES_BASED_ON_AGE\"><\/span>SEXTORTION CASES BASED ON AGE<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"3676\" height=\"1825\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/SEXTORTION-CASES-BASED-ON-AGE.svg\" alt=\"SEXTORTION CASES BASED ON AGE\" class=\"wp-image-14336\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-gender-of-targets\"><span class=\"ez-toc-section\" id=\"GENDER_OF_TARGETS\"><\/span>GENDER OF TARGETS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Based on responses from those surveyed, perpetrators overwhelmingly targeted men, a fact that contradicts the common belief that online exploitation primarily affects women.<br>While women are often thought to be at greater risk in terms of image based sexual abuse, this data reveals that men, particularly young men, are the most frequent targets of financial sextortion.<br>Understanding who is most at risk is only part of the picture, equally important is recognizing how these schemes unfold. The next section delves into the tactics used by perpetrators, exploring how they initiate contact, build trust, and ultimately manipulate victims into compliance.<\/p>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/gender_of_targets_vs.svg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/gender_of_targets_s.svg\"\n      alt=\"Gender of targets - SEXTORTION REPORT 2025\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-where-it-begins\"><span class=\"ez-toc-section\" id=\"WHERE_IT_BEGINS\"><\/span>WHERE IT BEGINS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Sextortion schemes do not happen by chance, they start with carefully planned interactions on specific digital platforms. The data in this report shows that sextortion cases originate in a variety of different digital platforms including social media, messaging apps, and dating platforms. While these services were designed to foster connection, scammers have weaponized them.<br>Our analysis of 933 cases of those surveyed reveals the following about applications where cybercriminals hunt for new targets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-platforms-used-by-scammers\"><span class=\"ez-toc-section\" id=\"PLATFORMS_USED_BY_SCAMMERS\"><\/span>PLATFORMS USED BY SCAMMERS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/different-types-of-sextortion\/\">Sextortion schemes<\/a> span multiple digital platforms, with <strong>14.79% of cases starting on dating apps<\/strong>, where scammers exploit intimacy. <strong>Messaging apps account for 11.15%<\/strong>, providing direct access to victims, while social media (5.68%) enables fraud through fake personas. The largest share <strong>(68.38%) comes from emails, SMS, text messages, job fraud, and gaming platforms<\/strong>, proving sextortion is not confined to a single space, scammers strike wherever they can gain control.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2251\" height=\"1825\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/PLATFORMS-USED-BY-SCAMMERS.svg\" alt=\"PLATFORMS USED BY SCAMMERS\" class=\"wp-image-14334\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sextortion-cases-by-initial-contact-platform\"><span class=\"ez-toc-section\" id=\"Sextortion_Cases_by_Initial_Contact_Platform\"><\/span>Sextortion Cases by Initial Contact Platform<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Platforms include<\/strong>: <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/dating-apps-with-no-sextortion-risk\/\">Dating Apps<\/a>, Messaging Apps, Social Media Apps, Emails, Text Messages, Forums, Gaming Platforms<br><strong>Specific platforms shown<\/strong>: Other Dating Apps, Emails, Bumble (Dating), <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/discord-sextortion\/\">Discord<\/a> (Messaging), Forums, <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/tiktok-sextortion-how-to-protect-yourself\/\">TikTok<\/a> (Social Media), WhatsApp (Messaging), Tinder (Dating), <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/what-is-kik-scam-how-to-avoid-blackmail-on-kik\/\">Kik<\/a> (Messaging), Instagram (Social Media), Telegram (Messaging), Ashley Madison (Dating), Gaming Platforms, Text Messages, Hinge (Dating), <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/grindr-sextortion-resources-for-victims\/\">Grindr<\/a> (Dating), <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/stop-snapchat-sextortion\/\">Snapchat<\/a> (Messaging), Other Social Media Apps, Other Messaging Apps<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\" id=\"h-dating-applications\"><span class=\"ez-toc-section\" id=\"DATING_APPLICATIONS\"><\/span>DATING APPLICATIONS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Dating apps are a major target for sextortion, with scammers exploiting intimacy to gain leverage. <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/grindr-sextortion-resources-for-victims\/\">Grindr<\/a> (31%) and <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/blackmail-on-ashley-madison\/\">Ashley Madison<\/a> (25%) lead in cases, followed by <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/tinder-sextortion-how-to-protect-yourself-if-youre-a-victim-of-sextortion-on-tinder\/\">Tinder<\/a>, <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/hinge-sextortion\/\">Hinge<\/a>, and <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/bumble-sextortion\/\">Bumble<\/a>. Scammers build trust quickly, then coerce victims, often urging them to switch to encrypted apps. Users should stay alert for rushed intimacy and suspicious requests.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2251\" height=\"1825\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/DATING-APPLICATIONS.svg\" alt=\"SEXTORTION - DATING APPLICATIONS\" class=\"wp-image-14328\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\" id=\"h-social-media-applications\"><span class=\"ez-toc-section\" id=\"SOCIAL_MEDIA_APPLICATIONS\"><\/span>SOCIAL MEDIA APPLICATIONS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Social media platforms play a key role in sextortion, with scammers posing as influencers or attractive strangers to lure victims. <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/stop-sextortion-on-facebook\/\">Facebook<\/a> (42%) and <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/instagram-sextortion\/\">Instagram<\/a> (21%) account for most cases, where direct messaging enables rapid exploitation. Users should be wary of unsolicited messages, sudden escalations in intimacy, and requests to move conversations to private messaging apps, common tactics used in sextortion schemes.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2251\" height=\"1825\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/SOCIAL-MEDIA-APPLICATIONS.svg\" alt=\"SEXTORTION - SOCIAL MEDIA APPLICATIONS\" class=\"wp-image-14335\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-impact\"><span class=\"ez-toc-section\" id=\"THE_IMPACT\"><\/span>THE IMPACT<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Sextortion is not just a psychological and emotional burden; it also comes with significant financial consequences. Over 62% of victims surveyed complied with financial demands, with reported losses ranging from under $500 to over $100,000.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-financial-loss\"><span class=\"ez-toc-section\" id=\"FINANCIAL_LOSS\"><\/span>FINANCIAL LOSS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The average financial loss per victim was $2,390.60, though scammers often escalate their demands once initial payments are made. Paying rarely stops the threats\u2014instead, victims are frequently targeted for more money.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-hidden-cost-long-term-damage\"><span class=\"ez-toc-section\" id=\"The_Hidden_Cost_Long-Term_Damage\"><\/span>The Hidden Cost: Long-Term Damage<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Beyond financial loss, victims experience severe emotional distress, social withdrawal, and reputational fears. Many suffer ongoing harassment, even after payment. With 98% of cases unreported, scammers continue to exploit victims without consequence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-takeaway-never-pay-the-blackmailer\"><span class=\"ez-toc-section\" id=\"Key_Takeaway_Never_Pay_the_Blackmailer\"><\/span>Key Takeaway: Never Pay the Blackmailer.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Sextortion thrives on fear and secrecy, but compliance only emboldens criminals. If targeted, victims should delay payment, document threats, and report the crime immediately to law enforcement and cybersecurity professionals.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-among-victims-who-paid-the-blackmailer-the-frequency-of-threats-was-alarming\"><span class=\"ez-toc-section\" id=\"Among_victims_who_paid_the_blackmailer_the_frequency_of_threats_was_alarming\"><\/span>Among victims who paid the blackmailer, the frequency of threats was alarming:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Among victims who paid the blackmailer, the frequency of threats was alarming:<br>\u2022 39.59% received threats daily after complying.<br>\u2022 26.11% were targeted weekly with further demands.<br>\u2022 24.06% were harassed multiple times per day.<br>These figures highlight that paying does not stop the threats &#8211; instead, it often escalates the extortion. Scammers continue to demand more, trapping victims in a cycle of financial and psychological distress.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"3676\" height=\"1825\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/FREQUENCY-OF-THREATS.svg\" alt=\"FREQUENCY FREQUENCY OF THREATS\" class=\"wp-image-14333\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-financial-loss-distribution\"><span class=\"ez-toc-section\" id=\"Financial_Loss_Distribution\"><\/span>Financial Loss Distribution:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"3000\" height=\"2134\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/02\/Frame-9.svg\" alt=\"FINANCIAL LOSS - DISTRIBUTION\" class=\"wp-image-14332\"\/><\/figure>\n\n\n\n<p><em>*Values and percentages based on 586 responses where the victim advised they&#8217;d paid some amount to their blackmailer.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-appendix-a-definitions\"><span class=\"ez-toc-section\" id=\"APPENDIX_A_DEFINITIONS\"><\/span>APPENDIX A: DEFINITIONS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/financial-sextortion-how-to-protect-yourself-and-where-to-turn-for-help\/\">Financial Sextortion<\/a><\/strong>: A form of online blackmail where a perpetrator threatens to distribute intimate images, videos, or AI generated content unless the victim complies with demands for payment in exchange for silence.<br><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/sextortion-vs-sexploitation\/\">Sexploitation\/Content Sextortion<\/a><\/strong>: A form of online blackmail where a perpetrator threatens to distribute intimate images, videos, or <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/combating-ai-scams\/\">AI generated scam<\/a> content unless the victim complies with demands for additional sexual content or favors from the victim.<br><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/avoid-online-blackmail\/\">Online Blackmail<\/a><\/strong>: The act of using private, sensitive, or compromising information to extort money, services or compliance form an individual<br><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/cyber-extortion\/\">Cyber Extortion<\/a><\/strong>: A broader term for digital threats involving ransom demands, such as threats to expose private data, hack accounts, or release damaging material.<br><a href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/revenge-porn\/\">Revenge Porn<\/a>: The non-consensual distribution of intimate images, often as an act of revenge or coercion.<br><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/\">Catfishing<\/a><\/strong>: An act of fraud where a person creates a fake online identity to trick others into relationships, scams, or financial fraud.<br><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-role-of-deepfakes-in-sextortion\/\">Deepfake<\/a><\/strong>: AI generated media, often used maliciously to create fake explicit images or videos of victims.<br><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/ai-sextortion\/\">AI-Generated Sextortion Scams<\/a><\/strong>: A broad term used to define the use of artificial intelligence to complete one or multiple actions in a sextortion scam. This may include creation of content, voice cloning, or generative response.<br><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/how-to-remove-content-online\/\">Content Removal Services<\/a><\/strong>: Professional services that assist victims in removing non-consensual content from online platforms.<br><\/li>\n\n\n\n<li><strong>Law Enforcement Agencies for Cybercrime<\/strong>: Government entities such as the FBI&#8217;s <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/\">Internet Crime Complaint Center (IC3)<\/a> in the United States or the National Cyber Security Center (NCSC) in the UK, which investigate cyber extortion cases.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-appendix-b-additional-information-regarding-data\"><span class=\"ez-toc-section\" id=\"APPENDIX_B_ADDITIONAL_INFORMATION_REGARDING_DATA\"><\/span>APPENDIX B: ADDITIONAL INFORMATION REGARDING DATA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Values based on a sample dataset of 942 cases collected between December 2024 and January 2025, providing a focused analysis of emerging sextortion threats within this period.<\/li>\n\n\n\n<li>As appropriate, <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/real-sextortion-cases-examining-the-harsh-reality\/\">cases of sextortion<\/a> reported to DFC are reviewed with the type of crime adjusted based on the details of the case.<\/li>\n\n\n\n<li>Cases are classified as sextortion based on the threat of exposure if not compensated financially. Cases where the blackmailer requests additional content are filed as sexploitation.<\/li>\n\n\n\n<li>Platform of initial contact is designated as the platform where the victim believes they met and shared their content with the blackmailer.<\/li>\n\n\n\n<li>Platform of initial threat is designated as the platform where the victim received the first threat of exposure if not compensated.<\/li>\n\n\n\n<li>Losses reported in foreign currencies are converted to U.S. dollars when possible.<\/li>\n\n\n\n<li>No cases were filed more than once in an effort to avoid the possibility of duplicate reports.<\/li>\n\n\n\n<li>To maintain confidentiality and protect client identities, some data has been redacted from DFC&#8217;s findings.<\/li>\n\n\n\n<li>DFC is committed to providing further analysis concerning sextortion and other emerging cybercrimes in future reports.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-about-digital-forensics-corp\"><span class=\"ez-toc-section\" id=\"ABOUT_DIGITAL_FORENSICS_CORP\"><\/span>ABOUT DIGITAL FORENSICS CORP.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Digital Forensics Corp. (DFC) is a leading cybersecurity and digital forensics firm specializing in cybercrime investigation, data security, and online threat mitigation. With years of experience handling complex cyber threats, DFC has become a trusted partner for individuals, businesses, and law enforcement agencies seeking to combat digital fraud, extortion, and cyber exploitation.<br>If you or someone you know is facing sextortion or any other form of cybercrime, do not engage with the perpetrator. Instead, report the incident to law enforcement and seek expert guidance. DFC is here to help.<br>We will continue to publish information on sextortion and other emerging cybercrimes in future reports.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-disclaimer\"><span class=\"ez-toc-section\" id=\"DISCLAIMER\"><\/span>DISCLAIMER<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>All information presented by Digital Forensics Corp. is provided for educational purposes only. Any case studies, examples, or discussions do not disclose the identities of any clients or individuals. DFC maintains strict confidentiality and adheres to ethical and legal standards in all cybersecurity and investigative practices.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.digitalforensics.com\/\">digitalforensics.com<\/a><\/strong> | Toll-Free: <a href=\"tel:+18008496515\">800.849.6515<\/a><br>\u00a9 Digital Forensics Corporation. All rights reserved. Digital Forensics and its logo are trademarks, registered Trademarks, and\/or service marks of Digital Forensics Corp. In the U.S. and\/or other countries. All other brand or product names are the property of their respective owners.<\/p>\n","protected":false},"excerpt":{"rendered":"FOREWORD At Digital Forensics Corp., our mission is to provide clients with exceptional cybersecurity solutions and expert guidance&hellip;","protected":false},"author":130,"featured_media":11822,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[12],"tags":[],"class_list":{"0":"post-9560","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Sextortion Report 2025: Digital Forensics Corp. Case Study<\/title>\n<meta name=\"description\" content=\"A detailed study of sextortion in the United States, current as of 2025. Digital Forensics Corp. Sextortion Report\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DFC Launches New Sextortion Report For 2025\" \/>\n<meta property=\"og:description\" content=\"A detailed study of sextortion in the United States, current as of 2025. Digital Forensics Corp. Sextortion Report\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-13T10:54:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-13T20:13:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/Sextortion_Report_2025-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jacquelyne Diab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"DFC Launches New Sextortion Report For 2025\" \/>\n<meta name=\"twitter:description\" content=\"A detailed study of sextortion in the United States, current as of 2025. Digital Forensics Corp. Sextortion Report\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/Sextortion_Report_2025.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jacquelyne Diab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/\"},\"author\":{\"name\":\"Jacquelyne Diab\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/781d212e875f755bdb12b0225c2e2b59\"},\"headline\":\"Digital Forensics Corp. 2025 Sextortion Report and Case Study Findings\",\"datePublished\":\"2026-02-13T10:54:39+00:00\",\"dateModified\":\"2026-02-13T20:13:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/\"},\"wordCount\":2311,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Sextortion_Report_2025.jpg\",\"articleSection\":[\"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/\",\"name\":\"Sextortion Report 2025: Digital Forensics Corp. Case Study\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Sextortion_Report_2025.jpg\",\"datePublished\":\"2026-02-13T10:54:39+00:00\",\"dateModified\":\"2026-02-13T20:13:10+00:00\",\"description\":\"A detailed study of sextortion in the United States, current as of 2025. Digital Forensics Corp. Sextortion Report\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Sextortion_Report_2025.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Sextortion_Report_2025.jpg\",\"width\":2560,\"height\":1120,\"caption\":\"Sextortion Report 2025\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/sextortion-report-press-release\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Digital Forensics Corp. 2025 Sextortion Report and Case Study Findings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/781d212e875f755bdb12b0225c2e2b59\",\"name\":\"Jacquelyne Diab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/00010353a0805fa68df52d1c445554d92a3be1964b260e211510481fadd42c62?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/00010353a0805fa68df52d1c445554d92a3be1964b260e211510481fadd42c62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/00010353a0805fa68df52d1c445554d92a3be1964b260e211510481fadd42c62?s=96&d=mm&r=g\",\"caption\":\"Jacquelyne Diab\"},\"description\":\"Jacquelyne Diab As the Chief Operating Officer for Digital Forensics Corp. Jacquelyne\u2019s mission has been to cultivate an environment of professionalism and excellence within the Digital Forensics Corp. brand. Since joining DFC as the Director of Human Resources in 2021, she has been instrumental in elevating the organization. Her strategic vision has driven significant growth in both the company\u2019s brand recognition and the expansion of its service offerings for businesses and individual victims of cybercrime. With a strong background in talent acquisition, Jacquelyn continuously demonstrates a keen ability to build high-performing teams. She is a member of national organizations such as the Society for Human Resource Management (SHRM), reflecting her commitment to professional excellence. Recognizing the urgent need for proactive education, Jacquelyne has dedicated herself to collaborating with various educational programs in the fight against sextortion, bringing critical awareness and preventative strategies to the forefront.\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jacquelynecoo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sextortion Report 2025: Digital Forensics Corp. Case Study","description":"A detailed study of sextortion in the United States, current as of 2025. Digital Forensics Corp. Sextortion Report","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/","og_locale":"en_US","og_type":"article","og_title":"DFC Launches New Sextortion Report For 2025","og_description":"A detailed study of sextortion in the United States, current as of 2025. Digital Forensics Corp. Sextortion Report","og_url":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2026-02-13T10:54:39+00:00","article_modified_time":"2026-02-13T20:13:10+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/Sextortion_Report_2025-1.jpg","type":"image\/jpeg"}],"author":"Jacquelyne Diab","twitter_card":"summary_large_image","twitter_title":"DFC Launches New Sextortion Report For 2025","twitter_description":"A detailed study of sextortion in the United States, current as of 2025. Digital Forensics Corp. Sextortion Report","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/Sextortion_Report_2025.jpg","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jacquelyne Diab","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/"},"author":{"name":"Jacquelyne Diab","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/781d212e875f755bdb12b0225c2e2b59"},"headline":"Digital Forensics Corp. 2025 Sextortion Report and Case Study Findings","datePublished":"2026-02-13T10:54:39+00:00","dateModified":"2026-02-13T20:13:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/"},"wordCount":2311,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/Sextortion_Report_2025.jpg","articleSection":["News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/","url":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/","name":"Sextortion Report 2025: Digital Forensics Corp. Case Study","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/Sextortion_Report_2025.jpg","datePublished":"2026-02-13T10:54:39+00:00","dateModified":"2026-02-13T20:13:10+00:00","description":"A detailed study of sextortion in the United States, current as of 2025. Digital Forensics Corp. Sextortion Report","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/Sextortion_Report_2025.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/Sextortion_Report_2025.jpg","width":2560,"height":1120,"caption":"Sextortion Report 2025"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/sextortion-report-press-release\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams","item":"https:\/\/www.digitalforensics.com\/blog\/news\/"},{"@type":"ListItem","position":3,"name":"Digital Forensics Corp. 2025 Sextortion Report and Case Study Findings"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/781d212e875f755bdb12b0225c2e2b59","name":"Jacquelyne Diab","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/00010353a0805fa68df52d1c445554d92a3be1964b260e211510481fadd42c62?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/00010353a0805fa68df52d1c445554d92a3be1964b260e211510481fadd42c62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/00010353a0805fa68df52d1c445554d92a3be1964b260e211510481fadd42c62?s=96&d=mm&r=g","caption":"Jacquelyne Diab"},"description":"Jacquelyne Diab As the Chief Operating Officer for Digital Forensics Corp. Jacquelyne\u2019s mission has been to cultivate an environment of professionalism and excellence within the Digital Forensics Corp. brand. Since joining DFC as the Director of Human Resources in 2021, she has been instrumental in elevating the organization. Her strategic vision has driven significant growth in both the company\u2019s brand recognition and the expansion of its service offerings for businesses and individual victims of cybercrime. With a strong background in talent acquisition, Jacquelyn continuously demonstrates a keen ability to build high-performing teams. She is a member of national organizations such as the Society for Human Resource Management (SHRM), reflecting her commitment to professional excellence. Recognizing the urgent need for proactive education, Jacquelyne has dedicated herself to collaborating with various educational programs in the fight against sextortion, bringing critical awareness and preventative strategies to the forefront.","url":"https:\/\/www.digitalforensics.com\/blog\/author\/jacquelynecoo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/9560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/130"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=9560"}],"version-history":[{"count":56,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/9560\/revisions"}],"predecessor-version":[{"id":14368,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/9560\/revisions\/14368"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/11822"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=9560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=9560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=9560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}