Sextortion Scams Out of Nigeria: Preying on Adults Across Social Media

    404
    nito / shutterstock.com
    nito / shutterstock.com

    So-called ‘sextortion’ scams are surging, primarily perpetrated by Nigerian fraudsters preying upon unsuspecting adults – mostly males residing within United States borders. This disturbing phenomenon was brought forth through revelations made publicly available via tech behemoth Meta earlier today.

    As part of its concerted efforts aimed towards combating digital extortion schemes, Meta disclosed having purged approximately sixty-three thousand dubious profiles originating from West African nation-state Nigeria, entities accused of orchestrating monetary coercion tactics against vulnerable targets worldwide. These criminal masterminds pose deceptively under false pretenses, feigning romantic interests while soliciting explicit content which later serves as leverage for blackmail purposes once obtained.

    Furthermore, Meta took decisive action, dismantling two hundred Facebook webpages alongside five-thousand-seven-hundred illicit discussion forums emanating from the same region, notorious hotbed Nigeria. Such online dens served dual purpose facilitating dissemination of scripted dialogues tailored specifically toward ensnaring unwitting marks along with sharing repositories containing stockpiles of pilfered photographs utilized during fraudulent impersonations designed entrapment strategies dubbed ‘catfishing.’

    To counteract rising threats posed by cyber-extorters operating across various virtual landscapes including popular visual-centric platform Instagram belonging to parent entity Meta itself plus rival service provider SnapChat have banned together. Research conducted jointly between non-profit organization dedicated combatting exploitation of minors, Thorn together with advocacy group National Centre for Missing & Exploited Children (NCMEC), Meta unveiled novel technological safeguards currently undergoing beta-testing phase capable redirecting prospective prey away from treacherous waters prone to manipulation.

    One notable innovation involves automated blurring mechanism embedded directly onto direct message interfaces detecting suggestive imagery thereby shielding recipients susceptible emotional distress stemming from coercive demands following exposure.

    Antigone Davis, Global Head Safety Division at Meta emphasized gravity surrounding subject matter stating unequivocally:

    “First of all, this goes without saying that financial sextortion is a horrific crime and can have devastating consequences.”

    Notably, indiscriminatory approaches adopted by con artists entail dispatching blanket solicitations en masse hoping yield marginal returns amid sheer volume attacks directed predominantly toward male demographics situated stateside though instances involving targeted teenage populations surfaced too. Notorious organized syndicates like infamous “Yahoo boys” hailing originally from African continent played significant roles driving proliferation malicious activities unearthed thus far.

    Federal Bureau Investigation drew attention last year highlighting stark reality faced daily by countless young lives lost due largely psychological torment inflicted post-falling-prey-to-such-scourges amounting twenty documented cases culminating tragic suicides alone. Furthermore, studies revealed profound anxiety feelings shame apprehension regarding protracted repercussions among survivors.

    Davis cautioned netizens exercising utmost vigilance whenever encountering unfamiliar profile boasting exceptionally polished appearance reaching-out unsolicitedly initiating conversations exchanging private communications warning signs red flags warrant closer scrutiny citing, “If you have never been messaged by this person before, that should give you pause.”

    Moreover, experts advise extreme wariness around initial interactions initiated solely based-on-image-sharing prompting reciprocity building rapport adding fuel suspicions further emphasizing importance prudence exercised throughout entire communication process echoing sentiments voiced succinctly by Davis herself:

    “If somebody sends you an image first, that is often to try to bait you to send an image second, or try to gain trust and build trust.”

    Lastly, authorities recommend reviewing personal privacy controls governing messenger applications permitting granular filtering incoming correspondence restricting scope exclusively amongst established acquaintances mitigating risks associated unwarranted contact initiation.