Report the scam and tighten future defences

    Reporting helps the broader investigation, but the real defence is operational: known numbers, safe-words, and not posting long voice/video clips publicly.

    Reduce voice-clone source material

    If you regularly post voice or video publicly (TikTok, Instagram, podcasts), accept that voice cloning is realistic. The safe-word habit becomes essential, not optional.

    More from Communications Security

    No image

    Confirm the inbox is actively compromised

    Pin down which account, who's been emailed, and which sessions are unfamiliar.

    No image

    Make the next phishing email harmless

    Use a password manager, hardware key and email aliases so a single phish can't cascade.

    No image

    Use specialised victim resources

    Sextortion has dedicated services — they're free, confidential and fast.