{"id":67567,"date":"2024-10-02T15:21:28","date_gmt":"2024-10-02T20:21:28","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=67567"},"modified":"2024-10-02T15:21:28","modified_gmt":"2024-10-02T20:21:28","slug":"terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/","title":{"rendered":"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House"},"content":{"rendered":"\n<p>In the ever-evolving landscape of cybercrime, sextortion scams have emerged as a particularly invasive and manipulative form of fraud. While this type of extortion is not new, recent variations have become more sophisticated, incorporating personal data like home addresses, phone numbers, and even images of victims&#8217; residences. These tactics make the scam feel more personal and threatening, increasing the likelihood that victims will comply with the scammers&#8217; demands.<\/p>\n\n\n\n<p>Sextortion occurs when a perpetrator threatens to distribute private or sensitive material\u2014often intimate images or videos\u2014unless the victim pays a ransom or provides further compromising content. Many sextortion schemes involve scammers who claim to have hacked into the victim\u2019s computer, accessed their webcam, and captured footage of them in compromising situations, such as viewing explicit content. The scammer then demands payment, typically in Bitcoin, threatening to release the footage to the victim\u2019s contacts or family members if they refuse to comply. While the claims made by scammers are usually false, the psychological pressure these tactics place on victims can be devastating.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Sextortion Email: Personalized and Terrifying<\/h2>\n\n\n\n<p>One of the most disturbing aspects of recent sextortion scams is the level of personalization involved. Hackers no longer rely solely on vague threats; they now include specific details about the victim to heighten fear and urgency. In many cases, sextortion emails include the recipient\u2019s full name, home address, and even photos of their house, which are often pulled from online mapping tools like Google Maps. This personalization gives the impression that the scammer has far more access to the victim\u2019s private life than they likely do.<\/p>\n\n\n\n<p>For example, recent reports have surfaced about sextortion emails that begin with, \u201cIs visiting [recipient\u2019s street address] a more convenient way to contact you if you don\u2019t take action? Nice location by the way.\u201d The email then proceeds to claim that the hacker has compromised the victim\u2019s computer, and recorded webcam footage, and will distribute it unless a payment\u2014usually around $2,000 in Bitcoin\u2014is made within 24 hours. The message concludes with a chilling warning: the scammer will immediately begin distributing the compromising video if the victim shares or discusses the email with anyone.<\/p>\n\n\n\n<p>These scams are often semi-automated, with little actual human involvement. According to cybersecurity experts, the hackers use tools to gather data and send out mass emails. In many cases, they haven\u2019t gained access to the victim\u2019s devices or webcam footage. Nonetheless, personal data like home addresses and phone numbers can make the threats feel very real.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Role of Data Brokers<\/h2>\n\n\n\n<p>One of the key factors enabling sextortion scams is the widespread availability of personal information online. Data brokers collect, buy, and sell vast amounts of data, including phone numbers, addresses, and personal preferences. This data is often used for advertising purposes, but it can easily fall into the hands of extortionists.<\/p>\n\n\n\n<p>In recent sextortion scams, scammers have leveraged this easily accessible information to make their threats more credible. In one real-life example, a victim received an email that included a photograph of their home, their cell phone number, and a claim that they had been \u201ccaught\u201d visiting porn sites. The scammer demanded nearly $2,000 in Bitcoin and warned that failure to pay, the video being sent to all of the victim\u2019s contacts.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"788\" height=\"804\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ss1.png\" alt=\"\" class=\"wp-image-67570\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ss1.png 788w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ss1-768x784.png 768w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" width=\"790\" height=\"258\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ss2.png\" alt=\"\" class=\"wp-image-67569\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ss2.png 790w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ss2-768x251.png 768w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/><figcaption class=\"wp-element-caption\"><em>A screenshot of a sextortion scam that includes a photo of the target\u2019s home.<\/em><\/figcaption><\/figure>\n\n\n\n<p>For many victims, the presence of their home address or a photo of their house adds an unsettling layer of invasiveness to the scam. Even though the data is publicly available, its use in these scams underscores how vulnerable individuals can be when their sensitive information is so easily accessible online. The victim in this case described the experience as \u201cenormously disturbing,\u201d particularly because the scammer made it clear that they knew where the victim lived.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Common Themes and Variations<\/h2>\n\n\n\n<p>While sextortion scams can take many forms, there are common themes that run through most variations. The email will usually claim that the extortionist has installed malware on the victim\u2019s computer, allowing them to monitor everything they do. Some scammers even allege they\u2019ve used sophisticated spyware, such as the infamous Pegasus software, to infiltrate the victim\u2019s device.<\/p>\n\n\n\n<p>These threats are often accompanied by vague details about the victim\u2019s online activity. For example, the hacker might claim to have recorded the victim while they were watching pornography or visiting porn sites. The tone of these emails can range from casual and chatty to menacing and sinister, but the end goal is always the same: to frighten the victim into paying the ransom to prevent the alleged footage from being shared.<\/p>\n\n\n\n<p>The ransom amount can vary, but it typically ranges from $1,500 to $2,000 and is always requested in Bitcoin, a cryptocurrency that provides anonymity. Some extortionists even embed QR codes in their emails to make it easier for victims to transfer the money.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Real-Life Consequences<\/h2>\n\n\n\n<p>Sextortion scams can have a serious impact on victims, both emotionally and financially. Even when the threats are baseless, the fear of public humiliation can lead victims to comply with the scammers\u2019 demands. For others, the psychological toll of receiving such a threat\u2014especially one that feels so personal\u2014can be devastating.<\/p>\n\n\n\n<p>While the financial loss can be significant, the emotional damage is often more profound. Victims may feel embarrassed, ashamed, or guilty, even when they haven\u2019t done anything wrong. In some cases, the stress of dealing with a sextortion threat can lead to anxiety, depression, and other mental health issues.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Can You Do?<\/h2>\n\n\n\n<p>To protect yourself from becoming a victim of sextortion, the FBI offers several key pieces of advice:<\/p>\n\n\n\n<p>1 &#8211; <strong>Never send compromising images<\/strong> of yourself to anyone, no matter who they are.<\/p>\n\n\n\n<p>2 &#8211; <strong>Be cautious about opening attachments<\/strong> or clicking on links, especially from unknown senders.<\/p>\n\n\n\n<p>3 &#8211; <strong>Turn off or cover your webcam<\/strong> when you\u2019re not using it.<\/p>\n\n\n\n<p>4 &#8211; <strong>Use a password manager<\/strong> to generate and store strong, unique passwords for all your accounts, reducing the risk of being compromised through reused or weak passwords.<\/p>\n\n\n\n<p>5 &#8211; <strong>Keep your software and devices updated<\/strong> to protect against potential security vulnerabilities.<\/p>\n\n\n\n<p>6 &#8211; <strong>Report any sextortion attempts<\/strong> to your local FBI office or through the FBI\u2019s Internet Crime Complaint Center (<a href=\"http:\/\/www.ic3.gov\">www.ic3.gov<\/a>).<\/p>\n\n\n\n<ol class=\"wp-block-list\"><\/ol>\n\n\n\n<p>If you receive a sextortion email, it\u2019s important to remember that the scammer is likely bluffing. In most cases, they haven\u2019t actually gained access to your device or any sensitive material. However, if you\u2019re unsure, seek professional advice and report the scam to law enforcement.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Sextortion scams are a disturbing reminder of the dark side of the internet. As cybercriminals become more sophisticated, it\u2019s increasingly important for individuals to be vigilant about their online security. By understanding how these scams work, looking for the red flags, and taking steps to protect your personal data, you can reduce the risk of becoming a potential victim of these types of phishing attacks. Always remember that if you receive such an email, the best action is to remain calm, avoid paying the ransom, and report the scam to the FBI and local police.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the ever-evolving landscape of cybercrime, sextortion scams have emerged as a particularly invasive and manipulative form of fraud. While this type of extortion is not new, recent variations have become more sophisticated, incorporating personal data like home addresses, phone numbers, and even images of victims&#8217; residences. These tactics make the scam feel more personal [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":67571,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6219,6223],"tags":[],"class_list":["post-67567","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybernews","category-scam-alert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Terrifying New Sextortion Tactic: Scammers Send Photos of Your House<\/title>\n<meta name=\"description\" content=\"In the ever-evolving landscape of cybercrime, sextortion scams have emerged as a particularly invasive and manipulative form of fraud. While this type of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House\" \/>\n<meta property=\"og:description\" content=\"In the ever-evolving landscape of cybercrime, sextortion scams have emerged as a particularly invasive and manipulative form of fraud. While this type of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-02T20:21:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/house_25c08e59cd.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1085\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House\",\"datePublished\":\"2024-10-02T20:21:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/\"},\"wordCount\":1201,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/house_25c08e59cd.webp\",\"articleSection\":[\"CyberNews\",\"Scam Alert\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/\",\"name\":\"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/house_25c08e59cd.webp\",\"datePublished\":\"2024-10-02T20:21:28+00:00\",\"description\":\"In the ever-evolving landscape of cybercrime, sextortion scams have emerged as a particularly invasive and manipulative form of fraud. While this type of\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/house_25c08e59cd.webp\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/house_25c08e59cd.webp\",\"width\":1085,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House","description":"In the ever-evolving landscape of cybercrime, sextortion scams have emerged as a particularly invasive and manipulative form of fraud. While this type of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/","og_locale":"en_US","og_type":"article","og_title":"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House","og_description":"In the ever-evolving landscape of cybercrime, sextortion scams have emerged as a particularly invasive and manipulative form of fraud. While this type of","og_url":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2024-10-02T20:21:28+00:00","og_image":[{"width":1085,"height":629,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/house_25c08e59cd.webp","type":"image\/webp"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House","datePublished":"2024-10-02T20:21:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/"},"wordCount":1201,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/house_25c08e59cd.webp","articleSection":["CyberNews","Scam Alert"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/","url":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/","name":"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/house_25c08e59cd.webp","datePublished":"2024-10-02T20:21:28+00:00","description":"In the ever-evolving landscape of cybercrime, sextortion scams have emerged as a particularly invasive and manipulative form of fraud. While this type of","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/house_25c08e59cd.webp","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/house_25c08e59cd.webp","width":1085,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/terrifying-new-sextortion-tactic-scammers-send-photos-of-your-house\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Terrifying New Sextortion Tactic: Scammers Send Photos of Your House"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=67567"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67567\/revisions"}],"predecessor-version":[{"id":67572,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67567\/revisions\/67572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/67571"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=67567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=67567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=67567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}