Are You Doing Enough to Protect Your Family from Extortion Scams?

May 23, 2025
·
4 min
deleteme

Protect yourself from future breaches

In the age of digital connectivity, the threat of extortion scams looms large over families. Cybercriminals are becoming increasingly sophisticated, targeting everyone from teenagers with sextortion scams to seniors with romance scams. This blog will guide you through understanding these scams, how to protect your loved ones, and what to do if you fall victim. With practical advice and real-world examples, you'll be equipped to safeguard your family against these digital threats.

Understanding Extortion Scams

Extortion scams aren’t just a problem for celebrities or big businesses—they strike everyday families, often when you least expect it. Extortion scams involve criminals threatening to release personal information or cause harm unless their demands, usually money, are met. With digital life taking center stage, these scams have grown more personal and aggressive.

Who Gets Targeted?

Nobody is off-limits. Scammers go after:

  • Teenagers: Through sextortion, where they trick or coerce teens into sharing private images and then demand money to keep them private.
  • Adults: Often targeted by email scams threatening to leak embarrassing information or fake legal troubles.
  • Seniors: Frequently caught up in romance or tech support scams, with threats of public shaming or financial ruin.

Common Forms of Extortion Scams

  • Sextortion: Criminals obtain or claim to have compromising photos, then threaten to share them unless paid.
  • Email-Based Threats: Victims receive emails saying their devices are hacked and their activities recorded. The scammer demands payment to “delete” the evidence.
  • Ransomware: Hackers lock up family devices and demand a ransom for access.

The Numbers Behind the Threat

The FBI’s Internet Crime Complaint Center (IC3) reported over 39,000 extortion complaints in 2022, with losses topping $107 million in the U.S. alone. Sextortion targeting minors is rising fast—according to the FBI, cases doubled between 2021 and 2022. Most victims never imagined they’d be targeted, proving how widespread and personal these attacks have become.

Extortion scams thrive on fear, secrecy, and quick reactions. Knowing the tricks behind them is the first step in protecting your family.

Protecting Children from Online Threats

Kids are growing up surrounded by screens. Tablets, smartphones, and laptops are part of their daily routine. While these devices open doors to learning and creativity, they also expose children to risks that can’t be ignored. Setting clear boundaries and using the right tools is non-negotiable for keeping them safe.

Setting Up Parental Controls Across Devices

Parental controls act as the first line of defense. They help filter inappropriate content, limit screen time, and monitor online activity. Here’s how you can set them up:

Smartphones and Tablets:

On iOS, use Screen Time to restrict apps, set downtime, and block explicit content.

On Android, Google Family Link allows you to manage app access, set device time limits, and track location.

Computers and Laptops:

Windows has built-in Family Safety settings for website filtering, time limits, and activity reports.

Mac users can use Screen Time for similar features, including setting communication limits.

Gaming Consoles:

Xbox and PlayStation offer parental controls for restricting purchases, online interactions, and game ratings.

Wi-Fi Routers:

Many routers come with parental control features that can block sites at the network level.

Tip: Regularly update device software. Outdated systems are prone to security holes.

Privacy Settings for Popular Apps: YouTube and TikTok

Children gravitate toward platforms like YouTube and TikTok, where they can easily stumble onto unsafe content or unwanted interactions.

YouTube:

Restricted Mode: Filters out potentially mature content.

YouTube Kids: A safer alternative designed specifically for younger viewers.

Comments and Chat: Disable these features to limit exposure to strangers.

TikTok:

Family Pairing: Lets parents link their account to their child’s, manage screen time, and control direct messaging.

Private Accounts: Set your child’s account to private to control who can follow and message them.

Content Filters: Enable filters for keywords and restrict who can comment on or view videos.

Be aware: Privacy settings change frequently. Review them every few months and adjust as needed.

The Importance of Communication

Tech can only do so much. Honest, open conversations with your children are critical. Kids need to know why certain rules exist and feel comfortable coming to you if something feels off.

  • Talk about online scams: Extortion scams can start with a simple friend request or message. Explain that they should never share personal details, even if someone claims to be a friend.
  • Discuss boundaries: Make it clear what’s okay to share online and what’s not.
  • Encourage reporting: If your child encounters something suspicious, they should tell you immediately—no judgment, no punishment.

Leveraging Cloaked for Extra Protection

Sometimes, even strong parental controls and conversations aren’t enough. Cloaked helps families protect their privacy by letting them create secure, disposable contact information for online sign-ups and social apps. This means less risk of your child’s real email or phone number falling into the wrong hands—a smart move for keeping unwanted contacts and phishing attempts at bay.

Bottom line: Digital safety isn’t about paranoia. It’s about being proactive, setting up practical safeguards, and maintaining trust with your child. Take the time now, and you’ll save yourself a lot of worry later.

Supporting Seniors Against Scams

Scammers often target seniors, counting on their trust and the fact that they may be less familiar with digital threats. A few practical steps can make a big difference in shielding older adults from fraud.

Common Scam Tactics and Red Flags

Seniors are frequently targeted with:

  • Phishing emails and texts: Messages that look official, claiming to be from banks, government agencies, or even family members. They ask for sensitive info or urge immediate action.
  • Fake tech support calls: Someone claims your device has a virus and offers to "fix" it—after you pay or give remote access.
  • Romance scams: Fraudsters build trust over time, then ask for money, often claiming an emergency.
  • Lottery and prize scams: You’ve “won” something, but you need to pay fees or taxes upfront.

Red flags to watch for:

  • Pressure to act immediately
  • Requests for payment via gift cards, wire transfers, or cryptocurrency
  • Poor spelling or odd grammar in messages
  • Requests for personal information (like Social Security numbers) out of the blue

Add Trusted Contacts for Oversight

When it comes to financial security, a second set of eyes is invaluable. Encourage seniors to:

  • Add a trusted family member or friend as a contact on financial accounts. Many banks allow for oversight or alert notifications without sharing full account access.
  • Set up account alerts for large transactions or changes in account details.
  • Regularly review statements with someone they trust to catch suspicious activity early.

For families using privacy tools like Cloaked, consider setting up shared alerts for new contacts or requests for sensitive information. Cloaked’s features can help manage who reaches your loved ones, reducing the odds of a scam slipping through.

Cut Down on Information Sharing

Oversharing on social media is risky at any age, but it’s an easy way for scammers to collect personal details about seniors:

  • Avoid posting birthdates, addresses, or travel plans. Even seemingly innocent info can be pieced together by scammers.
  • Limit friend requests and connections to people they know personally.
  • Review privacy settings on all social platforms. Set profiles to private and limit who can see posts.

A quick rule: If you wouldn’t share it with a stranger on the street, don’t post it online.

Seniors deserve to enjoy their retirement without worrying about digital threats. By staying alert, involving trusted contacts, and keeping personal info under wraps, families can give them the protection—and peace of mind—they deserve.

Why Paying Ransoms is Not the Answer

Paying Up Fuels the Fire

When you pay a ransom, you’re not solving the problem—you’re feeding it. Handing over money tells scammers their tactics work. This only encourages them to repeat the crime, often targeting you or others again. It’s a vicious cycle. The more victims comply, the bolder and more organized these extortion groups become.

Here’s why giving in is a lose-lose:

  • Scammers rarely keep promises. Many victims who pay never get their data or privacy back. Some even get hit with more demands.
  • You’re marked as an easy target. Once you pay, your details may be shared or sold, putting you at greater risk of future scams.
  • You help fund criminal operations. Ransom payments bankroll bigger scams and more sophisticated attacks.

The Heavy Price of Ransom Payments

The numbers don’t lie: the financial damage from ransom payments is staggering. According to the FBI’s 2023 Internet Crime Report, Americans lost over $34 million to extortion scams in just one year. And that’s just reported cases—many go unreported out of fear or embarrassment.

  • The average ransom demand in business email compromise cases is now over $100,000.
  • Only about 8% of victims who pay ransoms ever recover all of their data, based on leading cybersecurity firm reports.

What the FBI Recommends

The FBI is crystal clear on this: Don’t pay the ransom. Here’s what their experts advise if you’re targeted:

1. Don’t respond to threats. Engaging with scammers can escalate their demands or make you a repeat target.

2. Keep evidence. Save emails, texts, or messages. Take screenshots if necessary. This helps law enforcement track down culprits.

3. Report it. Contact your local police and file a complaint with the FBI’s Internet Crime Complaint Center (IC3).

4. Strengthen your defenses. Change your passwords, update your security settings, and use privacy tools.

Shield Yourself With Smart Tools

Staying safe starts with being proactive. Services like Cloaked give you extra protection by letting you create disposable phone numbers and emails. This means even if a scammer gets your details, your real identity stays safe. If you’re serious about keeping your information out of the wrong hands, tools like this are a smart move.

Bottom line: Paying ransoms only makes things worse—for you, and for everyone else. Stand your ground, protect your privacy, and use the right tools to stay ahead of scammers.

Steps to Take if Targeted

Suspecting you’re the target of an extortion scam can trigger panic. The most important thing: don’t act on impulse. Here’s what you need to do, step by step, to protect yourself and your information.

1. Stay Calm and Don’t Respond

  • Do not pay or reply to the scammer. Giving in or communicating back can make you a bigger target.
  • Don’t click any links or download attachments. These may contain malware or expose your device to more attacks.

2. Secure Your Accounts and Information

  • Change passwords on email, banking, and social media accounts immediately—especially if you suspect your credentials have been compromised.
  • Enable two-factor authentication (2FA) wherever possible. This adds a layer of protection, making it harder for scammers to access your accounts.

3. Document Everything

  • Take screenshots of messages, emails, or texts from the scammer.
  • Save any evidence (including caller ID, email addresses, or usernames) that could help authorities track the perpetrators.

4. Report the Scam

Where to Report:

  • Internet Crime Complaint Center (IC3): For internet-based scams, submit details at ic3.gov.
  • Local Law Enforcement: If you feel physically threatened, contact your local police.

Reporting isn’t just about your own case. It helps build a record so authorities can warn others and take action against scammers.

5. Protect Your Identity and Personal Data

  • Monitor your credit reports for unusual activity.
  • Consider freezing your credit if you suspect your Social Security Number is at risk.

Using Services for Extra Protection

If you’re looking for extra peace of mind, services like Cloaked can help protect your personal data. Cloaked creates unique, encrypted identities (such as email addresses and phone numbers) for your online accounts. This way, your real information stays private and out of scammers’ reach, reducing your risk if one account is ever breached.

6. Talk to Someone You Trust

  • Reach out to friends or family. Scammers rely on isolation and fear. You’re not alone, and talking about it can help you make clear-headed decisions.

Quick Reference: What Not to Do

  • Don’t send money or gift cards.
  • Don’t reveal additional personal information.
  • Don’t believe threats—scammers often bluff to scare you into compliance.

Staying level-headed and following these steps can make all the difference between falling victim and shutting down a scammer’s efforts.

Protect yourself from future breaches

View all
Privacy Tips
May 23, 2025

Are You Doing Enough to Protect Yourself from Loan Fraud?

Are You Doing Enough to Protect Yourself from Loan Fraud?

by
Pulkit Gupta
Privacy Tips
May 23, 2025

Are You Doing Enough to Protect Yourself from Loan Fraud?

Are You Doing Enough to Protect Yourself from Loan Fraud?

by
Pulkit Gupta
Privacy Tips
May 22, 2025

Are You Sure That Rental Is Real? How to Spot and Avoid Rental Scams in 2025

Are You Sure That Rental Is Real? How to Spot and Avoid Rental Scams in 2025

by
Abhijay Bhatnagar
Privacy Tips
May 22, 2025

Are You Sure That Rental Is Real? How to Spot and Avoid Rental Scams in 2025

Are You Sure That Rental Is Real? How to Spot and Avoid Rental Scams in 2025

by
Abhijay Bhatnagar
Privacy Tips
May 21, 2025

Are You Accidentally Sharing Too Much? Smart Habits to Reduce Your Digital Footprint Today

Are You Accidentally Sharing Too Much? Smart Habits to Reduce Your Digital Footprint Today

by
Arjun Bhatnagar
Privacy Tips
May 21, 2025

Are You Accidentally Sharing Too Much? Smart Habits to Reduce Your Digital Footprint Today

Are You Accidentally Sharing Too Much? Smart Habits to Reduce Your Digital Footprint Today

by
Arjun Bhatnagar