Most parents still picture online scams the way they were portrayed a decade ago: a Nigerian-prince email that any reasonable person could spot at a glance. That picture is dangerously out of date. The fastest-growing category of internet crime targeting minors today is not a clumsy email — it is a coordinated psychological attack delivered through a messaging app, a video game, or a voice on the phone that sounds exactly like grandma.

The scale is hard to overstate. The FBI's Internet Crime Complaint Center logged 54,936 sextortion and extortion complaints with $33.5 million in losses in 2024 — a 59% jump in complaints from the prior year, with boys aged 14 to 17 disproportionately targeted. The National Center for Missing and Exploited Children received nearly 100 financial-sextortion reports per day in 2024, alongside a 1,325% surge in CyberTipline reports involving generative AI. Across the Atlantic, UK police forces recorded 7,263 Sexual Communication with a Child offences in 2024/25, an 89% increase since 2017.

This guide pulls together the evidence on how scammers reach children today, why kids and teens are uniquely vulnerable, what to do when prevention fails, and — the part most checklists ignore — how to handle the psychological aftermath. It draws on an original investigation by the independent Russian journalism cooperative Bereg, reframed for US, UK, and global readers.

How big the problem actually is

Two numbers tell the story. The first is reach: 95% of US teens own or have access to a smartphone, and 46% report being online "almost constantly", nearly double the figure from a decade ago. The second is exposure: NCMEC's CyberTipline received more than 546,000 online enticement reports in 2024 alone, including over 33,000 financial-sextortion reports — a 24% year-over-year increase.

The Federal Trade Commission's 2024 Consumer Sentinel Network Data Book counted $12.5 billion in reported fraud losses across 6.5 million consumer reports, a 25% jump in a single year. Younger adults reported losing money more often than older ones, and the FTC notes that minors are increasingly named as victims in reports filed by their parents.

The most disturbing trend involves generative AI. NCMEC reports a 1,325% increase in CyberTipline reports involving generative-AI-produced material between 2023 and 2024 — climbing from 4,700 to roughly 67,000 reports in a single year. Voice cloning has matured to the point where three seconds of audio scraped from a TikTok video can produce an 85% match of a child's or parent's voice, according to research the FTC has cited. The barrier to a convincing impersonation has collapsed.

Why kids and teens are uniquely targeted

It is not that children are gullible. Adolescent brains are wired to take social risks, and modern scams exploit that wiring with precision.

Neuroimaging studies show that during adolescence, the brain's reward system — particularly the ventral striatum — becomes dramatically more sensitive to social rewards, while the prefrontal-cortex circuits responsible for impulse control mature more slowly. Developmental neuroscientists call this a maturity gap: peer presence and the prospect of social reward heighten activity in dopaminergic reward regions and predict subsequent risk-taking. Translation: a teen who would calmly ignore a phishing email at home will hand over a Discord password to fit in with a gaming clan.

Younger children are vulnerable for a different reason — they are meant to trust adults. Scammers who pose as school administrators, police officers, or family members are exploiting a system that exists for a healthy developmental reason. The American Academy of Pediatrics' updated digital-ecosystem policy statement emphasizes that early adolescence is a period of heightened susceptibility to negative effects of digital media, and protective strategies need to fit a child's developmental stage rather than apply a uniform rule.

With 73% of teens using YouTube daily and roughly 60% on TikTok and Instagram, the surface area for an attacker is enormous. Scammers don't need to find vulnerable children. They simply spam plausible-looking offers into channels where vulnerable children already live.

The scam categories parents need to recognize

Financial sextortion

This is the deadliest category. An attacker — usually posing as a teenage girl on Instagram, Snapchat, or a gaming platform — befriends a teen boy, escalates the conversation toward intimate images, and the moment the boy sends one, switches to extortion: pay or the image goes to your contacts, your school, your family. The FBI estimates a tenfold increase in cases involving children and teens since 2021, and NCMEC has documented at least 36 teenage boys who died by suicide after being targeted.

Research published in Cyberpsychology, Behavior, and Social Networking found that sextortion victims experience worry, stress, anxiety, self-blame, somatic stress symptoms in the short term, and persistent anxiety long-term. The shame component is crippling: many victims never tell anyone.

Gaming-currency and account scams

Kids in Roblox, Fortnite, Minecraft, and similar platforms are bombarded with offers of free Robux, V-Bucks, rare skins, or cheats. The mechanism is always the same: click a link, log in to a fake page, and your account — and any payment method linked to it — is now the attacker's. Gaming-related fraud increased an estimated 64% in a single recent year, and Roblox in particular sees item-trading swindles, fake giveaways, and free-currency scams targeting children specifically.

AI voice and video impersonation

The "family emergency" scam has been around for decades. What's new is that the voice on the line is now indistinguishable from a real family member's. The FTC's consumer alert on AI-enhanced family emergency schemes describes the pattern: a frantic call from a "grandchild" or "parent" claiming to be in jail, in an accident, or kidnapped, demanding immediate wire transfer or gift cards. Children answering the home phone or a parent's spare device are particularly vulnerable.

Romance and grooming

NSPCC data on the UK's Sexual Communication with a Child offence shows 40% of identifiable grooming offences in 2024/25 occurred on Snapchat, with 80% of identified victims being girls. Grooming follows a predictable arc — flattery, isolation from existing relationships, gradual sexual escalation, secrecy — and the platforms most popular with teens are the platforms where it happens.

Money-mule recruitment

This is the category most parents have never heard of and is becoming the most legally consequential. Teens are recruited through fake job ads, social media DMs, and gaming chats with promises of "easy money" for receiving and forwarding bank transfers or buying gift cards. The transferred funds are proceeds of fraud; the teen, legally, is now a money launderer. The FBI has issued explicit warnings that teenagers and young adults are being recruited as money mules through social media and online gaming platforms, and law enforcement in the US, UK, and EU now routinely prosecute under-18s caught in these schemes.

Fake giveaways, surveys, and "influencer" prizes

Low-effort but high-volume. A child clicks an ad promising a free PlayStation or a celebrity giveaway, fills out a form with personal data and a parent's card details, and the data is either monetized directly or sold.

Phone and account hardening — without becoming a tech support hotline

No configuration replaces a conversation. But a few baseline settings dramatically shrink the attack surface.

Turn on two-factor authentication everywhere. Microsoft research finds that 2FA blocks 99.9% of automated account-takeover attacks. Use an authenticator app (Google Authenticator, Authy, or Microsoft Authenticator) rather than SMS where possible — SMS codes can be intercepted via SIM-swap attacks. Walk your child through enabling it on their email, social, and gaming accounts together. The act of doing it together communicates that you take security seriously and expect them to as well.

Use platform-level family controls. Apple's Screen Time, Google's Family Link, and the parental controls built into PlayStation, Xbox, and Nintendo platforms let you require approval for app installs, limit in-app purchases, and restrict who can contact a child. The UK Safer Internet Centre and Internet Matters maintain platform-by-platform setup guides that are kept current as apps change.

Lock down payments. A child does not need a stored credit card on their gaming console. If they have an allowance, use a prepaid card with a hard limit. Most gift-card scams collapse the moment a child cannot complete a transaction.

Tighten messaging-app defaults. On Snapchat, Instagram, Discord, and WhatsApp, set the account so only existing contacts can message or call. Hide last-seen timestamps, profile photos, and phone numbers from non-contacts. Disable the ability to be added to groups by strangers.

Establish a family code word. This is the simplest and most effective defense against AI voice impersonation. Agree on a word or short phrase that only family members know. Anyone calling in a panic claiming to be a family member must say it. Cybersecurity researchers and the FTC's voice-cloning consumer guidance both endorse this approach.

The AAP is explicit that controls work best alongside conversation, not instead of it. Children whose parents rely solely on monitoring software tend to circumvent it and hide problems when they occur. The technical settings buy you time. The relationship is what actually protects the child.

How to talk to your child about scams

Developmental fit matters more than the script. A child of six processes a story about "a bad person who pretends to be nice" differently from a thirteen-year-old who already lives half their social life on Discord.

Younger children (roughly 4 to 8). Frame trust the way you frame physical safety. "You wouldn't tell a stranger on the street our home address, so we don't tell strangers online either." Make it a rule that any time a stranger online asks for anything, the answer is "I'll ask my mom or dad" — not because the parent will be angry, but because that's just what we do. Watch shows or play games together and pause to ask reflective questions: Do you think that character is being honest? Why or why not?

Pre-teens (9 to 12). This is the age where independence on devices begins. Talk about specific scams by name. Show them what a phishing page looks like next to the real one. Explain that scammers get sneakier when they know they have an audience — that they target kids because adults often don't believe kids. The Family Online Safety Institute and the AAP both recommend shared screen time — sitting alongside your child while they play or browse, not as surveillance but as joint problem-solving.

Teenagers (13 to 18). Skip the lecture. Adolescents respond to autonomy, not authority. Frame the conversation as helping them protect their accounts, their money, their reputation — because a hacked Instagram or a sextortion incident is genuinely terrifying for them. Be explicit about the sextortion playbook: someone messages you, escalates fast to flirting, asks for an image, and the second you send it the threats start. Tell them: if it ever happens, we will not be angry, we will not take your phone, we will help you fix it. That single sentence — repeated, believed — is the sentence that gets a teen to come to you instead of trying to handle it alone at 2 a.m.

A review of disclosure research found that shame and self-blame are the dominant barriers to disclosure of online abuse, and being met with belief and validation rather than punishment is the strongest facilitator of disclosure. What you say before anything happens shapes whether your child can come to you when something happens.

Warning signs to watch for

There is no single tell. But research on adolescent victimization and clinical guidance from organizations like NSPCC and the AAP point to a consistent cluster of behavioral, emotional, and physiological signals.

Behavioral. Sudden secrecy around devices — switching screens, taking the phone into the bathroom, panic when a parent comes near. New accounts the parent doesn't know about. A spike in time spent online combined with reluctance to discuss who they're talking to. Unexplained withdrawal from longtime friends or activities. Requests for unusual sums of money, gift cards, or help moving money between accounts.

Emotional. Irritability disproportionate to the trigger. Tearfulness without apparent cause. Sudden flat affect — a previously animated child going quiet. Heightened startle response when their phone buzzes. A pattern researchers call "checking behavior" — compulsively returning to the device every few minutes to see if a message has arrived.

Physiological. This is where mood- and sleep-tracking data becomes diagnostic rather than just informational. Sleep disruption is one of the most reliable signals: a child who suddenly cannot fall asleep, wakes repeatedly, or oversleeps as avoidance. Appetite changes. Headaches and stomach complaints with no medical explanation. The clinical literature on technology-assisted child sexual abuse repeatedly identifies sleep disturbance and somatic complaints as early markers, often appearing before the child discloses anything verbally.

This is one place where a quietly maintained mood and wellbeing log — kept by you for your own family or jointly with an older teen — earns its keep. WatchMyHealth's wellbeing tracker is designed for this kind of low-friction daily check-in: a one-tap mood entry, a sleep duration, a stress rating. Patterns visible across two or three weeks are far harder to dismiss than a single bad evening. "You've slept under five hours four nights this week and your mood scores are the lowest they've been all year — what's going on?" is a much harder conversation to deflect than "You seem off lately."

What to do if your child has been scammed

The first rule is the hardest: do not punish first. Researchers studying disclosure consistently find that punitive parental responses predict shorter, less complete disclosures and higher rates of subsequent depression and PTSD symptoms. The child has already been victimized. Your reaction determines whether they get help or hide.

Then, in roughly this order:

1. Stop the bleeding. If the scam is ongoing — sextortion threats arriving, a money-mule transfer requested, a fake "police officer" still on the line — end the contact. Don't argue, don't negotiate, don't pay. Block the account. Take the phone off Wi-Fi if you suspect remote-access malware.

2. Preserve evidence. Screenshot every message, every profile, every transaction confirmation before blocking. Save voicemails. Photograph the screen with a second device if you're worried about the original being wiped. Investigators need this — and many parents, in the panic of the moment, delete it all.

3. Report to the right places. In the US, the FBI's Internet Crime Complaint Center at IC3.gov handles online fraud, sextortion, and money-mule cases. Reports specifically involving exploitation of a minor should also go to NCMEC's CyberTipline at CyberTipline.org. The FTC's reporting portal at ReportFraud.ftc.gov is the right destination for non-sexual fraud — gift-card scams, fake giveaways, romance scams. In the UK, report to Action Fraud and contact the NSPCC helpline at 0808 800 5000; children themselves can call Childline at 0800 1111 free of charge, 24/7.

4. For sextortion specifically, use Take It Down. NCMEC operates a free service called Take It Down that lets a minor (or their parent) submit a hash of an explicit image without uploading the image itself. Participating platforms — Meta, TikTok, OnlyFans, and others — then prevent that hash from being uploaded or shared. It does not delete copies that already exist outside those platforms, but it stops the most common amplification vectors.

5. Lock down accounts and finances. Reset every password on a clean device. Cancel any compromised cards. Notify the bank if money moved. Pull a credit report — increasingly, scammers harvest data to open accounts in a child's name. In the US, all three credit bureaus offer free child-credit freezes.

6. Call the platform. Each major platform has dedicated reporting flows for harassment and exploitation of minors. Use them. Document the case numbers.

The mental health aftermath

This is where most prevention guides stop and where parenting actually gets hard. The scam is the event. Recovery is the months that follow.

Research on financial-sextortion victims documents acute anxiety, depression, intrusive thoughts, sleep disturbance, social withdrawal, and elevated suicide risk in the weeks following the incident. A separate analysis of sexual-minority adolescents found digital sexual violence approximately doubled the rate of suicide ideation and attempts compared with peers who had not experienced it. The American Psychiatric Association's professional newsletter has explicitly flagged sextortion as an emerging risk factor for adolescent suicide that pediatric and primary-care clinicians should be screening for.

What helps:

Don't relitigate. Once is enough. Asking your child to re-explain what happened — to you, to a relative, to a sibling — re-traumatizes. Have one careful conversation, take notes, and use the notes from then on.

Restore physical regulation first. Sleep, food, exercise, sunlight. None of the higher-order processing happens reliably until basic physiological rhythm is back. This is one place a wellbeing tracker becomes genuinely useful for a teen — not as parental surveillance but as a tool they control. WatchMyHealth's mood and sleep tracking lets a teen see, in their own data, that the worst day was three weeks ago, that the trend is up, that this will pass. For older adolescents, that visible evidence of recovery often does more for hope than any parental reassurance.

Get a clinician involved. Especially after sextortion or grooming, get the child in front of an adolescent-trained therapist within two to four weeks. Cognitive-behavioral therapy and trauma-focused CBT have the strongest evidence base. A pediatrician can refer; many schools have counselors who can begin support immediately.

Watch for delayed effects. Some symptoms surface months later — academic decline, new fears around technology that interfere with school, conflict in friendships when classmates find out. The APA committee guidance on adolescent technology use recommends scheduled mental health follow-ups at one, three, and six months after a significant online incident.

Manage your own response, not just theirs. Parents experience secondary traumatization. The temptation to over-restrict, over-monitor, or treat the child as fragile is enormous and counterproductive. A mood log for yourself — even for a few weeks — can surface whether your reactions are calibrated or whether your own anxiety is now a second source of pressure on a child who is already trying to recover.

Building long-term digital resilience

A single Saturday-morning talk doesn't inoculate a child against a threat that evolves quarterly. The goal is an ongoing, calm, slightly boring conversation that runs for years.

Make security a household habit. Update your own software. Use a password manager visibly. Tell your kids when you got phished or almost-phished. Parents who model the behavior they want to see produce more durable change than parents who only enforce rules.

Subscribe to ongoing literacy. Childnet, Internet Matters, Common Sense Media, and the FTC's consumer site all publish updated guidance as scam categories evolve. Pick one, follow it, and forward the relevant items to your kid every few weeks. The drip-feed works better than the lecture.

Keep the door open. Ask once a month, casually: anyone weird message you lately? anyone offer you free Robux? anyone claim to be from your school? Children who expect the question are more likely to volunteer the truth.

Track what you can, gently. Some families track wellbeing collaboratively in WatchMyHealth, with each member logging their own day; others let an older teen keep a private log they may or may not share. Either approach beats relying on memory alone, and both create an artifact that becomes invaluable if you ever need to show a clinician what the past few months actually looked like.

The goal isn't a child who never falls for a scam. It's a child who, when they fall for one, comes to you the same evening — not in three months when the damage has compounded.

Resources to bookmark right now

United States

United Kingdom

  • Childline — 0800 1111, 24/7 free counselling for under-19s
  • NSPCC Helpline — 0808 800 5000
  • Internet Matters — platform-by-platform safety setup guides
  • Action Fraud — UK's national fraud reporting centre

The bottom line

The people who target children online are not edge-case villains lurking in dark forums. They are organized, well-resourced operators running scaled playbooks against an audience that lives on its phone. The numbers are not abstractions. They describe what is currently happening to your child's classmates.

What protects a child is not a single setting, a single talk, or a single piece of software. It is a stack: technical hardening, ongoing developmentally appropriate conversation, modeled behavior, an alert eye for warning signs, a non-punitive response when something does go wrong, and serious follow-through on the mental-health aftermath. The most important link in that stack is the one researchers consistently identify as the strongest predictor of disclosure: a child's belief, before anything has happened, that their parent will respond with help rather than blame.

The scams will keep evolving. The relationship is what stays.