For years, criminals have been tricking people into performing embarrassing sexual acts on the Internet, and then blackmailing them with recordings of that behavior.

Now there’s an Android app for this sort of extortion.

Trend Micro, the cybersecurity firm based in Irving, Tex., said criminals have developed advanced mobile applications and tools that siphon their victims’ online passwords and contacts to increase the chance that they will pay up.

In a report provided to The New York Times on Monday, Trend Micro’s researchers detailed a new Android app that criminals are using to pressure their victims into paying blackmail fees.

Researchers said the extortionists first lure their victims through a number of online chatting tools like Skype, or KakaoTalk, an Asian chat service. Once the trap is set, they feign audio or messaging problems to persuade their target to download one of four malicious Android apps that can siphon off a phone number, stored passwords and address books.

In some cases, the Android app turned the victim’s device into a recording device. It also intercepted incoming and outgoing telephone calls and text messages.

This shift toward sophisticated, moneymaking schemes is a significant escalation of what has been a longtime problem on the Internet.

In 2008, Anthony Stancl, a Wisconsin teenager, created a fake female account on Facebook to bait classmates into sending naked pictures of themselves. He used those pictures to blackmail them into performing sexual favors. He was convicted and sentenced to 15 years in prison in 2010.

That same year, the Federal Bureau of Investigation arrested a California man for hacking into 100 computers to gather information that was used to lure victims into sending sexual videos.

Over the last two years, such schemes have become more elaborate.

A year ago, in April, Interpol, together with the Philippine National Police, and law enforcement agencies around the world, arrested 58 people in the Philippines who were accused of posing as attractive women on Facebook, then baiting victims into sexual video chats on Skype. Interpol said this group recorded the chats, then demanded fees between $500 and $15,000 to keep those chats from becoming public.

Victims were paying. Last March, police in Japan arrested two men suspected of being members of an extortion gang. In sifting through their digital devices and bank accounts, police said they discovered that the gang had managed to extort more than $29,000 from 22 victims between December 2013 and January 2014.

Using their email, social media and bank accounts, Trend Micro traced several of the Android app developers and their money go-betweens to China. The company found evidence that the criminals opened different bank accounts for each extortion campaign, which Trend Micro said typically lasted just a few weeks. The researchers suspected that the criminals preyed predominantly on victims in China and Korea.

“The sextortion schemes we uncovered are complex operations that involve people across cultures and nations working together to effectively run a very lucrative business,” the researchers wrote in their report.