Learning Library

← Back to Library

Understanding Pig‑Butchering Scams

Key Points

  • A “pig‑butchering” scam lures victims by building a faux friendship or romance, then pushes them into a high‑risk investment or money‑transfer scheme once trust is established.
  • Variations include job‑recruitment scams that promise unrealistic remote work and pay, using similar “fatten‑up” tactics to convince people to send money or personal data.
  • Both love‑ and money‑focused scams follow a predictable anatomy: initial contact (often via text or social media), gradual relationship‑building, and a final “butchering” request for funds or confidential information.
  • Recognizing red flags—such as unsolicited invitations, offers that seem too good to be true, and pressure to send money—helps protect against these increasingly common frauds.

Full Transcript

# Understanding Pig‑Butchering Scams **Source:** [https://www.youtube.com/watch?v=bSUUyxVwByg](https://www.youtube.com/watch?v=bSUUyxVwByg) **Duration:** 00:20:32 ## Summary - A “pig‑butchering” scam lures victims by building a faux friendship or romance, then pushes them into a high‑risk investment or money‑transfer scheme once trust is established. - Variations include job‑recruitment scams that promise unrealistic remote work and pay, using similar “fatten‑up” tactics to convince people to send money or personal data. - Both love‑ and money‑focused scams follow a predictable anatomy: initial contact (often via text or social media), gradual relationship‑building, and a final “butchering” request for funds or confidential information. - Recognizing red flags—such as unsolicited invitations, offers that seem too good to be true, and pressure to send money—helps protect against these increasingly common frauds. ## Sections - [00:00:00](https://www.youtube.com/watch?v=bSUUyxVwByg&t=0s) **Pig Butchering Scam Explained** - The video details how scammers initiate friendly messages, cultivate trust with fake personal or job offers, and ultimately extract money by “fattening” the victim before the final “butchering” investment or employment scam. ## Full Transcript
0:00you ever had a message exchange that 0:02went something like this are you free 0:05tomorrow no very expensive huh sorry I 0:10don't recognize this number who are you 0:12I'm Selena if you have no plans I'd like 0:15to invite you to join us for a barbecue 0:18sounds like a harmless case of mistaken 0:20identity right well maybe not this might 0:23be the beginning of your worst nightmare 0:25we call this a pig butchering scam now 0:29don't worry No Pigs were harmed in the 0:31making of this video the reason it's 0:33called that is because you the victim 0:35are the pig and they are going to fatten 0:37you up through getting in your good 0:40graces developing a relationship with 0:43you making you think they're your friend 0:45then they're going to entice you into 0:47some sort of scam probably an investment 0:50scam and that's when the butchering 0:52happens okay so maybe you're smart 0:54enough and say I'm never sending money 0:55to anyone over the Internet under any 0:58circumstance that one's not an issue for 1:00me how about this one you're an honest 1:02person just looking for an honest job 1:04the job market is not being favorable to 1:07you and finally you get a message like 1:10this on your professional social media 1:13app and it says sorry to bother you your 1:15background and resume have been 1:17recommended by multiple online recruit 1:19recruitment agencies therefore we would 1:22like to offer you a great remote online 1:24part-time full-time job helping 1:26Merchants blah blah blah it pays this 1:29much a day it pays all of this stuff is 1:31just awesome it sounds too good to be 1:33true well of course it is in fact this 1:37is what we call a job recruitment scam 1:39it's a similar version of the pig 1:42butchering scam but there may be 1:45different aspects to it so we're going 1:47to take a look at both of these scams 1:50and try to see what we can do to learn 1:52to recognize them and what we can do to 1:55prevent falling victim to 1:57them these scams tend to Revol around 2:00one of two things Love or Money or both 2:04in many cases so let's take a look at 2:07what the anatomy of these attacks are 2:08like and how they end up leading you 2:10into a bad place so first of all we'll 2:12take a look at the the first one that's 2:15the love or relationship related scam so 2:18these can take one of a couple of 2:20different forms one would be what's 2:23called a romance scam and these things 2:27tend to start they can start from a text 2:30message like I just demonstrated before 2:33and then they develop what you think is 2:35a relationship with you it's not really 2:37a relationship and in fact the the 2:40person that you're talking to is not 2:42probably who you think they are and 2:44that's where some of these others come 2:46in dating apps and sites are a good 2:49example of where you see a lot of fraud 2:53someone goes and finds uh pictures of 2:55some attractive person on social media 2:58puts that in a fake profile file and 3:00then you start communicating with them 3:03you think that's who you're talking to 3:05you're not you're talking to someone 3:06else who looks nothing like that and is 3:08nothing like that but they start 3:10communicating with you and you're having 3:12this what you think is a relationship so 3:15that's one path where this goes and then 3:18at some point what is going to happen is 3:21there's going to be some soab story uh 3:23some situation where uh they got mugged 3:27uh their money was stolen from them uh 3:29they have a medical bill that they need 3:30to pay they're going to come to visit 3:32you maybe and they just need the money 3:34for the plane ticket or for whatever it 3:37is and that is of course where the scam 3:40part comes in now A variation on this 3:43relationship is not so much about 3:45romance uh but it's more about 3:47friendship and in this case uh these 3:50tend to start off because we don't have 3:52friend apps so much but these will tend 3:54to start off like the example I showed 3:56you that's it's a text message that 3:58comes down out of the clear blue that 4:00looks like one of these uh mistaken 4:02identity situations but then what you 4:05know is wrong about this is they 4:06continue why would they invite a total 4:09stranger who they have no idea who they 4:10are they don't even know what city you 4:12live in at this point and they're 4:13inviting you to come to a picnic or a 4:15barbecue or trying to start up a 4:17relationship with you you know look if I 4:19was trying to reach John and I ended up 4:21with Jeff why do I want to just continue 4:24the conversation with Jeff when I was 4:26really trying to have it with John that 4:27should be your your your clue that this 4:30is not legit so the text message 4:33exchange you continue with all of this 4:35then eventually they're going to involve 4:37you in some sort of probably an 4:40investment scam of some sort they're 4:43going to say oh here's a picture of my 4:45new home my new car my new boat and 4:48start showing you a lot of things and 4:50say hey would you like to be able to get 4:51these things too and here by the way I 4:54just made a ton of money in the last 20 4:56minutes I doubled my money on some sort 4:58of fake crypto scam because in fact 5:01there's no real investment that's even 5:03happening they're going to tell you that 5:05they'll let you in on the deal if you 5:07will just send the money to them and 5:08then they'll show you fake results that 5:10make you think you're winning you will 5:12invest more money and more money and so 5:15forth and this all uh and by the way 5:17these dating scams can also do the same 5:20thing these can end up moving to a fake 5:23investment scheme but as you can see all 5:27of them end up in the same place you 5:29losing money somehow or another now 5:32let's take a look at the other side of 5:33this the other is a job offer that comes 5:36in and in this case they're going to 5:38lead you through a different process 5:40they're going to ask you to do some sort 5:42of job application fill out this form uh 5:45maybe even goes through some interviews 5:48which will all be faked uh these will be 5:50individuals who are not working for any 5:51company they are scammers and they're 5:53just trying to get information out of 5:55you a couple of different variations and 5:58by the way there are a lot of variations 5:59on a number of these I'm just trying to 6:00show you what a few of the most common 6:02ones are but in this case what do we put 6:05on a job application personally 6:07identifiable information your name 6:10address maybe social security number 6:12because after all if you're going to 6:13work for these people they have to know 6:14that in order to to do the taxing and 6:17things like that where they going to 6:18send their paychecks to your paychecks 6:21this kind of information so it seems 6:23like uh a plausible case that they would 6:25need if they're going to be your 6:26employer they would need that kind of 6:28information what could that lead to well 6:31how about identity theft so if I have 6:35all of that information about you in 6:37fact I now have the ability to do a lot 6:40of things with that information 6:41including steal your identity and do 6:43fraud with it another example on this 6:46one is maybe we say congratulations 6:49you've been hired in fact I know a guy 6:51who got one of these and in that case 6:54what they said is here we're going to 6:55send you a check and you deposit this 6:58into your account so we're going to 6:59front you the money but in order to do 7:01your job you're going to need to buy 7:02some supplies so we'll send you the 7:04check you put that in your account but 7:06in the meantime you go ahead and buy 7:08these supplies from this special website 7:10well guess what the website is not a 7:13place where you can buy supplies it's 7:15just a place that's going to collect 7:16your credit card and then they're 7:18they're Off to the Races so this is 7:20going to lead from what should have been 7:23uh work supplies in order to get your 7:25your job done into yet another case of 7:29you losing money and you notice what's 7:32common about both of these they end up 7:35in the same dead 7:37end so how could this situation that I 7:40just outlined actually get worse I'm 7:42glad you asked let's take a look so what 7:45kind of information could the scammer 7:47glean from you well a couple of 7:49different sources for instance one the 7:51text message exchange that we just 7:54talked about so some things that they're 7:55going to find out automatically or then 7:58through a little more conversation with 8:00you they can tease out some information 8:03for instance one of the things they know 8:05is what your phone number is now you say 8:08well they kind of had to know that 8:09already in order to text me no they 8:10didn't they could just pick a random 8:12number but what they discovered when you 8:15answered is that this is a valid number 8:19and that it's active so they know the 8:22status of that number so it's a 8:24legitimate number and there's a real 8:26person on the other end now what else 8:28could they find out well 8:30again they say I'm Selena you know 8:32they're going to eventually ask you 8:33what's your name and you're going to 8:35tell them if you're following along with 8:36the scam tell them your name maybe not 8:39your full name but it it gets you know 8:42it starts small and it builds then oh 8:45yeah well I live they'll say I live in 8:47Los Angeles so where do you live and 8:49then you're going to tell them because 8:51again you think there's a possibility 8:53for romance or friendship uh seems 8:56harmless enough then oh yeah I'm working 8:58in this field what kind of work do you 9:00do and you're going to tell them and 9:03that's going to get a lot of information 9:05just out of the text exchange now what 9:08could all of that stuff lead to well 9:10with that now we can go off to social 9:13media uh if I'm the scammer and I could 9:17also do a public record search with some 9:19of this information and start to learn 9:22even more about who you are for instance 9:25some of the things that I might be able 9:27to find would be what your ual home 9:29address 9:31is by taking some of this and putting it 9:33all together and doing the right 9:34searches I could find out what your work 9:37history is go into of course there are 9:39social media sites that are 9:41professionally oriented and they will 9:43show work 9:45history they'll also show educational 9:48history why would that be interesting 9:51we'll take a look back in just a few 9:52minutes but these kinds of things will 9:54be useful later all of this information 9:56is being revealed might also figure out 9:59from these sources your relationship 10:02status they could also find out things 10:05like who your family and friends are so 10:08who are your 10:09Associates um and those would be useful 10:13to further attacks against for instance 10:16them as other victims potentially U 10:19other things they're going to learn from 10:21social media your favorites because 10:24after all in social media we tell the 10:25whole world what my favorite color is 10:28what's my favorite team what's my 10:30favorite pet this kind of thing so all 10:32of that kind of information gets filled 10:34in here from social media and then other 10:37things like the city you were born in so 10:40your birth city uh and so forth now that 10:44is a ton of information that really came 10:47from what seemed like a pretty benign um 10:50conversation over text and all of this 10:54information fed together leads to more 10:57of this kind of information and all of 10:59that information then used to further 11:02the attack what could they do from an 11:04attack perspective well as I mentioned 11:07already identity theft so if we're going 11:10to do an identity theft case I need to 11:13know a lot of this kind of detail so 11:15that I can open a credit card in your 11:17name so that I can get a loan in your 11:20name and therefore the attacker is able 11:23to get this kind of money from you and 11:26do damage to your credit along the way 11:28another another big one pay close 11:30attention on this one 11:33atto uh is account 11:35takeover if you think about this if you 11:38forget your password how do you go get 11:40back into your account again well you 11:42have to answer some questions and what 11:44kind of questions do they ask you oh 11:46yeah what city were you born in where 11:48did you go to High School uh what was 11:50your favorite pet who's your favorite 11:52sports team in other words the answers 11:55to most of these things will be the 11:57things that allow someone to take over 12:00your account by doing a password reset 12:03once they've been able to do that and 12:05they can take over your email account 12:07then it's game over because the email 12:10account is where I'm then going to be 12:11able to go to all these other sources 12:13and do even more damage so I can get go 12:16to your bank and have your password 12:18reset and it's going to go to your email 12:20address which now the bad guy is in 12:22control of now they're able to basically 12:25do whatever they want what else might 12:27happen here well look people tend to 12:29choose the same password for everything 12:31if they can get away with it because 12:33it's simpler and easier to remember so 12:35it's not just your personal stuff it's 12:37the company as well who you work for 12:40your password to log in there might also 12:42be compromised in this so this is where 12:45it brings it back to not just you but 12:47the place you work now has a security 12:49threat that could occur uh some other 12:52things with this kind of information 12:54that could be done is more convincing 12:57social engineering attacks so I could do 12:59this against your co-workers the people 13:02you work with if I knew all of this 13:06about you I could call your coworker and 13:08say hey look I am Jeff's cousin or his 13:12friend and uh he's been in an accident 13:15and uh we need your help and blah blah 13:18blah so there's another pretext for a 13:20different type of scam that's called 13:22social engineering where someone is 13:24basically abusing the tendency people 13:27have to trust each other other examples 13:29Merchants so it could be a place where 13:32you buy stuff from if I have all of this 13:36information maybe I can take over your 13:38account on that online ordering site and 13:41then I can order all kinds of stuff and 13:43you pay the bill and I get the stuff um 13:46other examples here your bank which of 13:49course is where all the money is we 13:52think and if I get that kind of 13:54information here I can use this to 13:57socially engineer the people at the bank 13:59say hey look I lost my password my 14:01computer blew up you know whatever my 14:03phone was stolen I need to be able to 14:05get back into my account and they're 14:06going to ask you a bunch of questions to 14:08prove that you're who you claim you to 14:10be going to be these kinds of questions 14:13all this kind of information that seemed 14:15to begin with something very benign and 14:18very simple a casual conversation leads 14:21into more and more detail and the 14:22further you go down the rabbit hole the 14:24more the attack gets 14:27dangerous so what can you do to make 14:30sure you don't fall victim to one of 14:32these scams the first thing you should 14:34do is something you shouldn't do and 14:36that is respond don't respond when you 14:39get that random text message from 14:41someone you don't know that seems to be 14:43trying to start a conversation with you 14:46just don't respond because that way you 14:49don't validate what they're doing they 14:51don't know then if your number is valid 14:53or not is active or not and they will 14:55eventually leave you alone and move on 14:58the next thing is be skeptical uh 15:01throughout all of this with any of these 15:04kind of of attacks you need to keep 15:07thinking does this sound too good to be 15:09true has has some beautiful person 15:12suddenly wanted to become my friend uh 15:15as a company now starting to make a job 15:18offer to me that is too good to be true 15:21be skeptical about those things in fact 15:23do some research especially on the job 15:26hunt scams where you're looking for a 15:29job go look up that company make sure 15:32they really exist although even if they 15:34do that doesn't mean scammers aren't 15:36using the name of a wellknown and 15:39existing company to hide behind so make 15:42sure if you can that in fact these 15:44people work for that company in fact 15:47here's an idea before you start giving 15:49out personal information to that company 15:51go look up the company and make sure 15:53that looks like they have a legitimate 15:54history other than just their website 15:57look at other websites as well 15:59surrounding it and then call the company 16:02up and say is there a person working for 16:05you that is under the name of this 16:06recruiter and are you offering a job and 16:10and just validate all of that so do your 16:12research and don't just look at one 16:14point uh of data for that um other 16:17things that you can do is a preemptive 16:20strike is lock your credit in the US 16:23there are three credit bureaus and you 16:25can go onto a website make sure you get 16:27the right one because there's a a lot of 16:29scam websites that claim that they will 16:30lock your credit and all they're going 16:32to do is Harvest your personally 16:33identifiable information which is worse 16:36make sure you get to the legitimate 16:37websites and there you can for free lock 16:40your credit so if anyone runs a credit 16:43history report on you it will fail you 16:45have to unlock it first that also makes 16:48it so that someone who's trying to open 16:50a credit card in your name is not going 16:52to succeed because the credit card 16:54company is going to want to run one of 16:55these reports and if your credit is 16:57locked it's not going to work work so 16:59that's a way to lock some things down as 17:02well another thing you should lock down 17:03and tighten up are your privacy settings 17:06on social 17:07media so all of that information I 17:09talked about that someone might glean 17:11from your account make sure they can't 17:13make sure that only people who are your 17:16friends on social media can see that 17:19kind of information now by default a lot 17:22of the social media sites share 17:24everything because that's what works 17:26best for their business model but for 17:27your business model it's best that you 17:29don't share everything you put only the 17:31minimum available to people who are not 17:33your friends and then for friends make 17:36sure you only friend people that you 17:37know in the real world and that you 17:39trust so don't accept every friend 17:42request that comes in from someone no 17:44matter how attractive or interesting 17:46they might be if you don't know them in 17:48the real world don't accept it so that 17:51way you keep that information out of the 17:53hands of the bad guys some other things 17:55you could do to help use a password 17:58manager if you're going to have to be 17:59using passwords use one of these things 18:02uh there are tools that you can buy 18:04there are tools that are built into some 18:05of the operating systems these days that 18:08will assign complex passwords and allow 18:11you to have a different password for 18:12every website keep them all straight 18:15that's a really good one for companies 18:16as well to make sure that their 18:18employees are doing so that way if an 18:20employee does in fact fall victim to one 18:23of these scams and their password is 18:25compromised it's not the same password 18:27that's getting them into the corporate 18:28website so making available a password 18:32manager to your employees is actually a 18:34smart investment uh other things you 18:36should do is every chance you get a 18:39chance uh every time you get a chance 18:41use multiactor authentication if a 18:43website offers you that or a two-step 18:45authentication they go by different 18:48types of processes but use those things 18:50uh multiactor authentication combines 18:53something you know with something you 18:54have something you are some combination 18:57of those things and it's a lot harder if 18:59someone just steals your password that's 19:01something you know they still wouldn't 19:02be able to to log into your account and 19:05then something if you watched my V 19:07videos in the past you know I'm a big 19:09fan of are phto pass keys and if you 19:12think that means you have to have a 19:13separate hardware token in order to do 19:15it you're sort of right but mostly wrong 19:18with the new PH2 standard you're able to 19:20in fact use your phone your mobile phone 19:22you don't have to carry around a 19:24separate security key a separate 19:26security device in order to do these 19:28things and and these are even better 19:29because then I don't need a password 19:31manager uh to manage all my passwords 19:33because I don't have passwords I could 19:35use a password manager just to manage my 19:37pass Keys which are much more secure 19:39watch my video on that if you're 19:41interested in learning more and then 19:43finally especially if you're an a 19:45corporation or an organization do 19:48training of your employees you do annual 19:51security training at least I hope you do 19:53this is something that should be 19:54included in that annual training make 19:57sure that your employees are aware of 19:59what these scams are like because some 20:01of them may be looking for jobs and they 20:02could be very vulnerable and they could 20:04end up unknowingly making your corporate 20:07information available to bad guys as 20:09well so the bottom line is I feel like 20:12if this video helps only one person 20:15that's one win for the good guys and 20:18I'll take that any 20:20day if you like this video and want to 20:22see more like it please like And 20:24subscribe if you have any questions or 20:26want to share your thoughts about this 20:28topic please leave a comment below