Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity 101
Pig Butchering Scams

What Is a Pig Butchering Scam?

Authoritative Definition, Examples, and When It Matters

Published: 2/12/2026

Written by: Brenda Buckman

Glitch effectGlitch effect


A pig butchering scam is a long-term, relationship-based investment fraud in which scammers cultivate trust with victims through fake romantic or personal relationships—often over weeks or months—before manipulating them into sending money to fraudulent cryptocurrency or investment platforms.

Also known as sha zhu pan (杀猪盘), the term originates from the metaphor of "fattening a pig before slaughter"—the scammer patiently builds emotional dependency before draining the victim financially.

How Pig Butchering scams work: The step-by-step anatomy

Pig butchering scams follow a disturbingly systematic playbook. Understanding each phase is critical for recognition and prevention.


Phase 1: The contact ("Finding the pig")

Scammers initiate contact through:

  • Dating apps (Tinder, Bumble, Hinge)

  • Social media (Instagram, Facebook, LinkedIn)

  • Messaging apps (WhatsApp, Telegram)

  • "Wrong number" text messages that seem accidental

The initial outreach often appears innocent—a misdirected message, a friendly comment on a post, or a match on a dating platform. Scammers use stolen photos of attractive individuals and fabricate detailed backstories, often posing as successful entrepreneurs, crypto traders, or overseas professionals.


Phase 2: The grooming ("Fattening the pig")

This is where pig butchering diverges from traditional scams. Instead of rushing to ask for money, the scammer invests weeks or even months building a genuine-feeling relationship. During this phase, they:

  • Engage in daily conversations about life, family, and dreams

  • Share fabricated personal stories and photos

  • Build emotional intimacy and romantic attachment

  • Gradually introduce their "successful" investment lifestyle

  • Show screenshots of supposed profits and luxury purchases

The victim genuinely believes they are in a real relationship.


Phase 3: The investment pitch ("Leading to slaughter")

Once trust is firmly established, the scammer introduces a "can't-miss" investment opportunity—typically involving:

  • Cryptocurrency trading platforms (fake exchanges that look legitimate)

  • Forex trading apps

  • Fake DeFi or liquidity mining schemes

The scammer claims to have insider knowledge or a proprietary trading method. They guide the victim through setting up an account on a fraudulent platform that the scammers control. Early "investments" often show impressive returns—which are entirely fabricated—encouraging the victim to deposit more money.


Phase 4: The slaughter

When the victim has invested a significant sum—often their life savings, retirement funds, or borrowed money—the endgame begins:

  • The fake platform freezes withdrawals

  • The victim is told they must pay "taxes" or "fees" to access funds

  • Each additional payment is met with new demands

  • Eventually, the scammer and the platform disappear entirely

  • The victim is left with catastrophic financial losses and deep emotional trauma

Pig butchering by the numbers: 2024–2025 statistics

The scale of pig butchering fraud is staggering and accelerating:


Metric

Figure

Source

U.S. investment fraud losses (2024)

$6.57 billion

FBI IC3 2024 Annual Report

Cryptocurrency-related fraud losses in the U.S. (2024)

$9.3 billion

FBI IC3 2024 Annual Report

Year-over-year increase in investment fraud losses

44%

FBI IC3 2024 Annual Report

Estimated on-chain revenue to pig butchering operations (2024)

$3.6 billion+

Chainalysis 2025 Crypto Crime Report

Pig butchering rank among all crypto scam types

#1 by revenue

Chainalysis 2025 Crypto Crime Report

Average individual victim loss

$177,000–$200,000+

GASO victim surveys

Global estimated annual losses to pig butchering

$75+ billion

University of Texas at Austin / GASO

People trafficked into scam compounds (Southeast Asia)

200,000–300,000

UNODC / UN Human Rights Office 2024

Total U.S. cybercrime losses reported (2024)

$16.6 billion

FBI IC3 2024 Annual Report


According to Huntress threat research, small and mid-sized businesses are increasingly targeted as scammers pivot from individual victims to employees with access to company financial systems—blending pig butchering social engineering tactics with business email compromise (BEC) techniques. Huntress has documented cases where threat actors spent weeks building rapport with accounting staff before redirecting wire transfers.


Real-world examples of pig butchering scams

Example 1: The "wrong number" text

A victim receives a WhatsApp message: "Hey Jason, are we still on for dinner Saturday?" When the victim replies that they have the wrong number, a friendly conversation begins. Over three months, it evolves into a romantic relationship. The scammer eventually introduces a crypto trading app and guides the victim through an initial $500 investment that "grows" to $2,000 on screen. Encouraged, the victim invests $150,000 over the next two months before the platform locks their account.


Example 2: The LinkedIn professional

A financial professional receives a LinkedIn connection request from an attractive, successful-looking individual claiming to work in fintech overseas. After weeks of professional conversations that turn personal, the scammer shares their "side project"—a proprietary forex trading algorithm. The victim invests $300,000 across multiple deposits before realizing the trading platform is entirely fictitious.


Example 3: The forced scammer

Investigative journalist and YouTuber Jim Browning has produced groundbreaking exposés revealing that many pig butchering scammers are themselves victims—trafficked individuals forced to work in scam compounds across Southeast Asia under threat of violence. His investigations have penetrated the inner workings of these operations, showing the industrial scale of fraud factories in Myanmar, Cambodia, and Laos.


📺 Watch Jim Browning's investigation into pig butchering scam operations:


Jim infiltrates scam call centers and pig butchering operations, exposing both the fraud infrastructure and the human trafficking that powers it.


The human trafficking connection

One of the most disturbing dimensions of pig butchering is the forced labor behind it. Thousands of workers—many lured by fake job postings in China, Taiwan, India, and other countries—have been human trafficked into scam compounds across Southeast Asia. Once there, they are:

  • Stripped of their passports

  • Forced to work 16+ hour days running scam scripts

  • Beaten or tortured if they fail to meet quotas

  • Sold between criminal organizations

The United Nations estimates that over 200,000 people have been trafficked into scam operations in Myanmar and Cambodia alone. This makes pig butchering not only a financial crime but a human rights crisis.

Who is most at risk?

Pig butchering scams target a broader demographic than most people assume:

  • Adults ages 30–49 report the highest losses (not elderly populations, as commonly believed)

  • Educated professionals are frequently targeted—doctors, engineers, and financial workers

  • Recently divorced or widowed individuals seeking new connections

  • Lonely or isolated people who are more susceptible to emotional manipulation

  • Crypto-curious individuals who lack deep knowledge of legitimate exchanges

  • Small business employees with financial access (emerging Huntress-tracked trend)

How to identify a pig butchering scam

Red flags to watch for:

  • Unsolicited contact from a stranger who quickly becomes emotionally invested

  • Conversations move off-platform quickly (from a dating app to WhatsApp or Telegram)

  • The person can never video chat or has no excuses for not meeting in person

  • They mention cryptocurrency, forex, or investment success casually and repeatedly

  • They guide you to a specific trading platform you've never heard of

  • Early investments show immediate, impressive returns

  • You're encouraged to invest more and told the window is closing

  • Withdrawal attempts are blocked by demands for additional fees or taxes

  • Reverse image searches reveal their photos belong to someone else


How to protect yourself and your organization


For individuals:

  • Never send money or crypto to someone you haven't met in person

  • Verify identities through video calls and reverse image searches

  • Research any trading platform independently—check the SEC, FINRA, and CFTC registries

  • Be skeptical of guaranteed returns—legitimate investments carry risk

  • Talk to someone you trust before making any investment recommended by an online contact

  • Report suspected scams to the FBI's IC3, FTC, and your local law enforcement


For businesses (per Huntress Threat Intelligence):

  • Use security awareness trainingto train employees on social engineering tactics that extend beyond traditional phishing

  • Implement multi-person authorization for wire transfers and large payments

  • Monitor for unusual communication patterns with external contacts

  • Establish clear verification procedures for changes to payment instructions

What to do if you're a victim

If you believe you've been targeted by a pig butchering scam:

  • Stop all communication with the scammer immediately

  • Stop sending money—additional payments will not unlock your funds

  • Document everything: screenshots, transaction records, wallet addresses, phone numbers

  • Report to law enforcement: FBI IC3, local police, and your country's fraud authority

  • Contact your bank or exchange to attempt to freeze or reverse transactions

  • Seek emotional support—victims experience significant psychological trauma; contact GASO for peer support

  • Beware of recovery scams—fraudsters often re-target victims by posing as fund recovery services

FAQs about pig butchering scams

The term comes from the Chinese phrase sha zhu pan (杀猪盘), meaning "pig butchering plate." Scammers refer to victims as "pigs" to be fattened with trust and affection before being "slaughtered" financially. The metaphor describes the patient, methodical approach that distinguishes these scams from quick-hit fraud.

Traditional romance scams typically involve requests for direct financial help—medical bills, travel costs, or emergencies. Pig butchering adds a fraudulent investment component: the scammer doesn't ask for money directly but instead guides the victim toward a fake investment platform. The victim believes they are growing wealth, not giving money away, which makes the deception far more effective.

Most pig butchering operations unfold over 1–6 months, though some have continued for over a year. The extended timeline is intentional—longer grooming periods produce larger payouts because victims are more deeply emotionally and financially committed.

Recovery is extremely difficult but not always impossible. Cryptocurrency transactions are largely irreversible, but law enforcement agencies have improved blockchain tracing capabilities. Report immediately to the FBI IC3, and work with your bank or exchange. Be cautious of "recovery services" that may be secondary scams.

No. Pig butchering is typically run by organized criminal syndicates operating large-scale fraud factories. As Jim Browning's investigations reveal, these operations employ hundreds or thousands of workers—many of whom are trafficking victims—following detailed scripts and using sophisticated technology. Single operations may be running thousands of scams simultaneously.

Scammers operate across virtually all communication platforms: Tinder, Bumble, Hinge, WhatsApp, Telegram, Instagram, Facebook, LinkedIn, Twitter/X, and even dating platforms targeting specific communities. They use fake cryptocurrency exchanges and trading apps that mimic legitimate platforms but are entirely controlled by the scam organization.

According to the Global Anti-Scam Organization, the average victim loses approximately $177,000. However, losses range from a few thousand dollars to millions. Many victims invest their retirement savings, take out loans, or liquidate assets based on the fabricated returns they see on fraudulent platforms.

Yes. Pig butchering involves multiple federal crimes including wire fraud, securities fraud, money laundering, and identity theft. However, prosecution is challenging because perpetrators typically operate from overseas—primarily in Myanmar, Cambodia, Laos, the Philippines, and Dubai—often beyond the easy reach of U.S. law enforcement.

Check the platform against the SEC's EDGAR database, FINRA BrokerCheck, and the CFTC's registration listings. Search for independent reviews on established financial websites. Be wary of platforms that have no verifiable corporate registration, no regulatory licensing, or that have only existed for a short time. If someone you met online is directing you to a specific platform, treat that as a major red flag.

Increasingly, yes. Huntress and other security firms have identified threat actors using pig butchering-style long-term social engineering against employees at small and mid-sized businesses, particularly those in finance and accounting roles. These hybrid attacks combine romantic or professional relationship building with business email compromise tactics to redirect payments and wire transfers.

Glitch effectBlurry glitch effect

Related cybersecurity and fraud terms

Social Engineering Guide →

The psychological manipulation tactics that underpin pig butchering and other fraud schemes. Learn how attackers exploit human trust at every level.

Business Email Compromise (BEC) Guide →

A corporate fraud technique that shares DNA with pig butchering—using impersonation and trust to redirect financial transactions.

Cryptocurrency Fraud →

The broader category of digital asset scams, including fake exchanges, rug pulls, and pump-and-dump schemes that pig butchering operations exploit.

Phishing →

The foundational deception technique used across cybercrime, including the initial outreach stages of pig butchering operations.

Romance Scams →

The traditional category of relationship-based fraud from which pig butchering evolved—and how the two compare.

Human Trafficking in Cybercrime →

The forced labor operations behind pig butchering scam factories across Southeast Asia—an intersection of cybercrime and human rights abuse.

Identity Theft →

How stolen personal information and fabricated identities power pig butchering operations and other fraud at scale.

Endpoint Detection and Response (EDR) →

The security technology that helps organizations detect and respond to threats that accompany social engineering attacks, including malware delivered through scam communications.

Glitch effect

Related Resources


  • What Is a Romance Scam?
    What Is a Romance Scam?
    Learn what romance scams are, how they work, warning signs to watch for, and how cybersecurity professionals can help protect organizations and individuals.
  • What is a Scam? Understanding and Avoiding Deceptive Tactics
    What is a Scam? Understanding and Avoiding Deceptive Tactics
    Learn what a scam is, how scams work, common types, and tips to protect yourself. Stay safe online with practical scam awareness advice.
  • What is a 419 Scam?
    What is a 419 Scam?
    Learn what a 419 scam is, how it works, and how to protect yourself or your business from falling victim to these advance-fee fraud schemes.
  • What Are Common Cash App Scams? (And How to Stay Safe)
    What Are Common Cash App Scams? (And How to Stay Safe)
    Learn about common Cash App scams like phishing, fake support, and “cash flips." Protect yourself with tips to spot and report fraud.
  • What Is Vishing (And How to Avoid Getting Scammed)?
    What Is Vishing (And How to Avoid Getting Scammed)?
    Think you’re too smart for phone scams? Vishing tactics are smarter than ever, using tricks like AI voice cloning to steal sensitive info. Discover how these scams work, red flags to watch for, and tips to protect yourself. Stay safe and informed!
  • What is a Scam Likely Call?
    What is a Scam Likely Call?
    Learn what scam likely calls are, how to identify them, and ways to prevent potential scams. Take these steps to protect yourself and your data today.
  • What is Cryptocurrency? A Beginner’s Guide to the Digital Revolution
    What is Cryptocurrency? A Beginner’s Guide to the Digital Revolution
    Learn about Cryptocurrency or crypto and how the digital currency works and how to avoid becoming a victim of cryptocurrency scams.
  • What Does a Blockchain Security Expert Do? Top Threats They Protect Against
    What Does a Blockchain Security Expert Do? Top Threats They Protect Against
    Learn what a blockchain security expert does, why their role is critical, and the top threats they protect against—from smart contract exploits to bridge attacks.
  • What is Bracketing in Cybersecurity?
    What is Bracketing in Cybersecurity?
    Learn about bracketing, a vital cybersecurity practice to limit permissions and protect sensitive resources. Learn its uses and benefits in this expert guide.

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy