Let’s be honest — being a parent we teach our kids countless things like how to cross the street and tie their shoes, etc. Ask this question to yourself...
Do you teach them how to protect themselves on Internet?
I’ve been really worried lately about how cyber-attacks are affecting young people. I came across some shocking facts that I must share with you.
Cyberattacks on kids: from October 2021 to March 2023... the FBI and Homeland Security Investigations received over 13,000 reports of online financial sextortion of minors. This horrific crime involved at least 12,600 victims—primarily boys—and devastatingly led to at least 20 suicides. Source: Federal Bureau of Investigation (FBI)
This information left me in an uncomfortable state, indeed. While cybercriminals a target various companies and individuals with diverse motives often for monetary extortion. Delving deeper into the term "sextortion" revealed its sheer brutality, which shook my soul. It's heart-wrenching to learn it cost 20 young lives. This is happening due to lack of online child safety. As a parent myself, it makes one question for me. How to use 15 years of cybersecurity knowledge to help you against cyber-attacks? So that you would be able to protect your children.
This brutal reality leads me to ask...
How exactly are hackers targeting children in the vast world of video games?
Children are more online than ever before, immersing themselves in the digital realms of video games. As they do, they unfortunately become vulnerable to cybercriminals. How do hackers get success against sextortion prevention?
To protect the child from cybercrime, first we need to understand... why do hackers target children?
The cybercriminal industry is highly organized and driven by a clear risk-reward calculation. If the potential reward is high compared to the risk involved, they will take a step forward.
From a hacker's point of view, let's explore how enormous the video gaming industry is?
The Global Video Gaming Market Worth
The global video gaming market in 2025 is estimated by Precedence Research to be worth a staggering $303.47 billion.
This powerhouse within the entertainment sector generates immense revenue annually. Other estimates for 2024 alone range between USD 177.9 billion and USD 298.09 billion, depending on the market research firm. This market is projected to continue its significant growth, with forecasts reaching over USD 500 billion by 2030-2034. Key drivers of this growth include:
- Dominance of Mobile Gaming: This segment accounts for a large part of the market revenue.
- Lucrative In-Game Purchases: Microtransactions and in-game purchases are major revenue generators.
- Expanding Global Player Base: The number of gamers worldwide continues to climb.
- Technological Advancements: Innovations in game development, graphics, and immersive technologies enhance player experiences.
- Rise of Esports and Streaming: Competitive gaming and content creation platforms attract vast audiences and more revenue streams.
How Many Video Games Are There?
Someone like me who doesn't play video games, the next question you will ask to yourself... "How many video games are there on the Internet?" . Quantifying the exact number of video games ever released is a complex task . It's due to continuous new releases, multi-platform availability. Yet, based on current estimates:
- The total number of video games ever created is estimated to be around 5 million.
- Some sources suggest a figure of 591,484 titles produced since the start of video games.
I know these number game can bore you. I also want you to understand the complete picture. 'To illustrate the sheer volume, here are some approximate numbers of games available on specific platforms:
- Steam (PC): Over 67,821 games (and constantly growing, with over 10,000 new releases in 2021 alone).
- Google Play Store (Android Mobile): Around 449,490 games.
- Apple App Store (iOS Mobile): Around 288,153 games.
- Nintendo Switch: Over 12,000 games.
- PlayStation 4: Around 5,366 games.
- PlayStation 5: Around 974 games (this number will significantly increase as the console matures).
- Xbox: Over 3,059 games.
These numbers are far beyond my expectation! There are millions of video games available across various platforms, with new ones being added daily. This is not the complete picture. Our children also access using different websites and social medias.
Global Internet Penetration and Youth Demographics
The world's digital footprint continues to expand . As of 2024, the global internet user base is estimated to be between 5.35 and 5.6 billion people. A critical demographic within this vast online population is youth. With UNICEF indicating that one in three internet users globally is a child. This highlights a growing trend of children accessing the internet at increasingly younger ages.
Top Social Media & Gaming Platforms for Kids and Teens
Children and teenagers are heavily engaged with specific social media and gaming platforms that cater to their interests and interaction styles. The table below details popular platforms, their virtual currencies (where applicable), and approximate user numbers, particularly focusing on youth.
Make a note on Youth User Data.
While platforms often have age restrictions (e.g., 13+ for most social media and some games). Many younger users bypass these by misrepresenting their age during registration. Thus, direct "under 13" usage figures from platform-reported demographics can be lower than actual usage. Okay children are accessing the Internet and we need to ask the next important question to ourselves which is...
On everyday bases how much time cybercriminals get to approach the kids...hmm
Time Spent Online by Children and Teenagers
Cybercriminals observe that roughly 325 million users in the "kids" and "teens" categories across all online platforms. This represents a huge market for them.
Because youngsters, lacking life experiences. They can easily trust others and often react promptly without fully considering consequences. These factors provide ample reasons for cybercriminals to target them.
Another significant advantage for hackers is... massive increase in screen time since COVID-19. The more time children spend online, the more opportunities hackers have to lure them and execute cyberattacks. You would be able to establish the link between teen screen time & cyber threats.
Now, let's take a closer look at how much time kids are spending online:
This was the first part of a complex process in understanding the threat. Now, I want to change your focus to precisely how hackers are targeting these children.
From here, the real game begins for the hacker. Kids are passionate about video games. And hackers know exactly how to create traps for these innocent youngsters.
Digital and Real Currencies in Games
One of the most popular games with children is Roblox, an online platform that allows users to create their own games for others to play. Completing tasks in these games earns you in-game currency, which can be used to buy items. However, you can also buy this game currency with real money. Roblox, for instance, has its own currency called Robux.
One of the more recent developments in games has focused heavily on in-game purchases. Even if you've already bought the game, if you want more, you often have to pay a little extra. The lure of these in-game purchases is particularly appealing to children.
Children spend more time and more money on games to get their favorite digital items. They develop a sense of pride and attachment to their digital collections, viewing them as earned through hard work. The effort children invest in completing tasks for those items give them real value. In case these digital items are lost, it's like losing real, cherished possessions. Even though the item is digital, that sadness is genuine. And it makes total sense when you consider the thought and care kids pour into their digital creations.
Most of the time, children have their parents’ credit or debit cards attached to their accounts. Or they can convince their grandparents to pay for their digital items.
The online "treasure" kids accumulate in their accounts and their ability to make purchases are powerful lures for hackers.
Why Would Someone Hack a Kid's Game?
On online video gaming platforms, there are individuals observing users. They are looking for accounts whose owners are purchasing items. Who has extensive collections. Or who are eager to get free or discounted gaming items.
This type of information provides ample motivation for them to hack children's accounts. Once they hacked such accounts...
They can monetize these hacked accounts by trading or selling them. Or by selling off the account's digital items.
But, this is only financial loss and emotional pain for kids losing their earned digital items. Being a parent we can afford it. We know at least our kids are alive. There can be other dangers of online gaming for kids even hard to believe...
The more deadly cybercrime is when... they cyberbully children to such an extent that the child takes their own life.
You may start thinking... Is gaming dangers for kids?
Parents, Beware: Online Blackmail Can Claim Your Child's Life
Out there are highly organized cybercriminal groups. They are targeting teenage boys aged 14 to 17. Nowadays, kids are using the internet, various social media platforms. And online video gaming websites more than ever. Millions of teenagers are spending 6-9 hours daily online.
Social Media Risks for Teens:
Fake Profiles Social Media Child Predators
On social media, anyone can create an account. It can be a fake profile. It's not a difficult task. Hackers are taking advantage of this possibility. There is no authority checking your true identity. So that hackers are creating fake profiles across different social media and gaming websites. Moreover, they are tailoring them as per their prospective targets. These cyber-criminals are experts. Their modus operandi is well-crafted. They have evolved it after many tests on various targets.
Many innocent kids become hackers victims.
These teenage boys were victims of financial sextortion and tragically died by suicide. A direct link has been established between child suicide and cyberbullying.
Some of them include Gavin Guffey, Riley Basford, Braden Markus, James Woods, Evan Boettler, Jordan DeMay, and Carter Bremseth. This list is, heartbreakingly, not exhaustive.
Hackers' Dark Game: How Hackers Target Kids in Video Games
Cybercriminals are using a certain method for approaching their target. It starts with
-
Gather maximum information about kids:
Cybercriminals search for their target. After locating the target, they initiate chats. They can contact them on different platforms for further communication. For instance, if they are targeting a boy... then the hacker's profile might be of a seemingly pretty, sweet girl of a similar age.
Hackers will find their target's multiple accounts on different social media platforms. They will collect every piece of information they need to prey on their target. This may include:
- Target's friends list
- Family members
- Sports they like
- School and school staff (Principal, teachers, etc.)
- What they like and what they buy
- Where they go for vacations
- Their friends' profiles
- Quality of family relationships
- What friends think about them
- And more, as more information leads to a better understanding of the target.
Cybercriminals might start contacting the target directly. Or first establish connection with their friends before approaching the main target. Hackers begin by liking their posts or forwarding content that matches the target's interests. They will do everything to get their attention.
Suppose their communication starts at an online gaming website or social media. Hackers would then ask for their WhatsApp number.
-
Steps to Build the trust
Once they get success in the first step, their next move is to build trust. When we speak to someone seemingly of the same age group, it is natural to trust easily. Hackers continuously share thoughts or content to strengthen their target's trust. When trust is established, at this stage, their approach takes a dark turn, often in this way…
-
We are friends now hmm lets…
Now, it's time to share something personal. The hacker, pretending to be a pretty, sweet girl, will share their own nude pictures. It's not difficult for them to generate these images, they can also use AI for this task. Then, they will ask their target to share his nude photos as well.
Due to children lacking life experiences... they cannot comprehend...
How a seemingly simple, innocent, and harmless-looking deed... can ultimately cost them their lives.
The innocent target will often share their unclothed or private photos, or even appear nude on camera. Once the hacker possesses enough material to threaten the target, their true intentions surface.
Cyber Blackmail Against Minors
Hackers begin to blackmail the target. They will demand a specific amount. They start threatening to share the nude photos with target's family, friends, or publish them on the internet if the demand is not met.
Hackers work to isolate the target from their adults.
Keep telling them they won't be able to go to school or college, they won't get any job, no one will love them, their parents will hate them, and so on.
Some kids, unable to handle this immense pressure, tragically commit suicide. This can happen very quickly, possibly within 24, 2 hours, or even just 30 minutes.
Protect children from online extortion
This is an alarming situation. We cannot afford to have anyone approach our children and threaten them in any way.
Let's take control into our own hands and protect children from online extortion.
Talk to your source of life, your kids, and make them aware of these types of cybercrimes.
Tell them that in any case, in any situation whatsoever it is, no matter how ugly it may seem, they must come to you. Reassure them, "We will always help you because we love you more than anything in this world."
If you, your child, or a friend have experienced sextortion, please know that there are crucial steps you can take immediately to address the situation and seek sextortion help.
Remember, the cybercriminal is solely responsible for this crime, never the victim. Even if choices were made that are regretted, what they are doing is an illegal act of online blackmail.
- Seek immediate help from a trusted adult, family member, or law enforcement before considering any compliance, such as paying money or fulfilling other demands. Cooperating or paying rarely stops the blackmail; it often encourages further online extortion.
- REPORT the malicious account using the social media platform's built-in safety features. This is a critical first step for online extortion prevention and protecting your digital safety.
- BLOCK the suspect immediately to cut off further direct communication and prevent continued cyberbullying.
- DO NOT DELETE your profile or any messages. These digital traces are vital evidence that can assist law enforcement in stopping the blackmailer and are crucial for cybercrime reporting. Preserving this evidence is key to successful investigation and for child online protection.
Be proactive: Spread online safety awareness among your family and friends. This collective effort is key to protecting kids online and creating a safer digital environment.
Our shared knowledge makes the internet a safer place for all.



This Article Was Written & published by Meena R, Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India.
Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...
She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms.
34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook.
If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then click here to follow her on Facebook: Cybersecurity PRISM
100% FREE COMMAND GUIDE DOWNLOAD
Cyber Warrior's Command Guide For Ethical Hackers