Pig butchering scam

Last updated

A pig butchering scam is a type of long-term scam and investment fraud in which the victim is gradually lured into making increasing contributions, usually in the form of cryptocurrency, to a fraudulent cryptocurrency scheme. [1] They are commonplace on social apps, where, in October 2023, twelve percent of Americans using said apps had been victims, up from five percent in 2018. [2] The scammer builds trust with the victim through online communication, subsequently persuading them to invest in a fraudulent cryptocurrency scheme. The "butchering" or "slaughtering" of the victim transpires when their assets or funds are stolen. [3]

Contents

Perpetrators are typically victims of a fraud factory, [4] lured from abroad under false pretenses and then forced to commit the fraud by organised crime gangs. [5] Many operations are run from areas of Myanmar which are outside central government control due to the ongoing civil war, with one important hub being the town of Myawaddy in Kayin State, near the border with Thailand. Many of the gangs running pig butchering scams, along with the people forced to commit the fraud, are ethnically Chinese. [6]

History

Pig butchering scams originated in 2020 as a regional scam in China and later spread throughout Southeast Asia at the height of the COVID-19 pandemic. In Sihanoukville, Cambodia—once a prosperous gambling town—many local gambling gangs transformed casinos into scam operation centers performing pig butchering scams. This was likely a result of a lack of casino attendance on account of the COVID pandemic, including the pandemic making international travel difficult, and the Cambodian government cracking down on commercial gambling. [5] [7]

Pig butchering scams gained international momentum through the exploitation of online dating apps and social media platforms. [8] Scammers crafted elaborate fake identities to establish romantic or emotional connections with victims, thus marking a departure from conventional financial scams by integrating psychological manipulation. This early phase of these scams primarily targeted local populations but quickly expanded as digital connectivity grew. [5]

The scams evolved significantly with the integration of sophisticated techniques, including the creation of fake online investment platforms and the use of social engineering. A key aspect of this evolution was the use of cryptocurrency for transactions, which appealed to scammers due to its difficulty to trace and recover. The scams' globalization can be attributed to the increased ubiquity of digital interactions and the rising popularity of cryptocurrencies, which provided a new avenue for such fraudulent activities on a global scale. [9]

Implementation

Pig butchering scams involve a series of meticulously planned steps to deceive and exploit victims, typically focusing on cryptocurrency investment fraud. [1]

  1. Gaining trust: Scams often begin with casual conversations initiated by the scammer, who may pretend to have received the victim's contact details accidentally or through a mutual acquaintance. These initial interactions are designed to build trust and may involve the use of attractive profile images to lure victims.
  2. Introducing the investment: As trust is established, the scammer introduces the victim to a fraudulent investment scheme, promising significant returns in a short period. The scammers use persuasive tactics and counterfeit investment portfolios to convince victims of the scheme's legitimacy.
  3. Collecting money: After convincing the victim to invest, scammers collect funds, often through digital payment platforms or cryptocurrencies, to complicate tracking and tracing of the transactions.
  4. Disappearance of the scammer: Once a substantial amount has been collected, or when victims attempt to withdraw funds, scammers become unreachable, delete their online presence, or create new identities, leaving the victims with no way to recover their funds.

Furthermore, the scammers develop fake brokerage websites and mobile applications to add legitimacy to their scheme, making it difficult for victims to distinguish them from genuine platforms. The report[ which? ] underscores the impact of these scams, with millions of dollars lost by victims, and emphasizes the importance of caution and vigilance in online investments.[ citation needed ]

Countermeasures

The IRS has issued warnings about the rising prevalence of these scams, particularly targeting U.S. taxpayers. The agency notes that losses often reach hundreds of thousands of dollars, with some victims losing as much as $2 million. [9]

An important aspect of countering pig butchering scams involves tracing stolen cryptocurrencies. This process is intricate due to the decentralized and pseudo-anonymous nature of cryptocurrencies. Specialists in this field utilize various tools and techniques to track the flow of stolen digital assets through blockchain networks.[ citation needed ]

The process typically begins with the collection of relevant transaction data, such as transaction IDs and wallet addresses associated with the scam. Advanced blockchain analysis tools are then employed to trace the path of the stolen funds. These tools can identify patterns and link different transactions to specific wallets, which are essential in building a case against the perpetrators. [10]

Consequences

The scam typically combines elements of romance and investment fraud, and often involve the gradual building of a relationship with the victim, leading to significant financial losses. Victims are lured into investing in fake opportunities, particularly with cryptocurrencies, and end up losing large sums of money. The psychological impact is equally severe, as victims not only face financial ruin but also the loss of what they perceived as a genuine, intimate relationship. These type of scams are particularly insidious because they play on both the financial aspirations and emotional needs of individuals, leaving victims feeling betrayed, embarrassed, and reluctant to discuss their experience with others or report it to authorities. [11] [12]

The 2023 Chinese movie No More Bets is a crime drama based on interviews with real victims of the scams. It garnered attention and success in China, bringing the scams and the issues related to them to the forefront of public discourse. The movie highlights the plight of the numerous low-level scammers who are themselves victims of coercion, having been lured from their homes by promises of stable employment, only to find themselves trapped and forced into committing these scams. [5]

See also

Related Research Articles

<span class="mw-page-title-main">Advance-fee scam</span> Type of confidence trick fraud

An advance-fee scam is a form of fraud and is one of the most common types of confidence tricks. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster claims will be used to obtain the large sum. If a victim makes the payment, the fraudster either invents a series of further fees for the victim to pay or simply disappears.

<span class="mw-page-title-main">Ponzi scheme</span> Type of financial fraud

A Ponzi scheme is a form of fraud that lures investors and pays profits to earlier investors with funds from more recent investors. Named after Italian businessman Charles Ponzi, this type of scheme misleads investors by either falsely suggesting that profits are derived from legitimate business activities, or by exaggerating the extent and profitability of the legitimate business activities, leveraging new investments to fabricate or supplement these profits. A Ponzi scheme can maintain the illusion of a sustainable business as long as investors continue to contribute new funds, and as long as most of the investors do not demand full repayment or lose faith in the non-existent assets they are purported to own.

<span class="mw-page-title-main">Scam</span> Attempt to defraud a person or group

A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using a combination of the victim's credulity, naïveté, compassion, vanity, confidence, irresponsibility, and greed. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators at the expense of their victims ". Some people consider a pyramid scheme to be a type of scam.

<span class="mw-page-title-main">Pump and dump</span> Form of securities fraud

Pump and dump (P&D) is a form of securities fraud that involves artificially inflating the price of an owned stock through false and misleading positive statements (pump), in order to sell the cheaply purchased stock at a higher price (dump). Once the operators of the scheme "dump" (sell) their overvalued shares, the price falls and investors lose their money. This is most common with small-cap cryptocurrencies and very small corporations/companies, i.e. "microcaps".

Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or other financial institution. In many instances, bank fraud is a criminal offence.

A binary option is a financial exotic option in which the payoff is either some fixed monetary amount or nothing at all. The two main types of binary options are the cash-or-nothing binary option and the asset-or-nothing binary option. The former pays some fixed amount of cash if the option expires in-the-money while the latter pays the value of the underlying security. They are also called all-or-nothing options, digital options, and fixed return options (FROs).

<span class="mw-page-title-main">Internet fraud</span> Fraud or deception using the Internet

Internet fraud is a type of cybercrime fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit actions that are committed in cyberspace. It is, however, differentiated from theft since, in this case, the victim voluntarily and knowingly provides the information, money or property to the perpetrator. It is also distinguished by the way it involves temporally and spatially separated offenders.

Email fraud is intentional deception for either personal gain or to damage another individual using email as the vehicle. Almost as soon as email became widely used, it began to be used as a means to defraud people, just as telephony and paper mail were used by previous generations.

In business, the term boiler room refers to an outbound call center selling questionable investments by telephone. It usually refers to a room where salespeople work using unfair, dishonest sales tactics, sometimes selling penny stocks or private placements or committing outright stock fraud. A common boiler room tactic is the use of falsified and bolstered information in combination with verified company-released information. The term is pejorative: it is often used to imply high-pressure sales tactics and, sometimes, poor working conditions.

<span class="mw-page-title-main">Romance scam</span> Confidence trick using romantic intentions

A romance scam is a confidence trick involving feigning romantic intentions towards a victim, gaining the victim's affection, and then using that goodwill to get the victim to send money to the scammer under false pretenses or to commit fraud against the victim. Fraudulent acts may involve access to the victim's money, bank accounts, credit cards, passports, e-mail accounts, or national identification numbers; or forcing the victims to commit financial fraud on their behalf.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

Telemarketing fraud is fraudulent selling conducted over the telephone. The term is also used for telephone fraud not involving selling.

The parcel mule scam, also known as the reshipping scam, involves scammers and unsuspecting victims handling goods to other countries. In some ways it is similar to the money mule scam. Scammers use fake advertising to hire mules. Items are bought with stolen cards, and since the goods are typically re-sold once shipped, this scam can be viewed as an indirect form of money laundering.

<span class="mw-page-title-main">SpotOption</span>

SpotOption was a privately held platform software provider based in Israel in the controversial binary option industry, which was banned in Israel starting in January 2018. The firm announced that it has left the binary options business and is exploring other possibilities. It had previously announced a downsizing of its operations in Israel and moving many functions to other locations. The firm claimed to have 70 percent share in the market for binary options platforms, and charged binary options firms up to 12.5% of their revenues.

An exit scam, is a confidence trick, con job or fraud, perpetuated under the guise of a legitimate business, that ends when the originator absconds with the funds contributed by participants. When a business entity rug-pulls and stops shipping orders while receiving payment for new orders, it could take some time before it is widely recognized that orders are not shipping. The entity can then make off with the money paid for unshipped orders. Customers who trusted the business do not realize that orders are not being fulfilled until the business has already disappeared. Exit scams are commonly associated with the rise of cryptocurrency projects due to the lack of regulation and decentralized ecosystem.

An initial coin offering (ICO) or initial currency offering is a type of funding using cryptocurrencies. It is often a form of crowdfunding, although a private ICO which does not seek public investment is also possible. In an ICO, a quantity of cryptocurrency is sold in the form of "tokens" ("coins") to speculators or investors, in exchange for legal tender or other cryptocurrencies such as Bitcoin or Ether. The tokens are promoted as future functional units of currency if or when the ICO's funding goal is met and the project successfully launches.

Cryptocurrency and crime describe notable examples of cybercrime related to theft of cryptocurrencies and some methods or security vulnerabilities commonly exploited. Cryptojacking is a form of cybercrime specific to cryptocurrencies that have been used on websites to hijack a victim's resources and use them for hashing and mining cryptocurrency.

<span class="mw-page-title-main">SafeMoon</span> Cryptocurrency technology company and token

SafeMoon LLC was a cryptocurrency and blockchain company created in March 2021. The company created the SafeMoon token (SFM) which traded on the BNB Chain blockchain. The token charged a 10% fee on transactions, with 5% redistributed to token holders and 5% directed to wallets in a different currency, Binance Coin (BNB), controlled by the coin's authors. The token reached its all time high market cap in April 2021 of $17b. As of December 2022, it had dropped 98.7% in value to $223m.

A fraud factory or fraud park is a collection of large fraud organizations usually involved in human trafficking operations, commonly found in Southeast Asia and usually operated by a criminal gang. Fraud factory operators lure foreign nationals to scam hubs, where they are forced into modern slavery, to scam internet users around the world into fraudulently buying cryptocurrencies or withdrawing cash, via social media and online dating apps. Trafficking victims' passports are confiscated, and they are threatened with organ harvesting and forced prostitution if they do not scam sufficiently successfully.

References

  1. 1 2 "Unmasking Pig-Butchering Scams and Protecting Your Financial Future - Noticias de seguridad - Trend Micro ES". www.trendmicro.com.
  2. "The Pig Butchering Scam: 10 Common Warning Signs". www.aura.com.
  3. "District of Massachusetts | United States Files Forfeiture Action to Recover Cryptocurrency Traceable to Pig Butchering Romance Scam | United States Department of Justice". www.justice.gov. 2024-03-13. Retrieved 2024-04-28.
  4. "FinCEN Issues Alert on Prevalent Virtual Currency Investment Scam Commonly Known as 'Pig Butchering'". www.fincen.gov.
  5. 1 2 3 4 "The involuntary criminals behind pig-butchering scams". MIT Technology Review. Retrieved 2024-01-29.
  6. Qian, Isabelle; Robles, Pablo (2023-12-17). "7 Months Inside an Online Scam Labor Camp". The New York Times. ISSN   0362-4331 . Retrieved 2023-12-17.
  7. Podkul, Cezary (13 September 2022). "Human Trafficking's Newest Abuse: Forcing Victims Into Cyberscamming".
  8. Cryptocurrency scams metastasize into new forms Sophos News
  9. 1 2 "CI issues red flags, tips to avoid falling victim to pig butchering schemes during International Fraud Awareness Week | Internal Revenue Service". www.irs.gov. Retrieved 2024-01-29.
  10. "Pig Butchering Scam - Protect Yourself!". CNC Intelligence. 2022-12-23. Retrieved 2024-01-31.
  11. "Why "Pig Butchering" and Other Scams Are on the Rise | Psychology Today". www.psychologytoday.com. Retrieved 2024-01-31.
  12. "'Pig Butchering' Scams: What They Are and How to Avoid Them | FINRA.org". www.finra.org. 2022-12-13. Retrieved 2024-01-31.

Further reading