info(at)dizzrupt.nl

Blog Post

Edgar Versteeg • 12 March 2024

Pig butchering a growing online romance scam explained

What is pig butchering?

I have been around in the world of information security for some while, but I just recently heard of the term pig butchering. A term that brings bloody images to my mind. As I was wondering what this is about, I decided to spend some time researching the topic.


The "pig butchering scam" is a term used to describe a fraudulent scheme where victims are fooled via social engineering. Pig butchering can be seen as a confidence trick and/or investment fraud. As you can perhaps guess the term pig used here refers to the victim being fattened until the cybercriminal thinks it is time to slaughter the pig.


In some cases, the term may be used to describe a situation where someone is promised a share of profits from an investment or business venture, only to later discover that the investment or venture is fraudulent and that they have lost their money.

A recent podcast by Darknet Diaries – see the link below – clearly describes a case where a victim falls into a scam being contacted via a dating app. The victim is made greedy with a story as how easy it is to make money with an investment into crypto, then persuaded to invest himself and there the trouble starts.


Another article by Sophos refers to victims being fooled to get involved to invest into crypto liquidity pools where eventually their money is stolen when the malicious actor runs away with all the money invested into the mining pool.


Pig butchering refers to a sophisticated form of social engineering where the trust of the victim is gained to invest money mostly into crypto related investments. Leaked databases or phone numbers being bought via underground marketplaces are most likely the source of how the criminals approach their victims. This article by Trendmicro explains how these scammers work step by step.


Overall, the "pig butchering scam" is just one of many types of scams and fraudulent schemes that people should be aware of and cautious about when dealing with financial transactions or investment opportunities.


In a recent published study by the FBI it is reported the financial damage could be over $650k. As you can be seen that the amount of money involved with confidence or romance fraud is immense.


Time magazine recently published a study stating an amount of $75 billion stolen from victims around the world. In this same article Chainalysis Inc., a blockchain analysis firm, also said the study’s totals might be a bit inflated. Nevertheless the impact is huge.

 

It is not surprising there is crypto involved. The victims are lured with quick and easy profits through crypto investments. Chainalysis publishes yearly how much money can be attributed to malicious activity in their crypto crime report. The recent published 2024 Crypto Crime Report is shows the amount of money allocated to ‘romance scams’ as they refer to pig butchering in the Chainalysis report is growing.


In their article Chainalysis also brings it into context of human trafficking and organized crime in the country of Myanmar, which seems to be a hotspot for this type of scam. This is also strengthened by research by Deutche Welle (DW) that that shows the details of Asia's most brutal scam compounds located in Myanmar, thousands of people are forced into criminality and to scam people all over the world. The UN estimates that more than 100,000 people are being forced to work in scam centers in Myanmar. Reading this article by DW is really a fascinating insight into the world of organized crime around scams.  

 

Who is most at risk and how to protect yourself and friends?

Knowing this remains the question who is more prone to a scam as pig butchering. Certain factors may make individuals more susceptible to scams. These factors include:

  1. Lack of Awareness: Individuals who are not well-informed about common scams and fraudulent schemes may be more vulnerable to falling victim to them.
  2. Isolation: People who are socially isolated or lack a strong support network may be more susceptible to scams, as scammers often target individuals who are lonely or isolated.
  3. Financial Vulnerability: Individuals who are experiencing financial difficulties or are in desperate situations may be more likely to fall for scams promising quick and easy money or solutions to their problems.
  4. Trust: People who are inherently trusting or tend to believe others without question may be more prone to falling victim to scams.
  5. Age: Older adults, particularly those who may not be as familiar with technology or who may have cognitive impairments, are often targeted by scammers.

 

An easy to remember motto: When it's too good to be true, it most likely is …


Here are some essential tips, to protect yourself against scams involves several proactive steps and practices.


  1. Stay Informed: Educate yourself about common scams and the latest techniques used by scammers. Stay updated on news and warnings issued by consumer protection agencies and law enforcement authorities.
  2. Be Skeptical: Be cautious of unsolicited emails, phone calls, text messages, or social media messages, especially if they request personal or financial information or offer deals that seem too good to be true.
  3. Verify Identities: Always verify the identity of the person or organization contacting you before sharing any sensitive information or making financial transactions. Use official contact details obtained independently, rather than relying on information provided in unsolicited communications.
  4. Secure Personal Information: Avoid sharing personal or financial information online unless you trust the recipient and know the purpose of the request. Be cautious when entering sensitive information on websites or mobile apps and ensure that the website is secure (look for "https" and a padlock symbol in the address bar).
  5. Trust Your Instincts: If something feels off or too good to be true, trust your instincts and proceed with caution. Don't hesitate to seek advice or assistance from trusted friends, family members, or professionals if you're unsure about a situation or communication.

 

By staying vigilant, informed, and proactive, you can significantly reduce the risk of falling victim to scams and protect yourself against fraud and identity theft.


References:

  • FBI 2023 report: https://www.ic3.gov/
  • Chainalysis The 2024 Annual Crypto Crime Report: https://www.chainalysis.com/blog/2024-crypto-crime-report-introduction/

 

Articles:

 

Podcast:

  • Darknet Diaries a popular podcast among those with a strong interest in cybercrime published a full episode dedicated to ‘pig butchering’, which can be found here: https://darknetdiaries.com/episode/141/


by Edgar Versteeg 12 October 2023
"Driving the Shift from an Analog to Digital business model in mobility"
by Edgar Versteeg 17 September 2021
"How to make small and medium enterprises aware of the power of cybersecurity"
by Edgar Versteeg 25 November 2020
How to trigger consumers and prosumer to rethink their relationship with energy?
by Edgar Versteeg 14 February 2024
In February 2019 I was asked to provide a keynote to the staff of DIQQ and Q-GRP about the potential of blockchain technology. Below is a short summary of my talk. What is blockchain, and what are the benefits? In my view, the power of blockchain consists of three elements. Blockchain is a new technology that enables participants in a distributed network to securely exchange data. Network security is protected by applying cryptography. A well-known definition is a shared ledger containing all network transactions, accessible to everyone. This database offers maximum transparency, unlike other databases that are often shielded. Data and network security are maintained through cryptography, making it impossible to hack a blockchain or manipulate data. Today, cybersecurity is a significant concern, and when you look at well-known hacks (e.g., Mt Gox), you'll see that hackers targeted the exchange platform or wallet but not the blockchain technology itself. Blockchain technology lacks value without an ecosystem for sharing data. Its strength lies in being open-source technology, allowing anyone to contribute to the ecosystem. Additionally, in the decentralized network, peer-to-peer exchange of 'data' or 'value' is possible, a particularly powerful feature. No central authority or middleman is required, allowing for significant efficiency gains. Moreover, crypto-economics or game theory plays a crucial role in blockchain. This involves protecting the network by considering 'rules' and 'adversarial thinking' (‘What could participants do to disrupt the network?’). Designing the ecosystem and desired and undesired behaviors among all (decentralized) participants can be encoded using incentive mechanisms (tokenization and smart contracts), which holds great potential. The interplay between a well-designed ecosystem, game theory's design patterns, and applying cryptography to concrete customer needs or use cases determine blockchain's success. Blockchain in Practice Blockchain is a powerful technology applicable in various forms, often combined with existing technology. Experimentation with various blockchain applications is underway worldwide, focusing on creating value for customers and sharing information transparently and efficiently with chain partners. A well-known example is bitcoin, which can be viewed as an alternative economic system. The bitcoin network is supported by participants, with cryptography protecting the network and facilitating value transfer. Unlike the euro, there is no central party influencing the operation of bitcoin or the ecosystem. This brings several benefits. However, the governance of a blockchain ecosystem is crucial to prevent undesirable behavior, given the atmosphere of 'get rich quick' schemes and fraud surrounding crypto. Worldwide experimentation with blockchain applications is ongoing, with the potential to significantly disrupt existing platforms like Uber, Netflix, and Facebook. Smart Contract A smart contract involves programming transactions occurring on a blockchain. A blockchain can carry value (e.g., bitcoin), which is automatically disbursed when a transaction meets certain conditions. This means processes in the financial, legal, and logistics sectors can be significantly optimized, requiring fewer human interventions to monitor network transactions. Many startups and corporates are developing blockchain applications with the potential to have a substantial impact on the increasingly digitized world. Maturity Blockchain technology is still in its infancy. After the hype in 2017 and early 2018, things have settled down. Blockchain's strength lies in its ability to carry value (e.g., a cryptocurrency) and program desired behavior in the ecosystem, such as tokenization and the application of smart contracts. Although the value of various cryptocurrencies like bitcoin has significantly declined recently, many companies continue to experiment with blockchain technology with conviction. In short, the technology is still evolving, and finding the right use cases or product-market combination remains a challenge. In my role as a product owner, this is what makes my work so challenging! The full article can be read [In Dutch] on the DIQQ website
by Edgar Versteeg 19 August 2019
In the past months, there were some interesting markers which I would like to share with you which could potentially indicate fundamental changes in the blockchain ecosystem.
by Edgar Versteeg 18 April 2019
Winner of the 2nd prize in the hackathon focused on the inclusive finance
by Edgar Versteeg 11 April 2019
Trends around blockchain that steer the automotive industry
by Edgar Versteeg 18 March 2019
Test your online security awareness
by Edgar Versteeg 11 July 2018
Cybersecurity is an essential element to take care of building your startup or enterprise. Read my top 5 recommendations to start with today when it comes to security measures for start-ups.
by Edgar Versteeg 4 July 2018
Everyone is talking about digital transformation and the shaping of the most thrilling customer journey ever. However not everyone is sailing on a speedboat. Learn by what frontrunners do to succeed in their digital journey.
More posts
Share by: