IsThisAScam
Strona GłównaBlogCennikO NasHistoryAPIExtension
Upgrade
PL
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produkt
  • Home
  • Blog
  • Pricing
  • O Nas
  • History
  • Chrome Extension
Resources
  • Developers
  • Dokumentacja API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Informacje Prawne
  • Polityka Prywatności
  • Regulamin
  • product@zeplik.com

© 2026 Zeplik, Inc. Wszelkie prawa zastrzeżone.

Built for the calm, the cautious, and the careful.

Home/Blog/Scam Alerts
Scam Alerts

Pig Butchering Scams: The Long-Con That Steals Billions

By IsThisAScam Research TeamPublished April 27, 20264 min read
Contents
  1. How a Pig Butchering Scam Works
  2. Phase 1: The Initial Contact
  3. Phase 2: Building the Relationship
  4. Phase 3: The Investment Pitch
  5. Phase 4: Scaling Up
  6. Phase 5: The Slaughter
  7. Who Gets Targeted
  8. How to Identify a Pig Butchering Scam
  9. What to Do If You Suspect a Pig Butchering Scam
  10. The Criminal Networks Behind It

Pig butchering — known in Chinese as "sha zhu pan" (杀猪盘) — is a type of scam where criminals build a fake relationship with the victim over weeks or months before guiding them into fraudulent investment platforms, typically involving cryptocurrency. The FBI reported over $3.9 billion in losses from pig butchering scams in 2025 alone, making it the fastest-growing fraud category globally. The name comes from the scammers' own terminology: fatten the pig before the slaughter.

How a Pig Butchering Scam Works

The scam unfolds in distinct phases, each designed to deepen the victim's trust and financial commitment:

Phase 1: The Initial Contact

The scammer reaches out through a text message ("Hey, is this Jessica? I think we met at the conference last week"), a dating app match, a LinkedIn connection request, or a message on WhatsApp, Telegram, or Instagram. The initial contact is designed to seem accidental or organic.

The scammer uses an attractive profile — often photos stolen from social media accounts — and presents themselves as a successful professional: a financial analyst in Singapore, a tech entrepreneur in Dubai, a wine importer in London.

Phase 2: Building the Relationship

Over days or weeks, the scammer builds rapport. They ask about your life, share "personal" details about theirs, and gradually move the conversation toward finances. They are patient — this phase can last anywhere from one week to three months. They show interest in your goals, your problems, and your aspirations.

At some point, they casually mention how well their investments are doing. They might share screenshots of trading profits, talk about financial freedom, or describe how they retired early through smart crypto investing.

Phase 3: The Investment Pitch

The scammer introduces a "special" trading platform or investment opportunity. They guide the victim through creating an account on a website that looks like a legitimate crypto exchange. Early on, the victim is encouraged to make a small investment — often as little as $200-500.

The platform shows impressive returns. The victim's $500 appears to grow to $800, then $1,500. They can even make small withdrawals at this stage, which builds confidence. Everything appears to be working.

Phase 4: Scaling Up

Now the scammer encourages larger investments. The victim, seeing the returns and having successfully withdrawn money, invests more. Victims commonly invest $50,000 to $500,000 over the course of the scam — some have lost over $1 million. The scammer may suggest taking out loans or borrowing from retirement accounts.

Phase 5: The Slaughter

When the victim tries to make a large withdrawal, the platform presents obstacles: tax fees, compliance holds, anti-money-laundering verification requiring additional deposits. No matter how much the victim pays, the money never comes out. The scammer eventually disappears, and the victim realizes the entire platform was fake — the "profits" were just numbers on a screen.

Not sure if they're real?

Paste their message — our AI detects manipulation patterns.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

Who Gets Targeted

Pig butchering victims span all demographics. FBI data shows the highest losses among adults aged 30-60 — people with savings, retirement accounts, and enough financial sophistication to understand crypto but not enough to recognize a fraudulent platform. However, victims range from college students to retirees.

Common target profiles include:

  • Recently divorced or lonely individuals active on dating apps
  • Professionals interested in cryptocurrency but without deep experience
  • People going through career transitions who are looking for new income
  • Retirees with savings who want to grow their nest egg

How to Identify a Pig Butchering Scam

Watch for these warning signs:

  1. Unsolicited contact from an attractive stranger who quickly becomes interested in your life and finances.
  2. The conversation moves to WhatsApp or Telegram early — away from the platform where you met.
  3. They casually mention investment success without you asking, then offer to "teach" you.
  4. The trading platform is unfamiliar. It is not Coinbase, Kraken, Binance, or any established exchange. The URL may resemble a real exchange but the domain is different.
  5. Early withdrawals work perfectly. This is by design — it builds false confidence.
  6. They discourage you from telling friends or family about the investment, framing it as a special opportunity.
  7. The "returns" are unrealistically consistent. No legitimate investment produces 20-30% returns every week.

What to Do If You Suspect a Pig Butchering Scam

  1. Stop all communication with the person immediately.
  2. Do not invest any more money, even if they claim you need to pay fees to release existing funds. This is a second scam layered on top of the first.
  3. Copy any messages from the suspected scammer and paste them into IsThisAScam.to. The AI analysis can identify manipulation patterns, known pig butchering scripts, and fraudulent platform URLs.
  4. Report to the FBI at ic3.gov. Include all platform URLs, wallet addresses, and transaction records.
  5. Contact your bank to see if any transactions can be reversed.
  6. Do not blame yourself. These scams are operated by sophisticated criminal organizations — sometimes using forced labor — that refine their scripts continuously.

The Criminal Networks Behind It

Many pig butchering operations are run from large-scale scam compounds in Southeast Asia, particularly in Myanmar, Cambodia, and Laos. Workers are often victims themselves — trafficked with promises of legitimate jobs, then forced to run scams under threat of violence. Understanding this does not reduce the financial damage to victims, but it is important context: the person texting you may also be in a desperate situation.

If you have received an unexpected message from a stranger who seems unusually interested in your life, check the message at IsThisAScam.to before engaging further. Early detection is the best defense against a scam designed to operate over months.

Share this article
XLinkedInFacebookWhatsApp
pig butcheringromance scamcryptoinvestment scamsocial engineering
Related Articles
Guides4 min

What is Phishing? Complete Guide for Non-Technical People

Industry News5 min

The Psychology of Scams: Why Smart People Fall for Fraud

Scam Alerts4 min

NFT Scams on OpenSea: Fake Collections and Wallet Drains

CHROME EXTENSION

Stop scams before you click

Scans emails in Gmail automatically. Right-click any link to check it. Warnings appear before you reach dangerous sites.

Add to Chrome — Free →

One-click install · No account needed · Works with Gmail

PRO

Need more than 5 scans a day?

Pro gives you 200 scans/month, detailed AI analysis, 30-day history, and priority processing for $2.99/mo.

See pricing →

Check any suspicious message

Six detection layers. Instant verdict. Free.

No signup · 6 detection layers · Results in seconds · Cmd+Enter