: Paying confirms your email is active and may lead to more demands.
: They use these file names to "prove" they have evidence, then demand payment (often in Bitcoin) to prevent them from sharing the video with your contacts.
For more detailed technical protection, you can explore resources from cybersecurity firms like WatchGuard or Exclusive Networks.
: If the email included a password you actually use, change it immediately on all sites where it's active and enable Two-Factor Authentication (2FA).