Pig Butchering Scams: A CISO's Guide to Mitigating a Sophisticated Cyber Threat

According to the Global Anti-Scam Alliance and Chainalysis Reports, “pig butchering” scams — luring victims into investing in fraudulent financial schemes often involving cryptocurrency — cost victims $75 billion globally from 2020 to 2024.

Compromised credentials on dating sites provide scammers a valuable toolset for executing these scams. By leveraging stolen information and impersonating real individuals, they can effectively target and manipulate victims, leading to significant financial losses and emotional distress. myNetWatchman has seen ongoing credential testing at multiple dating sites, with 235 thousand compromised accounts accessed by miscreants in the past year.

The Anatomy of a Pig Butchering Scam

Pig butchering is a long-con fraud where scammers build trust with victims over weeks or months — often posing as romantic or friendly contacts — before luring them into fake investment platforms, typically cryptocurrency-based. The scam’s name reflects the process of “fattening” victims with trust before “slaughtering” them financially.

“Pig butchering isn’t just a scam — it’s a systemic threat that exploits customer trust and bypasses traditional security controls.”

The playbook unfolds in five stages:

  1. Initial Contact — Unsolicited texts, social media, or dating apps. Often a “wrong number” message designed to engage curiosity.
  2. Trust-Building Phase — Weeks or months of frequent messaging, fake personas, and AI-generated content (deepfake images/videos) to establish credibility as a successful investor.
  3. Investment Pitch — Fraudulent investment opportunities via malicious apps or websites mimicking legitimate platforms like Binance, displaying fake returns.
  4. Escalation and Fake Gains — Small initial “returns” build confidence; victims are then pushed for larger investments, sometimes pressured to borrow.
  5. Financial Extraction and Disappearance — When victims attempt withdrawals, scammers cite fees or technical issues, then vanish with the funds.

Real-World Impacts

Connecticut Financial Institution (2020): A customer lost $180,000 after a scammer initiated contact via WhatsApp and guided them to a fake crypto platform. The institution faced reputational damage and legal inquiries for failing to flag the transfers.

Ohio Bank (2024): A regional bank reported $6 million in customer losses to pig butchering scams, with scammers using cloned apps to overwhelm fraud detection systems.

Illinois Credit Union (2024): A widower lost $1 million after months of communication with a scammer posing as a romantic partner. The credit union’s lack of real-time monitoring delayed detection, leading to regulatory scrutiny.

The FBI’s IC3 logged 4,300+ pig butchering complaints in 2021, with losses exceeding $429 million.

Enterprise Risks and Detection Challenges

  • Bypassing Traditional Controls: Scams rely on human manipulation, not malware — evading firewalls and antivirus solutions
  • Cryptocurrency Anonymity: Blockchain transactions are hard to trace, complicating recovery efforts
  • Scalability of Attacks: Crime syndicates operate at scale using call centers and trafficked labor, overwhelming manual detection
  • Customer Education Gaps: Even sophisticated customers fall for well-crafted scams

By combining customer education, behavioral analytics, and advanced credential monitoring, organizations can detect and disrupt these scams early — safeguarding customers and their bottom line.

Special Report

The mechanics of how email became the digital economy’s most consequential vulnerability, the case studies that should have changed everything, and what a continuous intelligence approach actually looks like — all documented in “The Lying Gatekeeper,” a special report from myNetWatchman.

Read the Full Report →