Watch for follow-up scams and harden your setup

    Remote-access scammers frequently call back weeks later, posing as 'fraud investigators' from your bank or 'cybercrime police'. They're the same scammers, recycling the same victims.

    Why hardware keys matter here

    If the scammers captured your password, the only thing that makes a stolen password useless is a second factor that can't be phished. Hardware keys (YubiKey, etc.) do exactly that.

    More from Communications Security

    No image

    Confirm the inbox is actively compromised

    Pin down which account, who's been emailed, and which sessions are unfamiliar.

    No image

    Make the next phishing email harmless

    Use a password manager, hardware key and email aliases so a single phish can't cascade.

    No image

    Use specialised victim resources

    Sextortion has dedicated services — they're free, confidential and fast.