Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    What’s next for Apple after the iPhone 17?

    September 14, 2025

    Rolling Stone’s parent company sues Google over AI Overviews

    September 14, 2025

    Nintendo Drops Surprise Trailer for New ‘Super Mario Galaxy Movie’

    September 14, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » 493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds
    Security

    493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds

    News RoomBy News RoomAugust 20, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    “There are limitations to what we can see with this data, but what we have so far is accurate,” says Heintz. “If anything, I think it’s undercounting the scale of the problem.”

    The data the researchers obtained is only a snapshot of some alleged sextortion activity linked to scam centers. For instance, advertising industry mobile data is incomplete, the NCMEC data does not contain all possible reported sextortion cases, and tech companies reporting data to NCMEC likely skew toward American firms.

    In its report, the IJM points to multiple reports of scam centers being linked to wider sextortion against adults. The report does not rule out that children are being deliberately targeted with sextortion crimes but notes that children may also get caught in schemes targeted at adults if they are using parents’ or other caregivers’ devices. Now that this research has demonstrated a link, the researchers emphasize that further research is needed to strengthen authorities’ understanding of the connection between child sextortion and scam compounds and determine whether children are being specifically targeted. NCMEC did not immediately respond to WIRED’s request for comment.

    Often run by Chinese organized crime groups, scam compounds have exploded across Southeast Asia since roughly 2019. Criminals have trafficked thousands of people from more than 70 countries into the compounds, where they are usually held captive, have their passports taken away, and are forced to scam people online. If they refuse, they can be beaten and brutalized. Initially targeting Chinese speakers, the scam centers have deployed so-called “pig butchering” scams, alongside various other forms of investment and romance scams. With vast flows of illicit cash, the criminals have increasingly opened scam compounds in the Middle East, West Africa, Latin America, and Eastern Europe; they have targeted scams against people across the world and altered the ways they scam people.

    “Scam centers and cyber-enabled fraud networks in Southeast Asia have rapidly diversified their business lines and scope of targeting, increasingly integrating sextortion as well as malware, deepfakes and pornography into their operations,” says John Wojcik, a senior threat researcher focusing on Asia at the cybersecurity firm Infoblox. An October 2024 report into the growth of scam compounds from the United Nations Office on Drugs and Crime, which was partially authored by Wojcik, who worked at the organization at the time, pointed to the increase in sextortion cases against adults and the use of AI.

    Wojcik says the IJM research is consistent with reports from law enforcement agencies within Southeast Asia that there has been a “steady rise” in financial sextortion cases against children.

    Hieu Minh Ngo, a reformed criminal hacker and now cybercrime investigator at the Vietnamese nonprofit scam-fighting organization Chongluadao, says he has seen sextortion efforts targeting young people and adults in Vietnam in the past few years, and these “operations trace back to scam compounds” located along the Vietnam-Cambodia border. “The tactics are consistent: Bad actors pose as attractive individuals on social media, build trust with victims, then coerce them into sharing sensitive images or videos,” Ngo says. The use of AI deepfakes is also increasing, he adds. “This trend shows clear links between regional scam compounds and organized sextortion targeting children and vulnerable populations.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Plan to Turn the Caribbean’s Glut of Sargassum Into Biofuel
    Next Article Made by Google 2025: all the Pixel news and announcements

    Related Posts

    Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

    September 13, 2025

    Defense Department Scrambles to Pretend It’s Called the War Department

    September 12, 2025

    US Investment in Spyware Is Skyrocketing

    September 11, 2025

    Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

    September 11, 2025

    Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

    September 10, 2025

    ICE Has Spyware Now

    September 9, 2025
    Our Picks

    Rolling Stone’s parent company sues Google over AI Overviews

    September 14, 2025

    Nintendo Drops Surprise Trailer for New ‘Super Mario Galaxy Movie’

    September 14, 2025

    Phone batteries are getting more compact, but the US is missing out

    September 14, 2025

    The iPhone to get this year

    September 14, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Science

    Falcon 9 Milestones Vindicate SpaceX’s ‘Dumb’ Approach to Reuse

    By News RoomSeptember 14, 2025

    As SpaceX’s Starship vehicle gathered all of the attention this week, the company’s workhorse Falcon…

    Save 50 percent on Paramount Plus subscriptions, and get $60 off a solar-powered dash cam

    September 13, 2025

    Spotify Lossless is an inconvenient improvement

    September 13, 2025

    Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

    September 13, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.