What to do if youre getting exploited by a hacker who has sexual images of you

Checked on January 1, 2026
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

This fact-check may be outdated. Consider refreshing it to get the most current information.

Executive summary

When a hacker threatens to expose sexual images, the immediate priority is to stop the attacker gaining further leverage while preserving evidence for removal and prosecution; do not pay or delete messages, and reach out for help from trusted people and specialist services [1] [2] [3]. Practical remedies combine digital triage (save messages, block but don’t erase), legal action and platform takedown requests, and emotional support—each with trade‑offs and varying effectiveness depending on whether the imagery is real, doctored, or already public [1] [4] [5].

1. Immediate digital triage: preserve proof, stop contact, but don’t erase

As soon as threats appear, stop engaging with the blackmailer but preserve all communications: screenshots, emails, chat logs, dates, and any payment requests; deleting evidence hands the attacker more power and undermines future legal or platform remedies [3] [6]. Block the blackmailer to limit further contact, but retain the original messages and any files—the standard advice from multiple specialist guides is clear: don’t delete profiles, don’t erase threads, and save everything for investigators and removal requests [1] [7].

2. Never pay – it usually escalates

Payment or compliance rarely stops sextortionists and often encourages further demands; victims who pay are frequently targeted again or still see their content posted, so financial acquiescence is not a reliable escape route [1] [2]. Experts and helplines uniformly advise refusing to send money or additional images because payment removes leverage from legitimate responses and legitimizes the attacker’s business model [8] [9].

3. Assess what’s real: identity, source and deepfakes matter

Part of the response is forensic: ask whether the attacker actually has authentic images, whether the victim is identifiable, and whether images could be computer‑generated deepfakes—answers change legal routes and platform takedown prospects [5]. Attackers sometimes bluff; others use “nudified” photos or face‑swap deepfakes, and recognizing that possibility affects whether civil injunctions, criminal complaints or platform removal requests are the best immediate move [5] [2].

4. Report to platforms and use specialist removal tools

Report the abuse to the service where contact occurred and use image‑removal resources such as StopNCII (for adults) or TakeItDown for minors; many platforms will act on image‑based abuse reports and some networks cooperate with hash‑based blocking systems to prevent reuploads [1] [4] [2]. Documenting URLs, attacker messages and timestamps speeds platform responses; reputable advice notes that legitimate organizations will not ask victims to resend explicit content when assisting [6].

5. Law enforcement and legal options: what to expect

Contact local police or cybercrime units—law enforcement can investigate extortion, especially where threats, fraud or cross‑border criminality are involved—and consider civil remedies like injunctions when identity is known and there’s imminent risk of harm [10] [4]. Different jurisdictions vary in resources and expertise; specialist lawyers and victim support organizations can help decide whether to pursue a restraining order, injunctive relief, or a criminal complaint [11] [4].

6. Safety planning and emotional support

Sextortion causes shock, shame and isolation; reach out to a trusted person and to specialist support services or helplines for confidential counselling—organisations such as THORN, national helplines and sexual‑image abuse charities exist to provide non‑shaming support and practical next steps [1] [11]. Preparing a response plan that anticipates possible publication—who to tell at work, school or family, and how to use available removal tools—reduces fear and puts victims back in control [3].

7. Limitations and tactical realities

No single action guarantees removal or prosecution: legal remedies can be slow, cross‑border attackers complicate enforcement, and deepfakes present evidentiary challenges; reporting to platforms and police helps but outcomes depend on evidence, jurisdiction, and platform cooperation [4] [5]. Reporting, preserving evidence, refusing payment, using takedown tools and seeking legal and emotional support together form the best practical strategy documented by cybersecurity, legal and victim‑support sources [9] [8].

Want to dive deeper?
How can I verify whether a compromising image is a deepfake and what forensic services can help?
What legal remedies and injunction procedures exist for image‑based abuse in my country?
Which online platforms participate in StopNCII or similar hash‑based image‑blocking programs and how to submit a request?