Cyber & Data Security

Password ‘Sextortion’ and Ransomware

This article was updated on:
Dec 13th, 2025

Password ‘Sextortion’ and Ransomware

The ‘sextortion’ email scam has been doing the rounds more than ever recently and we have encountered many businesses and individuals who have all received something of a similar nature.

They all follow the same routine, but will be worded slightly differently and usually in very poorly written English.

An email will land in your inbox and read something along the lines of this:

Hello! I have very bad news for you.

On…..D/M/YYYY…. I hacked your OS and got full access to your email account ******@*****.com

Your password was *******

You can change your password but my malware intercepts it every time and tells me what it is.

The email will then go on to explain how they got into your system and planted their malware.

You will then be told they have access to your entire address book of contacts and all your email accounts etc.

Finally, they will say you have been visiting adult sites and there is video proof of you enjoying them, as they were watching and recording you, through your own webcam.

They will ask for payment by Bitcoin and provide instructions on how to do so. If you don’t pay, your private and unintentionally famous video will be sent to each and every person within your email account.

Pretty scary huh?

Often your own email address and a password you used will be written in full as ‘proof’.

This email works on many levels, as it seems so far-fetched at first, yet so real after reading it, given the fact they have your email address and the password associated with it!

So, whether you actually have visited adult sites or not, the simple fact your password is in their hands is enough to scare most people and therefore it still works. It’s a mixture of social engineering and blackmail.

This scam has now developed even further recently, where there will be a link to click on to what is supposed to be an online hosted PowerPoint presentation of the ‘video proof’.

So, you know they have your password for sure, maybe they are telling the truth? Our instincts tell us that clicking links in emails is very dangerous these days, however they have trapped you into fearing every word in that email and its too tempting not to click the link and see the supposed footage.

Unfortunately, as soon as that link is clicked, a piece of ransomware is injected into your system and all files will be encrypted (locked out).

You’ll then have a message on the screen saying you need to pay £500 within 24/48 hours for some unique file decryption software, or your system files will be completely redundant and unusable.

So how do they get your email address and password?

What these criminals do is obtain databases of known email addresses and passwords from the dark web. These are sold daily to anyone who wants to pay for them. Once into the wrong hands, they can either use the information provided to actually breach your email account, or get used for extortion scams such as these. Pretty simple really, yet scarily effective and unfortunately people are paying the demands.

How can you combat this?

Firstly, it goes without saying that if the password in the email is one that you use for any accounts you should immediately change the passwords for these.

Secondly, passwords should be changed often and never repeated between accounts. Its so common for people to use the same or variants of the same password for everything,

Consider using a password management tool such as Dashlane, it really will change the way you secure your accounts and make life so much easier, you don’t even have to remember your passwords.

Thirdly, you should make sure you are using 2 Factor Authentication on every account possible. This works (as it states) in 2 ways, it will ask for the password, but you’ll also have to enter a code that is generated on your smartphone, or sometimes sent as an SMS to you. This means the password alone is not enough to gain access to the account.

How do you know when your details make it onto the dark web?

The problem with this is, you won’t, not until it’s too late. We utilise some very advanced tools to continuously monitor the depths and crevasses of the dark web and alert us if your credentials make it onto one of their databases – should this happen, we’ll immediately tell you and a password change would be all that’s needed to have peace of mind again. So this continuous monitoring, along with 2 Factor Authentication and a password manager, make for an excellent combination!

For a complimentary scan of your company’s domain email, get in touch with us and we’ll gladly carry it out for you….it could save your business.

Keen to learn more? Explore our other related resources below:
July 1, 2025
How Might Hackers Exploit My Cyber Security? 7 Tricks Small Business Owners Need-To-Know!
Cyber & Data Security
May 1, 2025
MFA Isn’t Optional Anymore: Here’s Why
Cyber & Data Security
IT Management, Policies & Certifications
April 1, 2025
Why Digital Offboarding Needs to Be on Your Radar!
Cyber & Data Security
February 12, 2025
Upgrading to Windows 11: It’s ESSENTIAL, Let us explain why!
Cyber & Data Security
February 1, 2025
11 Simple Steps to Keep Your Microsoft 365 Data Safe
Cyber & Data Security
Microsoft 365
May 23, 2022
The 5 Benefits of Outsourcing IT Support
IT Management, Policies & Certifications
Cyber & Data Security
May 12, 2021
Cyber Essentials Toolkit
Cyber & Data Security
April 19, 2021
Why your Business needs Microsoft 365 Backup
IT Management, Policies & Certifications
Cyber & Data Security
March 4, 2021
Is Microsoft 365 Secure? Our 5 Essential Tips to Stay Safe
Microsoft 365
Cyber & Data Security
February 1, 2021
Free Cyber Security Awareness Training!
Cyber & Data Security
December 20, 2020
Why Do Businesses Only Care About Cyber Security Once They Get Hacked?
Cyber & Data Security
October 17, 2019
Ransomware – Should You Be Worried? 
Cyber & Data Security
August 12, 2019
Identity Fraud - Easier Than Ever
Cyber & Data Security
March 28, 2019
Invoice Diversion Scenario
Cyber & Data Security
March 26, 2019
Phishing/Ransom Attack Scenario, What Would You Do?
Cyber & Data Security
March 13, 2019
The difference between Cyber Essentials and Cyber Essentials PLUS
Cyber & Data Security
December 4, 2018
What is the Difference Between Penetration Testing and Vulnerability Scanning?
IT Management, Policies & Certifications
Cyber & Data Security
November 28, 2018
How Secure is My Password?
Cyber & Data Security
November 2, 2018
How much help do I need to get Cyber Essentials Certified?
Cyber & Data Security
October 23, 2018
What is an SSL certificate and why do I need one?
IT Management, Policies & Certifications
Cyber & Data Security
October 3, 2018
Defining the Scope for Cyber Essentials
Cyber & Data Security
October 1, 2018
Is it time to switch your IT partner?
Cyber & Data Security
October 1, 2018
The Facebook Breach: This is What You Need to do NOW...
Cyber & Data Security
September 20, 2018
Email Spoofing Scenario
IT Management, Policies & Certifications
Cyber & Data Security
August 24, 2018
What is OneDrive and why should my business be using it? 
Telecoms & Connectivity
Cyber & Data Security
August 20, 2018
What is GDPR?
Cyber & Data Security
August 15, 2018
Server VS Cloud - Which is best for your business?
Telecoms & Connectivity
Cyber & Data Security
August 14, 2018
Why Should I get my business Cyber Essentials certified?
Cyber & Data Security
August 14, 2018
How Much Does Outsourced IT Support Cost in 2023?
IT Management, Policies & Certifications
Cyber & Data Security
May 1, 2018
The Difference between NCSC Small Business Guide & Cyber Essentials
Cyber & Data Security
December 2, 2017
Cyber Essentials Certification: Everything You Need to Know
Cyber & Data Security
January 22, 2009
Are there any substitutes to ISO 27001 suitable for my business?
Cyber & Data Security
IT Management, Policies & Certifications