{"id":50764,"date":"2024-03-11T13:51:17","date_gmt":"2024-03-11T17:51:17","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=50764"},"modified":"2024-03-11T13:51:17","modified_gmt":"2024-03-11T17:51:17","slug":"pig-butchering-crypto-investment-scam","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/pig-butchering-crypto-investment-scam\/50764\/","title":{"rendered":"Pig butchering: large-scale cryptocurrency fraud"},"content":{"rendered":"<p>Today, we\u2019re discussing the increasingly common scam known as <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/pig-butchering\/\" target=\"_blank\" rel=\"noopener\">pig butchering<\/a>. Due to its high profitability, this scheme is rapidly gaining popularity among fraudsters, and the number of victims is constantly growing. What is it? How does it work? And how can you protect yourself? We\u2019ll cover it all in today\u2019s post.<\/p>\n<h2>What is pig butchering and how does this scam work?<\/h2>\n<p>Pig butchering is a type of scam associated, on the one hand, with investing (often in cryptocurrencies), and on the other, with online romantic relationships.<\/p>\n<p>Just as pigs are raised for a long time before being slaughtered, in the pig butchering fraud scheme, scammers typically spend a lot of time and effort carefully courting their victims \u2014 usually over a period of weeks or even months. In this regard, pig butchering differs significantly from other fraudulent schemes, whose creators are often impatient and looking for quick profits.<\/p>\n<h3>The setup: a random message and a friendly stranger<\/h3>\n<p>It all starts with some random message in a messenger, social network or SMS. The scammer either pretends to have sent the message to the wrong recipient or refers to some distant mutual acquaintance that are easy to find and collect information about from the victim\u2019s social media profile. If the victim responds to the scammer, saying something like \u201cYou\u2019ve got the wrong number\u201d, the scammer politely apologizes and tries to initiate a casual conversation. Message by message, an ongoing relationship develops between victim and scammer.<\/p>\n<p>It should be noted here that scammers often deliberately select the victims based on their status and personal traits. That is, they look for reasonably well-off but perhaps lonely and vulnerable individuals who may not be opposed to engaging in conversation with a friendly stranger. At this stage, the scammer\u2019s goal is to build at least friendly relations with the victim and, ideally, a romantic connection.<\/p>\n<p>Thus, the scammer gains the victim\u2019s trust and lulls their vigilance. As mentioned earlier, these scammers are usually in no rush and spend a lot of time communicating with the victim, which is uncharacteristic of online fraudsters. So even if the victim has some suspicions at first, they tend to fade away after a while.<\/p>\n<h3>The plot thickens: an opportunity to invest profitably<\/h3>\n<p>Sooner or later, the scammer finds a way to steer the conversation toward financial topics. Specific approaches here may vary, but the general idea is that the scammer carefully presents the victim with an opportunity to make a profitable investment.<\/p>\n<p>This could be something traditional like stocks, bonds, futures or options. But lately, it\u2019s more often associated with some \u201cpromising\u201d cryptocurrency projects. The overall <a href=\"https:\/\/www.kaspersky.com\/blog\/crypto-actually-blockchains-and-cryptocurrencies\/45181\/\" target=\"_blank\" rel=\"noopener nofollow\">complexity and opacity of crypto<\/a>, coupled with the ease of moving funds, make it ideal for such fraud.<\/p>\n<p>At this stage, the victim may become alarmed and suspect something is amiss. However, the scammer is quick to reassure their precious\u2026 pig: there\u2019s no need for the victim to transfer any money personally to them or anyone associated with them. All the victim needs do is simply create an account on a trading platform and try to deposit some money there to see how it works.<\/p>\n<h3>Climax: incredible profits and new money deposits<\/h3>\n<p>An important detail of the pig butchering scheme is that at every stage the scammer carefully maintains the victim\u2019s illusion of control. The victim independently creates an account on the trading platform and can independently choose what to trade there. The scammer only provides helpful advice, making the whole process faster and easier \u2014 and of course, as profitable as possible.<\/p>\n<p>The scammer\u2019s trading tips turn out to work well \u2014 who would have guessed it? The victim quickly makes their first profit on the trading platform, gets excited, and starts depositing more and more for even bigger earnings.<\/p>\n<h3>Finale: the scammer vanishes with the money<\/h3>\n<p>But of course, sooner or later, the scammer absconds. This usually happens once a reasonable balance has formed in the account. Alternatively, the scammer may milk the victim until the moment they try to withdraw money from the platform.<\/p>\n<p>That\u2019s when the victim learns the truth: the trading platform was fake, and all those incredible profits just disappeared into thin air. As for the real money, it has long gone to some unknown account. At this stage, the scammer cuts all communication with the victim, deletes the accounts used for the scam, and \u2014 poof! \u2014 vanishes in a puff of smoke.<\/p>\n<p>The victim has lost everything invested in the platform, and we\u2019re usually talking significant amounts: the fraudsters often manage to get away with tens or even hundreds of thousands of dollars \u2014 sometimes even <a href=\"https:\/\/www.reuters.com\/investigates\/special-report\/fintech-crypto-fraud-thailand\/\" target=\"_blank\" rel=\"nofollow noopener\">millions<\/a>.<\/p>\n<h2>Scam farms in Southeast Asia<\/h2>\n<p>As you may have gathered from the description of pig butchering, this scheme has several key differences from most scams. First, the criminals come well-prepared \u2014 they have effective tools to deceive their victims. Second, they\u2019re in no hurry and are ready to work on a single target for a long time, gradually moving toward their sinister goal. Third, we\u2019re talking about truly large sums of money \u2014 meaning the amount of time and effort involved eventually pays off.<\/p>\n<p>The secret to this success is that, in the vast majority of cases, it\u2019s not individual scammers who are behind pig butchering, but large criminal groups. These organizations run huge fraudulent \u201cfarms\u201d, most often located in the least prosperous countries of Southeast Asia. Such farms exist in Laos and the Philippines, but most farms are in Cambodia and, above all, Myanmar, where a civil war has been going on for several years.<\/p>\n<div id=\"attachment_50766\" style=\"width: 1546px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/11134212\/pig-butchering-crypto-investment-scam-1.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50766\" class=\"size-full wp-image-50766\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/11134212\/pig-butchering-crypto-investment-scam-1.jpg\" alt=\"KK Park: one of the largest scam farms\" width=\"1536\" height=\"810\"><\/a><p id=\"caption-attachment-50766\" class=\"wp-caption-text\">One of the largest scam farms engaged in pig butchering \u2014 KK Park. This farm, located in Myanmar near the border with Thailand, employs over 2000 people. <a href=\"https:\/\/www.chainalysis.com\/blog\/pig-butchering-human-trafficking\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>These enterprises are truly massive: for example, a <a href=\"https:\/\/www.scmp.com\/week-asia\/politics\/article\/3228543\/inside-chinese-run-crime-hubs-myanmar-are-conning-world-we-can-kill-you-here\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> last year about one of the largest scam farms, called KK Park, claimed that over 2000 people work there, and it has even earned its <a href=\"https:\/\/en.wikipedia.org\/wiki\/KK_Park\" target=\"_blank\" rel=\"nofollow noopener\">own article on Wikipedia<\/a>. Moreover, the farms are constantly expanding and, of course, new ones are being opened.<\/p>\n<p>Generally speaking, these fraud farms should more accurately be called labor camps \u2014 and this is perhaps the saddest detail of this scheme. For it turns out that the rank-and-file operators of pig butchering \u2014 the ones who directly communicate with the victims \u2014 are usually doing so against their own will.<\/p>\n<p>Scam enterprises require highly skilled, well-educated, multilingual employees with strong online communication abilities. As you might imagine, such people don\u2019t naturally appear in the jungles of Myanmar or Cambodia. Usually, these are citizens of other countries who are lured by the promise of high-paying jobs \u2014 call center operators, SMM specialists, translators or IT specialists.<\/p>\n<div id=\"attachment_50767\" style=\"width: 1210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/11134212\/pig-butchering-crypto-investment-scam-2.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50767\" class=\"size-full wp-image-50767\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/11134212\/pig-butchering-crypto-investment-scam-2.jpg\" alt=\"Construction of a new building at the KKII farm \" width=\"1200\" height=\"800\"><\/a><p id=\"caption-attachment-50767\" class=\"wp-caption-text\">Scam farms are constantly expanding: this photo, taken on July 1, 2023, shows the construction of a new building at KKII \u2014 a newer part of KK Park. Most likely, it has already been completed by now. <a href=\"https:\/\/www.scmp.com\/week-asia\/politics\/article\/3228543\/inside-chinese-run-crime-hubs-myanmar-are-conning-world-we-can-kill-you-here\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Usually, new scam-farm workers first end up in neighboring Thailand, from where they\u2019re taken to Myanmar or Cambodia. There they\u2019re transported to a camp located far away from any large populated areas and have their documents confiscated. Then these people essentially become slaves: they\u2019re forced to work 12-16 hours a day for nothing but food, can be subjected to violence, and sometimes even resold to other fraudsters.<\/p>\n<p>The overall scale of the problem is extremely serious. A <a href=\"https:\/\/www.ohchr.org\/en\/press-releases\/2023\/08\/hundreds-thousands-trafficked-work-online-scammers-se-asia-says-un-report\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> last year by the UN Office of the High Commissioner for Human Rights, citing reliable sources, gave the following figures: at least 120,000 people are employed in scam farms in Myanmar, and approximately another 100,000 in Cambodia.<\/p>\n<h2>How to protect yourself from pig butchering<\/h2>\n<p>It\u2019s difficult to calculate the exact total losses of pig butchering victims because it\u2019s a global problem \u2014 scammers target citizens of different countries. In addition, not everyone reports that they\u2019ve been a victim. However, rough estimates suggest the size of the pig butchering industry runs to billions of dollars.<\/p>\n<p>It\u2019s a very lucrative business, so there\u2019s no use hoping the problem will simply go away by itself. Nor is there any hope that the authorities in Cambodia or Myanmar will address it \u2014 they appear to have other priorities. Therefore, unfortunately, we must protect ourselves and our loved ones on our own. Here\u2019s what we can advise:<\/p>\n<ul>\n<li>Be cautious with random online acquaintances \u2014 even if the person has been communicating with you for a long time and doesn\u2019t seem to be a scammer.<\/li>\n<li>Don\u2019t invest carelessly in obscure investment schemes \u2014 even if they apparently demonstrate high profitability.<\/li>\n<li>In particular, don\u2019t invest carelessly in cryptocurrency schemes, as <a href=\"https:\/\/www.kaspersky.com\/blog\/crypto-actually-non-fungible-tokens\/45597\/\" target=\"_blank\" rel=\"noopener nofollow\">due to the quirks of this topic<\/a> the number of scammers in this sphere is unfortunately <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/cryptocurrencies\/\" target=\"_blank\" rel=\"noopener nofollow\">very high<\/a>. Additionally, it\u2019s important to note that all blockchain transactions are irreversible and uninsured.<\/li>\n<li>Remember the golden rule of investing: the higher the potential profit \u2014 the higher the risk. When it comes to risky schemes, never invest money that you are not prepared to lose.<\/li>\n<li>Inform your family and close ones about this fraudulent scheme \u2014 it\u2019s possible that this could protect them from financial loss, plus the inevitable psychological trauma resulting from such deep deception.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-fraud\">\n","protected":false},"excerpt":{"rendered":"<p>We explain what a pig butchering scam is: how it works, why it&#8217;s dangerous, and how to protect yourself from it.<\/p>\n","protected":false},"author":2726,"featured_media":50765,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[111,2640,3941,80,4352,726,97,422],"class_list":{"0":"post-50764","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-attacks","9":"tag-cryptocurrencies","10":"tag-deception","11":"tag-fraud","12":"tag-investments","13":"tag-scam","14":"tag-security-2","15":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pig-butchering-crypto-investment-scam\/50764\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/pig-butchering-crypto-investment-scam\/27170\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pig-butchering-crypto-investment-scam\/22478\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/pig-butchering-crypto-investment-scam\/11503\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pig-butchering-crypto-investment-scam\/29846\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pig-butchering-crypto-investment-scam\/27345\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pig-butchering-crypto-investment-scam\/27101\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pig-butchering-crypto-investment-scam\/29780\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pig-butchering-crypto-investment-scam\/28606\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pig-butchering-crypto-investment-scam\/37103\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pig-butchering-crypto-investment-scam\/12150\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pig-butchering-crypto-investment-scam\/21613\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pig-butchering-crypto-investment-scam\/22327\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pig-butchering-crypto-investment-scam\/31013\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pig-butchering-crypto-investment-scam\/36039\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pig-butchering-crypto-investment-scam\/27533\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pig-butchering-crypto-investment-scam\/33351\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pig-butchering-crypto-investment-scam\/32977\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=50764"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50764\/revisions"}],"predecessor-version":[{"id":50770,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50764\/revisions\/50770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50765"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=50764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=50764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}