Verify a blackmail threat before you pay a ransom.
Got an email claiming a hacker has 'installed malware' and recorded you through your webcam? In 99% of cases, this is a mass-mailed bluff using a leaked old password to scare you.
Security Insight
Sextortion emails are high-volume spam campaigns. They rely entirely on fear and the shame of the recipient to extort Bitcoin, even though the 'hacker' has no real evidence.
Common Sextortion Tactics
Scammers use psychological pressure to make you think they have total control over your device. Here is how they try to trick you.
The 'Old Password' proof
The 'Pegasus Malware' claim
Urgent 48-hour deadline
Bitcoin only payment
What IsThisSpam checks before you trust a sender
Quick verdicts are useful, but the real value is understanding why something looks safe, uncertain, or risky.
The email came from your own account
They 'spoof' the sender address to make it look like they have access to your inbox. Checking the email headers usually reveals the true, random sender.
Generic and repetitive language
The email doesn't mention your name or any specific details about you, only generic threats sent to millions of people.
No actual proof provided
They never provide a screenshot or a snippet of the 'video' they claim to have. If they had it, they would show it.
Perfect grammar in a strange context
Many of these emails are professionally written scripts that have been translated into multiple languages and mailed en masse.
Related guides
Use the checker for the fast answer, then read the deeper guidance for recurring scam patterns.
Email Header Analyzer
Romance Scam Checker
FAQ
These are the questions people usually ask right before they click, reply, or pay.
Got a screenshot or attachment? Our AI can analyse it.
Check the sender before you trust the message.
Start with a fast scan, then move to SuperScan when the message involves money, account access, or sensitive documents.