MyTakedown
← Help Center/Scams & Blackmail
🚨Scams & Blackmail

Sextortion scam — fake girl got me to send pics, now wants $300 or sends to contacts

Classic sextortion scam using fake dating profile to obtain and leverage images

8 min readUpdated Mar 2026

You matched with someone online. She was attractive, flirty, moved fast. Things escalated, you exchanged photos, and now you're getting messages threatening to send your images to everyone you know unless you pay $300. Maybe they sent a screenshot of your Instagram followers. Maybe they named your sister, your boss, your ex.

This is one of the most common scams on the internet right now. The "girl" was never real. The entire interaction — from the first message to the threat — was scripted. You are one of potentially hundreds of people this same operator is running this on today.1

🚨
Do NOT pay the $300 (or any amount)

Paying does not make this go away. It confirms you as a paying target and virtually guarantees you will be asked for more. The FBI, NCMEC, and every credible cybercrime organization says the same thing: do not pay.

How This Scam Actually Works

Understanding the mechanics takes a lot of the fear away. This isn't personal — it's a factory operation.

1
The fake profile

The scammer creates a convincing dating or social media profile using stolen photos of a real person. They swipe right on hundreds of targets or send cold DMs. The photos, the bio, the conversation style — all designed to build trust fast.

2
The rapid escalation

Within hours or days, they push toward exchanging explicit images. They send "theirs" first (stolen photos) to make you feel comfortable reciprocating. Everything moves fast because they don't want you to think too hard.

3
The screenshot of your contacts

Once they have your images, they pull your public follower/following list from Instagram, Facebook, or LinkedIn. They screenshot it and send it to you — proof they "know" your people. This is automated. They haven't actually contacted anyone.

4
The demand

Usually $200–$500 via Cash App, Venmo, Bitcoin, or gift cards. The number is deliberately low enough to feel "worth it" to make the problem disappear. That's by design.

5
The escalation (if you pay)

Pay $300 and the next demand is $500. Then $1,000. Then "one more and I'm done, I promise." There is no final payment. You are now a confirmed revenue source.

79K+
Sextortion complaints to FBI IC3 in 2023
<5%
Of scammers who actually distribute images
$300
Most common initial demand amount

Why They Almost Never Follow Through

This is the part your panic brain doesn't want you to believe, but it's true: the overwhelming majority of sextortion scammers never distribute the images. Here's why:

They want money, not revenge. Distributing your images generates zero revenue and takes effort. Every minute they spend on a non-paying target is a minute not spent finding someone who will pay.

It increases their risk. Sending explicit images to people creates more evidence, more reports, more platform bans, and more law enforcement attention. Scammers avoid anything that draws heat.

They're running volume. These operations target dozens to hundreds of people simultaneously. They cannot afford to waste time on follow-through. When you stop responding, they move to the next name on the list.

Your contacts are a prop. That screenshot of your followers? It's designed to trigger panic. In most cases, the scammer never contacts a single person on that list. It's a fear tool, not an action plan.2

â„šī¸
The psychology behind the threat

Sextortion scammers rely on your shame response overriding your logic. The $300 feels small enough to "just pay and make it go away." But the shame you feel is exactly what they are weaponizing — and it's also why they know most victims will never report it. That silence is what protects the scammer, not following through on threats.

What To Do Right Now

Immediate action plan
1
Screenshot everything first

Before you do anything else, screenshot every message, every threat, every username, every phone number, every payment request. Save these somewhere safe. You need this evidence for reports.

2
Do NOT respond to the scammer

No begging, no negotiating, no "please don't." Any response tells them you're emotionally invested and encourages them to keep pushing. Silence is your strongest weapon.

3
Block them everywhere

Block the account on the platform where they contacted you. Block any phone numbers. If they reach out from a new account, block that one too without responding.

4
Lock down your social media immediately

Set Instagram, Facebook, Twitter/X, LinkedIn, and TikTok to private. Hide your follower and following lists. Remove your email and phone number from public profiles. This cuts off their access to your contact list.

5
Report to the platform

Report the scammer's profile on whatever platform they used — Instagram, Snapchat, Tinder, Bumble, WhatsApp, etc. Most platforms have dedicated sextortion reporting flows and will remove the account quickly.

6
File an FBI IC3 report

Go to ic3.gov and file a complaint. Include all usernames, phone numbers, payment requests, screenshots, and any other details. Even if you didn't pay, your report helps law enforcement track and disrupt these networks.

7
Run a reverse image search

Use Google Images reverse search to check if your photos have appeared anywhere online. In the vast majority of cases, they haven't. This can give you peace of mind.

💡
If they contact you from a new account

Scammers sometimes create new accounts to get around blocks. Same rule applies: do not respond. Block immediately. Each attempt costs them time and effort. They give up fast when there's no engagement.

What If They Actually Do Share Your Images?

In the rare cases where images are actually distributed, the situation is still manageable. It is not the end of the world, even though it feels like it right now.

Platforms remove non-consensual intimate images quickly. Instagram, Facebook, Twitter/X, and most major platforms have dedicated reporting channels for non-consensual intimate imagery (NCII). Content is typically removed within 24-72 hours.

Most people are more understanding than you think. If someone you know receives an unsolicited explicit image from a stranger, their reaction is almost always confusion or sympathy — not judgment. The scammer is the one who looks criminal, not you.

You can file DMCA takedowns. If images appear on websites, DMCA takedown requests can force removal. This is enforceable under U.S. law and most hosting providers comply.

Proactive disclosure is powerful. Many survivors recommend telling one or two trusted people what happened. It removes the scammer's leverage entirely and gives you support.

If images have been shared or you want proactive protection, we handle content removal across platforms and search engines — fast and confidential.
Get Content Removed →

Platform-Specific Reporting

Instagram: Settings → Help → Report a Problem → Sextortion/Blackmail. Instagram also has a dedicated flow at help.instagram.com for intimate image removal.

Snapchat: Report the user's profile → select "They're blackmailing me." Snapchat has one of the faster response times for sextortion reports.

Facebook/Messenger: Report the conversation → Unauthorized use of my images. Facebook also partners with StopNCII.org for proactive image hashing.

WhatsApp: Report and block → include screenshots when prompted. WhatsApp accounts used for sextortion are typically banned quickly.

Dating apps (Tinder, Bumble, Hinge): Report the profile directly in-app. Most dating platforms cooperate with law enforcement on sextortion cases.

Ongoing Protection

After the immediate crisis passes, there are things you can do to protect yourself going forward:

1
Set up Google Alerts for your name

This is free and gives you early warning if your name or images appear in new search results.

2
Register with StopNCII.org

This service creates a hash (digital fingerprint) of intimate images so platforms can automatically detect and block them from being uploaded — without the images ever leaving your device.

3
Keep socials private for at least 30 days

Most sextortion scammers move on within 1–2 weeks. Keeping accounts private for a full month gives you a solid buffer.

4
Consider professional monitoring

If you want ongoing peace of mind, content monitoring can scan for your images across the web and dark web, alerting you immediately if anything surfaces.

“Got the exact same scam. Fake girl on Instagram, exchanged pics, then the threats started with screenshots of my followers. I panicked for three days. Blocked, reported, locked everything down. That was four months ago. Nothing ever happened. They never sent anything to anyone.”

— Reddit, r/Sextortion

Frequently Asked Questions


Free Resource
Sextortion Emergency Response Kit
Step-by-step checklist: what to do in the first 24 hours, how to lock down all accounts, where to report, and how to monitor for image distribution.
Get the Free Kit

Sources & Citations

  1. 1
    FBI Internet Crime Complaint Center: Sextortion reports have surged in recent years, with tens of thousands of complaints filed annually. FBI.gov ↗
  2. 2
    Thorn research on sextortion: The majority of offenders do not follow through on threats to distribute images when victims stop engaging. Thorn ↗
  3. 3
    NCMEC CyberTipline: Resources and reporting for minors affected by sextortion and online sexual exploitation. NCMEC ↗
  4. 4
    StopNCII.org: Free tool for creating image hashes to prevent non-consensual intimate image distribution across participating platforms. StopNCII ↗

Prevent This From Happening Again

Ongoing monitoring and protection

Still need help?

Talk to Our Team →