Close Menu
Beverly Hills Examiner

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    15 Most Shocking Cancellations of 2025

    June 21, 2025

    How to Explore Your City Like a Tourist, and Why You’d Want To

    June 21, 2025

    Think Like a Founder: Books for Big Business Moves

    June 21, 2025
    Facebook X (Twitter) Instagram
    Beverly Hills Examiner
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    Beverly Hills Examiner
    Home»Technology»What Is a Pig Butchering Scam?
    Technology

    What Is a Pig Butchering Scam?

    By AdminJanuary 3, 2023
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    What Is a Pig Butchering Scam?


    Digital swindles like business email compromises and romance scams generate billions of dollars for criminals. And they all start with a little bit of “social engineering” to trick a victim into doing something disadvantageous, whether that’s trusting someone they shouldn’t or sending money into the void. Now, a new variation of these schemes, known as “pig butchering,” is on the rise, ensnaring unsuspecting targets to steal all of their money and operating at a massive scale thanks in large part to forced labor.

    Pig butchering scams originated in China, where they came to be known by the Chinese version of the phrase shāzhūpán because of an approach in which attackers essentially fatten victims up and then take everything they’ve got. These scams are typically cryptocurrency schemes, though they can involve other types of financial trading as well. 

    Scammers cold-contact people on SMS texting or other social media, dating, and communication platforms. Often they’ll simply say “Hi” or something like “Hey Josh, it was fun catching up last week!” If the recipient responds to say that the attacker has the wrong number, the scammer seizes the opportunity to strike up a conversation and guide the victim toward feeling like they’ve hit it off with a new friend. After establishing a rapport, the attacker will introduce the idea that they have been making a lot of money in cryptocurrency investing and suggest the target consider getting involved while they can.

    Next, the scammer gets the target set up with a malicious app or web platform that appears trustworthy and may even impersonate the platforms of legitimate financial institutions. Once inside the portal, victims can often see curated real-time market data meant to show the potential of the investment. And once the target funds their “investment account,” they can start watching their balance “grow.” Crafting the malicious financial platforms to look legitimate and refined is a hallmark of pig butchering scams, as are other touches that add verisimilitude, like letting victims do a video call with their new “friend” or allowing them to withdraw a little bit of money from the platform to reassure them. The latter is a tactic that scammers also use in traditional Ponzi schemes.

    Though the swindle has some new twists, you can still see where it’s going. Once the victim has deposited all the money they have and everything the scammers can get them to borrow, the attackers shut down the account and disappear.

    “That’s the whole pig butchering thing—they are going for the whole hog,” says Sean Gallagher, a senior threat researcher at the security firm Sophos who has been tracking pig butchering as it has emerged over the past three years. “They go after people who are vulnerable. Some of the victims are people who have had long-term health problems, who are older, people who feel isolated. They want to get every last bit of oink, and they are persistent.” 

    Though carrying off pig butchering scams takes a lot of communication and relationship building with victims over time, researchers say that crime syndicates in China developed scripts and playbooks that allowed them to offload the work at scale onto inexperienced scammers or even forced laborers who are victims of human trafficking. 



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleStrangely strong interstellar meteorites may come from supernovae
    Next Article Jeremy Renner In ICU After Surgery, Rep Says

    RELATED POSTS

    Anthropic says most AI models, not just Claude, will resort to blackmail

    June 20, 2025

    The 6 Best OLED TVs (2025)

    June 20, 2025

    SpaceX’s Starship blows up ahead of 10th test flight

    June 19, 2025

    Hot Octopuss Pulse Duo Review: Not for Penetration

    June 19, 2025

    Multiplier, founded by ex-Stripe exec, nabs $27.5M to fuel AI-powered accounting roll-ups

    June 18, 2025

    Far-Right ‘Appeal to Heaven’ Flag Flown Above Government Agency in DC

    June 18, 2025
    latest posts

    15 Most Shocking Cancellations of 2025

    When it comes to television, cancellations are an inevitable fact of life, but that doesn’t…

    How to Explore Your City Like a Tourist, and Why You’d Want To

    June 21, 2025

    Think Like a Founder: Books for Big Business Moves

    June 21, 2025

    The Rock ‘Song of the Summer’ for Each Year of the 1990s

    June 20, 2025

    Markets flatline amid Trump’s delay on Iran and potential Fed cuts in July

    June 20, 2025

    Trump Melts Down And Demands Nobel Prize As He Is About To Start A War In The Middle East

    June 20, 2025

    Fruits and vegetables could improve sleep by 16%, new research shows

    June 20, 2025
    Categories
    • Books (589)
    • Business (5,494)
    • Film (5,430)
    • Lifestyle (3,536)
    • Music (5,484)
    • Politics (5,481)
    • Science (4,841)
    • Technology (5,427)
    • Television (5,105)
    • Uncategorized (1)
    • US News (5,481)
    popular posts

    Insightly helps engineering teams increase productivity and reduce burnout – TechCrunch

    Insightly Analytics helps engineering teams stop problems before they happen, like slow release cycles, bottlenecks…

    Calls For Investigation Into The FBI Grow After New Smoking Gun Evidence Revealed Against Brett Kavanaugh

    January 22, 2023

    Bowhead whales still harmed from whaling that ended a century ago

    April 28, 2024

    Bobby Searches for Missing Athena as Cruise Ship Sinks in New Promo (VIDEO)

    February 24, 2024
    Archives
    Browse By Category
    • Books (589)
    • Business (5,494)
    • Film (5,430)
    • Lifestyle (3,536)
    • Music (5,484)
    • Politics (5,481)
    • Science (4,841)
    • Technology (5,427)
    • Television (5,105)
    • Uncategorized (1)
    • US News (5,481)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    Trump Melts Down And Demands Nobel Prize As He Is About To Start A War In The Middle East

    June 20, 2025

    Fruits and vegetables could improve sleep by 16%, new research shows

    June 20, 2025

    Anthropic says most AI models, not just Claude, will resort to blackmail

    June 20, 2025
    © 2025 Beverly Hills Examiner. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT