What Is a Pig Butchering Scam?

Authoritative Definition, Examples, and When It Matters

Published: 2/12/2026

Written by: Brenda Buckman

Glitch effectGlitch effect

A Pig butchering scam is a long-term, relationship-based investment fraud in which scammers cultivate trust with victims through fake romantic or personal relationships—often over weeks or months—before manipulating them into sending money to fraudulent cryptocurrency or investment platforms.

Also known as sha zhu pan (杀猪盘), the term originates from the metaphor of "fattening a pig before slaughter"—the scammer patiently builds emotional dependency before draining the victim financially.

How Pig Butchering scams work: The step-by-step anatomy

Pig butchering scams follow a disturbingly systematic playbook. Understanding each phase is critical for recognition and prevention.

Phase 1: The contact ("Finding the pig")

Scammers initiate contact through:

  • Dating apps (Tinder, Bumble, Hinge)

  • Social media (Instagram, Facebook, LinkedIn)

  • Messaging apps (WhatsApp, Telegram)

  • "Wrong number" text messages that seem accidental

The initial outreach often appears innocent—a misdirected message, a friendly comment on a post, or a match on a dating platform. Scammers use stolen photos of attractive individuals and fabricate detailed backstories, often posing as successful entrepreneurs, crypto traders, or overseas professionals.

Phase 2: The grooming ("Fattening the pig")

This is where pig butchering diverges from traditional scams. Instead of rushing to ask for money, the scammer invests weeks or even months building a genuine-feeling relationship. During this phase, they:

  • Engage in daily conversations about life, family, and dreams

  • Share fabricated personal stories and photos

  • Build emotional intimacy and romantic attachment

  • Gradually introduce their "successful" investment lifestyle

  • Show screenshots of supposed profits and luxury purchases

The victim genuinely believes they are in a real relationship.

Phase 3: The investment pitch ("Leading to slaughter")

Once trust is firmly established, the scammer introduces a "can't-miss" investment opportunity—typically involving:

  • Cryptocurrency trading platforms (fake exchanges that look legitimate)

  • Forex trading apps

  • Fake DeFi or liquidity mining schemes

The scammer claims to have insider knowledge or a proprietary trading method. They guide the victim through setting up an account on a fraudulent platform that the scammers control. Early "investments" often show impressive returns—which are entirely fabricated—encouraging the victim to deposit more money.

Phase 4: The slaughter

When the victim has invested a significant sum—often their life savings, retirement funds, or borrowed money—the endgame begins:

  • The fake platform freezes withdrawals

  • The victim is told they must pay "taxes" or "fees" to access funds

  • Each additional payment is met with new demands

  • Eventually, the scammer and the platform disappear entirely

  • The victim is left with catastrophic financial losses and deep emotional trauma

Pig butchering by the numbers: 2024–2025 statistics

The scale of pig butchering fraud is staggering and accelerating:


Metric

Figure

Source

U.S. investment fraud losses (2024)

$6.57 billion

FBI IC3 2024 Annual Report

Cryptocurrency-related fraud losses in the U.S. (2024)

$9.3 billion

FBI IC3 2024 Annual Report

Year-over-year increase in investment fraud losses

44%

FBI IC3 2024 Annual Report

Estimated on-chain revenue to pig butchering operations (2024)

$3.6 billion+

Chainalysis 2025 Crypto Crime Report

Pig butchering rank among all crypto scam types

#1 by revenue

Chainalysis 2025 Crypto Crime Report

Average individual victim loss

$177,000–$200,000+

GASO victim surveys

Global estimated annual losses to pig butchering

$75+ billion

University of Texas at Austin / GASO

People trafficked into scam compounds (Southeast Asia)

200,000–300,000

UNODC / UN Human Rights Office 2024

Total U.S. cybercrime losses reported (2024)

$16.6 billion

FBI IC3 2024 Annual Report


According to Huntress threat research, small and mid-sized businesses are increasingly targeted as scammers pivot from individual victims to employees with access to company financial systems—blending pig butchering social engineering tactics with business email compromise (BEC) techniques. Huntress has documented cases where threat actors spent weeks building rapport with accounting staff before redirecting wire transfers.

Real-world examples of pig butchering scams

Example 1: The "wrong number" text

A victim receives a WhatsApp message: "Hey Jason, are we still on for dinner Saturday?" When the victim replies that they have the wrong number, a friendly conversation begins. Over three months, it evolves into a romantic relationship. The scammer eventually introduces a crypto trading app and guides the victim through an initial $500 investment that "grows" to $2,000 on screen. Encouraged, the victim invests $150,000 over the next two months before the platform locks their account.

Example 2: The LinkedIn professional

A financial professional receives a LinkedIn connection request from an attractive, successful-looking individual claiming to work in fintech overseas. After weeks of professional conversations that turn personal, the scammer shares their "side project"—a proprietary forex trading algorithm. The victim invests $300,000 across multiple deposits before realizing the trading platform is entirely fictitious.

Example 3: The forced scammer

Investigative journalist and YouTuber Jim Browning has produced groundbreaking exposés revealing that many pig butchering scammers are themselves victims—trafficked individuals forced to work in scam compounds across Southeast Asia under threat of violence. His investigations have penetrated the inner workings of these operations, showing the industrial scale of fraud factories in Myanmar, Cambodia, and Laos.

📺 Watch Jim Browning's investigation into pig butchering scam operations:

Jim Browning's YouTube Channel — Pig Butchering Investigation 

Jim infiltrates scam call centers and pig butchering operations, exposing both the fraud infrastructure and the human trafficking that powers it.  

The human trafficking connection

One of the most disturbing dimensions of pig butchering is the forced labor behind it. Thousands of workers—many lured by fake job postings in China, Taiwan, India, and other countries—have been human trafficked into scam compounds across Southeast Asia. Once there, they are:

  • Stripped of their passports

  • Forced to work 16+ hour days running scam scripts

  • Beaten or tortured if they fail to meet quotas

  • Sold between criminal organizations

The United Nations estimates that over 200,000 people have been trafficked into scam operations in Myanmar and Cambodia alone. This makes pig butchering not only a financial crime but a human rights crisis.

Who is most at risk?

Pig butchering scams target a broader demographic than most people assume:

  • Adults ages 30–49 report the highest losses (not elderly populations, as commonly believed)

  • Educated professionals are frequently targeted—doctors, engineers, and financial workers

  • Recently divorced or widowed individuals seeking new connections

  • Lonely or isolated people who are more susceptible to emotional manipulation

  • Crypto-curious individuals who lack deep knowledge of legitimate exchanges

  • Small business employees with financial access (emerging Huntress-tracked trend)

How to identify a pig butchering scam

Red flags to watch for:

  • Unsolicited contact from a stranger who quickly becomes emotionally invested

  • Conversations move off-platform quickly (from a dating app to WhatsApp or Telegram)

  • The person can never video chat or has no excuses for not meeting in person

  • They mention cryptocurrency, forex, or investment success casually and repeatedly

  • They guide you to a specific trading platform you've never heard of

  • Early investments show immediate, impressive returns

  • You're encouraged to invest more and told the window is closing

  • Withdrawal attempts are blocked by demands for additional fees or taxes

  • Reverse image searches reveal their photos belong to someone else

How to protect yourself and your organization

For individuals:

  • Never send money or crypto to someone you haven't met in person

  • Verify identities through video calls and reverse image searches

  • Research any trading platform independently—check the SEC, FINRA, and CFTC registries

  • Be skeptical of guaranteed returns—legitimate investments carry risk

  • Talk to someone you trust before making any investment recommended by an online contact

  • Report suspected scams to the FBI's IC3, FTC, and your local law enforcement

For businesses (per Huntress Threat Intelligence):

  • Use security awareness training to train employees on social engineering tactics that extend beyond traditional phishing

  • Implement multi-person authorization for wire transfers and large payments

  • Monitor for unusual communication patterns with external contacts

  • Establish clear verification procedures for changes to payment instructions

What to do if you're a victim

If you believe you've been targeted by a pig butchering scam:

  • Stop all communication with the scammer immediately

  • Stop sending money—additional payments will not unlock your funds

  • Document everything: screenshots, transaction records, wallet addresses, phone numbers

  • Report to law enforcement: FBI IC3, local police, and your country's fraud authority

  • Contact your bank or exchange to attempt to freeze or reverse transactions

  • Seek emotional support—victims experience significant psychological trauma; contact GASO for peer support

  • Beware of recovery scams—fraudsters often re-target victims by posing as fund recovery services

FAQs about pig butchering scams

The term comes from the Chinese phrase sha zhu pan (杀猪盘), meaning "pig butchering plate." Scammers refer to victims as "pigs" to be fattened with trust and affection before being "slaughtered" financially. The metaphor describes the patient, methodical approach that distinguishes these scams from quick-hit fraud.

Traditional romance scams typically involve requests for direct financial help—medical bills, travel costs, or emergencies. Pig butchering adds a fraudulent investment component: the scammer doesn't ask for money directly but instead guides the victim toward a fake investment platform. The victim believes they are growing wealth, not giving money away, which makes the deception far more effective.

Most pig butchering operations unfold over 1–6 months, though some have continued for over a year. The extended timeline is intentional—longer grooming periods produce larger payouts because victims are more deeply emotionally and financially committed.

Recovery is extremely difficult but not always impossible. Cryptocurrency transactions are largely irreversible, but law enforcement agencies have improved blockchain tracing capabilities. Report immediately to the FBI IC3, and work with your bank or exchange. Be cautious of "recovery services" that may be secondary scams.

No. Pig butchering is typically run by organized criminal syndicates operating large-scale fraud factories. As Jim Browning's investigations reveal, these operations employ hundreds or thousands of workers—many of whom are trafficking victims—following detailed scripts and using sophisticated technology. Single operations may be running thousands of scams simultaneously.

Scammers operate across virtually all communication platforms: Tinder, Bumble, Hinge, WhatsApp, Telegram, Instagram, Facebook, LinkedIn, Twitter/X, and even dating platforms targeting specific communities. They use fake cryptocurrency exchanges and trading apps that mimic legitimate platforms but are entirely controlled by the scam organization.

According to the Global Anti-Scam Organization, the average victim loses approximately $177,000. However, losses range from a few thousand dollars to millions. Many victims invest their retirement savings, take out loans, or liquidate assets based on the fabricated returns they see on fraudulent platforms.

Yes. Pig butchering involves multiple federal crimes including wire fraud, securities fraud, money laundering, and identity theft. However, prosecution is challenging because perpetrators typically operate from overseas—primarily in Myanmar, Cambodia, Laos, the Philippines, and Dubai—often beyond the easy reach of U.S. law enforcement.

Check the platform against the SEC's EDGAR database, FINRA BrokerCheck, and the CFTC's registration listings. Search for independent reviews on established financial websites. Be wary of platforms that have no verifiable corporate registration, no regulatory licensing, or that have only existed for a short time. If someone you met online is directing you to a specific platform, treat that as a major red flag.

Increasingly, yes. Huntress and other security firms have identified threat actors using pig butchering-style long-term social engineering against employees at small and mid-sized businesses, particularly those in finance and accounting roles. These hybrid attacks combine romantic or professional relationship building with business email compromise tactics to redirect payments and wire transfers.

Glitch effectBlurry glitch effect

Related cybersecurity and fraud terms

Social Engineering Guide

The psychological manipulation tactics that underpin pig butchering and other fraud schemes. Learn how attackers exploit human trust at every level.

Business Email Compromise (BEC) Guide

A corporate fraud technique that shares DNA with pig butchering—using impersonation and trust to redirect financial transactions.

Cryptocurrency Fraud

The broader category of digital asset scams, including fake exchanges, rug pulls, and pump-and-dump schemes that pig butchering operations exploit.

Phishing

The foundational deception technique used across cybercrime, including the initial outreach stages of pig butchering operations.

Romance Scams

The traditional category of relationship-based fraud from which pig butchering evolved—and how the two compare.

Human Trafficking in Cybercrime →

The forced labor operations behind pig butchering scam factories across Southeast Asia—an intersection of cybercrime and human rights abuse.

Identity Theft →

How stolen personal information and fabricated identities power pig butchering operations and other fraud at scale.

Endpoint Detection and Response (EDR) →

The security technology that helps organizations detect and respond to threats that accompany social engineering attacks, including malware delivered through scam communications.

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free