Everything seems like one fancy scheme. There is no extortion and there is no access to a victim’s private content. The aim is simple: lure people into paying to see so‑called sensational material. The focus is on monetizing curiosity rather than exposing truth, a tactic driven by automated systems that target sympathy and intrigue rather than individual intent. Paul Duchement, a computer‑based judgment expert, an auditor of Organic Data Protection Act practices, and a professor, explains the motive behind those who imitate young women online. They steal photos and names to push paid, allegedly sexual content on other platforms.
Windfall was among the first experts to spot these cases, originally tracing patterns from close observation. The pattern is clear, he says. Victims are typically young people who post non‑erotic, thought‑provoking images on Instagram. Those kinds of pictures can be edited to resemble explicit content, creating a dangerous misrepresentation.
“The fake account blocks the original and sends requests to every follower.”
From there, the operation clones an account and engages in a process of sending demands. Not only are photos duplicated, descriptions are copied as well. The scammer uses the same name as the real account, but with a slight alteration such as a period or underscore. The fake profile blocks the original from visibility and starts sending requests to each of the true account’s followers. People who would never suspect a scam may be drawn in by a convincing, familiar name or a small deviation that seems almost legitimate.
“The victim’s photos become hooks for paid content that does not exist.”
In the description of the counterfeit profile, a common message appears, guiding viewers to a paid page for erotic content. If someone follows the link, they land on a paid platform that promises explicit material. The victim’s photos are used as bait, making the content feel plausible. If a user pays what they think is appropriate, they may still be met with nothing of value.
The scammers’ objective is to secure subscriptions that generate revenue until the fake account is shut down, often after funds have been extracted.
How is it possible for a scam to require so little time yet spend so much effort? Duchement points out that the operation runs on automation. There is no single operator overseeing all actions. The bots handle many accounts at once. If twenty girls are targeted in a day and ten subscriptions are secured, that amounts to a substantial daily sum. The attackers recycle accounts as needed and push forward with whatever tools are available.
How can a fake account be removed? The expert advises proving to Instagram that a profile is impersonating someone else. Yet reporting the issue to law enforcement often proves ineffective. Bots operate across borders where data access is limited. Servers can be located in countries with strict privacy laws or weak international cooperation, creating hurdles for investigations and data sharing, sometimes resembling tax haven arrangements.
“Deep fake” technology is a rising danger.
Duchement notes a new capability that places one person’s face onto another’s body with high realism in video form. When this happens with digital currency, people may buy the deception, and scams become deeply personal, harming reputations. The risk is particularly acute for younger users whose online presence is still developing. The lasting harm can be severe, affecting real lives and mental health. It is not uncommon for victims to face consequences beyond the immediate fraud, including reputational damage that affects opportunities and wellbeing.
Duchement emphasizes that the lasting damage is reputational. There are documented cases where victims were dismissed from roles or opportunities after their images were misused. Some young women were told that their online image had already harmed them, regardless of actual consent or involvement.
Prevention hinges on mindful online behavior. The expert urges users to consider what is uploaded to social networks. Content that attracts attention may also attract unwanted attention. The more followers a person has, the greater the risk of exploitation. A provocative question lingers: would someone share their posted content with a stranger in the street? Duchement suggests that people often behave more boldly online, forgetting that there is no real safety net once content leaves a private space. Caution and awareness are essential to minimize exposure to these risks.