🚨 Scam Guide · 2026 · Everywhere

Pig-Butchering Scams: 7 Variants and the Script Behind Them

$5.8B stolen from Americans in 2024. One script. Seven masks. Documented from r/Scams victim threads and verified against FBI, FTC, USIP, and OFAC reporting.

💬 Channels: Hinge · WhatsApp · LinkedIn · SMS 📅 Updated April 2026 📑 7 variants documented ⭐ Reddit-sourced & FBI-verified
5 High Risk2 Medium
📖 16 min read

📌 The 30-Second Version

Pig-butchering is a long-con investment fraud. A scammer cultivates a personal relationship over weeks (the "fattening"), then pivots to a fabricated crypto-trading platform. You see profits, deposit more, then hit a wall of "withdrawal taxes" you keep paying. The FBI's 2024 IC3 report attributed $5.8B in U.S. losses to crypto-investment fraud, most of it pig-butchering. Recovery is rare; defense is structural.

⚡ Quick Safety Rules

🪞 Am I in this script right now? — 30-second self-check

Honest answers only. If you say yes to two or more, stop reading this page and call a trusted friend before you do anything else.

  1. Did the conversation move from a dating app, LinkedIn, or a "wrong number" text to WhatsApp / Telegram / Signal — at the other person's suggestion?
  2. Has someone you haven't met in person introduced you to a trading platform, signals group, or "uncle" with crypto expertise?
  3. Did a small early withdrawal succeed, but a larger withdrawal now requires a "tax," "fee," or "verification deposit" before you can receive your balance?
  4. Have you been encouraged to keep this private from your spouse, family, or financial advisor — even briefly?

2+ yes: You are in a pig-butchering script. Stop depositing now. → Skip to What to Do

Jump to a Variant

  1. High Hinge / Bumble → WhatsApp → "Uncle's Trading Signals"
  2. High "Wrong Number" Text → Slow-Build Crypto Pitch
  3. High LinkedIn DM → "Mentor / Side-Hustle Group"
  4. High The Withdrawal-Tax Trap
  5. Medium Telegram "Liquidity Provider" / Yield-Farming Variant
  6. Medium "Spouse Doesn't Know" Secret-Account Variant
  7. High Recovery-Scam Follow-On (DMs after a public victim post)

The Anatomy of a $15K Loss

The post is titled "Just realized I'm in a 'Pig Butchering' scam. $15k gone. I feel physically sick." The author is a tech worker. He matched with a woman on Hinge and moved to WhatsApp by message three because "she didn't check Hinge often." For five weeks they exchanged daily updates and cooking photos. Then she mentioned her uncle, a hedge-fund guy who ran a private signals group. She had made $3,000 last month, she said. He could try a small deposit. He put in $500. The platform showed $740 by morning. He withdrew $200 successfully, and the platform looked real.

Two months later he had deposited $15,000. The platform showed $42,000. When he tried to withdraw, support told him a 10% IRS withholding tax had to be paid up front. He stopped. He googled the platform name. He found the r/CryptoScams subreddit and recognized himself in every other thread. He posted his own.

The thread is one of dozens. The script underneath them is one. [r/CryptoScams · 153 upvotes as of Apr 2026]

What This Scam Actually Is

Pig-butchering (杀猪盘, shā zhū pán, "kill pig plate") is the name the originating Mainland Chinese organized-crime syndicates gave to the script themselves. The metaphor is industrial: the victim is the pig, weeks of relationship-building are the fattening, the crypto-deposit cycle is the slaughter. The script emerged in southern China between roughly 2016 and 2018, then migrated to Cambodia, Myanmar, and Laos around 2020 when the COVID pandemic emptied the casinos and Belt-and-Road real-estate developments those gangs had been laundering through. Today, most of the workers running the scripts are trafficked. The U.S. Institute of Peace's May 2024 study estimates 150,000+ people from 60+ countries are held in compound-style facilities and forced to run these scripts under duress.

Mechanically, the script has four phases:

  1. Entry. A first-contact channel: Hinge, Bumble, Tinder, an unsolicited "wrong number" SMS, a LinkedIn DM, or a Telegram crypto-group invite. The opening is written for politeness so the target's first instinct is to reciprocate.
  2. Fattening. Two to eight weeks of relationship-building: daily life updates, cooking photos, voice notes (often AI-generated to bypass the "send me a video" test). No money is mentioned. No crypto is mentioned. The pace is patient because the operator is paid per conversion, not per hour, and is running multiple targets in parallel.
  3. Pivot. A casual mention of an "uncle" who works in finance, an "aunt" with hedge-fund signals, a private trading group, or a side-hustle the contact has been doing. A screenshot of someone else's profitable dashboard. An invitation to try a small test deposit on a platform you've never heard of.
  4. Trap. The deposit cycle. The platform shows fake profits. A small early withdrawal "works" to win trust. Subsequent withdrawals require a "tax," then a "liquidity fee," then a "compliance review deposit," each sized against the displayed balance. The withdrawal never actually happens. The deposits do.

The script is effective on intelligent people because the social-engineering work is done at the relationship layer, not the deposit layer. By the time crypto enters the conversation, the operator has already won the trust battle. Most victims write a version of the same opening line on r/Scams: "I work in tech. I knew what phishing was. I thought I was too smart for this."

📖 Glossary — terms used on this page
KYC (Know Your Customer)
Identity-verification requirements real exchanges run on signups. Scam platforms mimic the ritual to feel legitimate.
AML (Anti-Money Laundering)
Real regulation that scam platforms invoke as a fake reason to block your withdrawal until you "verify" with another deposit.
Withdrawal tax
Not a real concept. The IRS does not collect taxes at withdrawal — it collects via 1099 reporting at year-end. Anyone telling you a platform must withhold tax to release your funds is running the trap phase.
Mixer
On-chain service that splits and rebundles cryptocurrency to obscure its origin. Pig-butchering operators bridge funds through mixers within hours of receipt; this is why recovery is essentially impossible.
Off-ramp
The point at which crypto is converted back to fiat currency, typically via an exchange in a jurisdiction with no U.S. cooperation.
IC3 (Internet Crime Complaint Center)
The FBI's online fraud-reporting portal at ic3.gov. The single most useful place to file a pig-butchering report — the FBI uses IC3 filings to coordinate wire-reversal attempts and to build cases for OFAC sanctions.
OFAC
U.S. Treasury Office of Foreign Assets Control. Issues sanctions against individuals and organizations involved in pig-butchering operations (most recently the Cambodian Prince Group, October 2025).
Recovery scam
A second-stage fraud targeting people who have already lost money. Recovery scammers DM victims of public posts offering to "trace" or "recover" funds for an upfront fee. There is no legitimate recovery business that operates by cold-DMing strangers.

The script is one. What follows is the seven masks it wears.

The 7 Variants

Variant #1
Hinge / Bumble → WhatsApp → "Uncle's Trading Signals"
⚠️ High
📞 Channel: Hinge / Bumble / Tinder match → WhatsApp pivot → fake crypto exchange. Documented platforms include Wealth Fims, ETRDStocks (and dozens of disposable .com domains that rotate every 60–90 days)

A conventionally attractive match on Hinge wants to move to WhatsApp by message three. Conversation stays normal for 2–6 weeks; then her "uncle" who works in finance starts sharing trading "signals." A small test deposit shows fake profits. The full deposit cycle ends at $15K–$500K with no money returned.

A 28-year-old in tech matches with "Linda" on Hinge: Stanford grad, lives in LA, currently traveling. Within three messages she suggests they move to WhatsApp because "I don't check Hinge much." For five weeks they exchange daily life updates and cooking photos. Then she casually mentions her uncle who works at a hedge fund and runs a private "signals group." She made $3,000 last month, she says, and is happy to share entries. She sends a screenshot of her exchange dashboard. He puts in $500 as a test. The platform shows $740 by morning. He withdraws $200 successfully and the platform looks real.

Over the next two months he deposits $15,000 in tranches. The platform shows $42,000. When he tries to withdraw the full balance, the support chat tells him he must pay a 10% "withdrawal tax" to the IRS first: a $4,200 deposit, refundable on completion. He pays it. Then it's a 20% "liquidity verification fee." He pays that. Then his "account is flagged for compliance review" and requires another deposit to unlock. At $32,000 in total he stops, googles the platform name, and finds the r/CryptoScams thread describing his exact scenario.

The r/CryptoScams thread "Just realized I'm in a 'Pig Butchering' scam. $15k gone" (153 upvotes as of Apr 2026) describes the script almost verbatim: Hinge match, WhatsApp pivot, "uncle's signals," small successful withdrawal, escalating deposits, withdrawal-tax wall. The top reply: "The second I saw side hustle crypto trading, first flag." A separate r/Scams thread, "[US] I think I nearly got pig butchered" (469 upvotes), captures the same arc with a near-miss ending. The single decision rule that breaks the funnel: no one you have not met in person should ever be giving you crypto trading advice. Linda is not Linda. She is a workforce in a guarded compound.

Red Flags

  • Match pushes to WhatsApp, Telegram, or Signal within the first three messages — the dating app's moderation is the primary thing they're escaping
  • Profile photos are conventionally attractive and slightly model-quality; reverse image search returns no hits but the photos "feel" too polished
  • Person claims to live nearby but is "currently traveling for work" — perpetually unavailable to meet in person or to do a live video call
  • An "uncle," "aunt," or "trading mentor" is mentioned with specific finance credentials (Goldman, hedge fund, "ex-Wall Street") that are unverifiable on LinkedIn
  • You're shown a screenshot of someone else's profitable trades before any pitch — social proof that you can't independently verify
  • The recommended exchange is one you've never heard of with a plausible-sounding name (Wealth Fims and ETRDStocks are two documented examples; new disposable domains rotate every 60–90 days)
  • A small initial test withdrawal succeeds — designed specifically to win your trust before the bigger asks

How to Avoid

  • Make a hard rule: dating-app matches who push to WhatsApp before meeting in person are scams — exit the conversation without explanation.
  • Do not take crypto-trading advice from anyone you have not shared a meal with in physical reality. There are no exceptions.
  • Check any investment platform you're shown against the SEC's Investor Alerts and the CFTC RED list — registered legitimate exchanges are a short, public list (Coinbase, Kraken, Gemini, Binance.US, a handful more).
  • If you've put any money in: attempt a withdrawal of 10–15% of your balance immediately. If you hit a "tax," "fee," or "verification deposit" requirement to withdraw your own money, you are inside a pig-butchering platform — stop depositing now.
  • Tell one trusted person in your real life about any new investment opportunity before you fund it. Pig-butchering operators isolate victims from skeptics — naming the opportunity to a friend breaks that isolation.

The dating-app pivot is the most-documented entry, but it is no longer the most common. The dominant 2025–2026 entry vector arrives in your text messages.

Variant #2
"Wrong Number" Text → Slow-Build Crypto Pitch
⚠️ High
📞 Channel: Unsolicited SMS or iMessage from an unknown number, often a "+1" U.S. area code spoofed via VoIP — the contact persists after the polite "wrong number" correction

A text arrives from an unknown number: "Hi Sarah, still on for dinner Thursday?" You reply that they have the wrong number. They apologize warmly, compliment your reply, and start a conversation. Six weeks later they introduce you to a crypto trading group. The arc is identical to the dating-app variant — the entry channel is the only difference.

The "wrong number" opening is now the dominant pig-butchering entry point in 2025–2026 because the dating apps have started flagging the WhatsApp pivot. The text ("Hi Sarah, still on for dinner Thursday?" or "Dr. Chen, confirming our 2 p.m. appointment") is sent in batches to phone numbers harvested from data-breach lists, real-estate transactions, and political-donor records. The script is built around the moment of correction: when you reply "wrong number, sorry," the scammer seizes the polite tone to start a real conversation. They pivot to "what a nice response, you seem cool, want to chat?"

Over four to eight weeks the relationship deepens: daily check-ins, photos, life updates, sometimes voice messages (often AI-generated to bypass the "send me a video" test). The scammer is patient because the operation runs at scale. USIP and other investigators describe compound operators running multiple parallel targets, paid by conversion rather than by hour. The crypto pivot is the same as the dating-app variant: an "uncle" or "trading mentor" with signals, a small test deposit on a fabricated exchange, mounting profits, and a withdrawal-tax wall.

Carriers' SMS spam filters miss the wrong-number text because the message is short, polite, and contains no obvious scam keywords. r/Scams threads show the same wrong-number text arriving simultaneously to dozens of users from different spoofed numbers; the giveaway is that the "Sarah" or "Dr. Chen" name in the text is generic enough to be a mass mailer. If a wrong-number text from an unknown sender keeps replying after your correction, it is not a misdial. It is the opening of a pig-butchering script. Block the number and delete the thread.

Red Flags

  • Unsolicited SMS or iMessage from an unknown number with a slightly off opening ("Hi Sarah?" "Dr. Chen, confirming...")
  • The texter continues replying warmly after you say "wrong number" — a real misdial apologizes and ends the conversation
  • Conversation arcs from "let's just chat" to "let me show you something I'm doing" within 2–8 weeks
  • The texter is always available to chat but never available for a video call or in-person meeting
  • Voice messages have a slightly synthetic quality — AI voice clones are now standard tooling for compound operators

How to Avoid

  • Treat unsolicited "wrong number" texts as spam — do not reply, do not engage, block the number.
  • If you've already replied, stop responding the moment they continue past your correction. There is no legitimate reason an unknown sender would keep replying after a polite "wrong number."
  • If a long-running text relationship from an unknown number eventually mentions investing, trading, or a "side-hustle group," exit immediately — the entire arc was the setup.
  • Insist on a live video call before any financial conversation. Refusal is diagnostic.
  • Forward suspicious texts to 7726 (SPAM on most U.S. carriers) — this feeds the carrier-level filter.

The wrong-number variant works because the target is unsuspecting. The next variant works because the target thinks they are too professional to be scammed.

Variant #3
LinkedIn DM → "Mentor / Side-Hustle Group" Trading Class
⚠️ High
📞 Channel: LinkedIn InMail or DM, typically from a polished profile claiming a senior finance/exec role at a recognizable firm; pivot to WhatsApp, Telegram, or a dedicated "Discord trading class"

A LinkedIn message from a "Senior VP at JPMorgan" or "Portfolio Manager at Bridgewater" invites you to a private trading group, mentor circle, or "Web3 alpha" Discord. The vetting is fake; the curriculum is fake; the "live trading session" is a screen-share of a fabricated dashboard. The end-game is the same fake-exchange deposit cycle.

The LinkedIn variant has accelerated since 2024 because professional contexts disable the "this looks too good to be true" filter that dating-app users have learned to apply. The DM typically reads: "Hi [your first name], I'm building a small private group of operators interested in algorithmic trading. Looked at your profile and thought you'd be a fit. Drop me a WhatsApp if you'd like to learn more." The sender's profile shows 500+ connections, a polished headshot, a recognizable employer, and a carefully assembled work history. Most details are fabricated; the ones that are real are scraped from the actual person being impersonated.

Once you join the WhatsApp or Telegram group, the production value escalates. There are 30–80 other "members": some are bots, some are co-conspirators, a few may be other victims who don't yet know they're being farmed. The "mentor" runs daily "trading sessions" with screen-shared dashboards showing 8–15% daily gains. New members are encouraged to start with a "test trade" on the recommended platform (always one you haven't heard of). Within four to six weeks, the same withdrawal-tax wall appears.

The r/jobs and r/recruitinghell archives in 2025 show LinkedIn variants targeting recently laid-off tech workers, a particularly cruel pattern that exploits financial anxiety. A common giveaway: real recruiters at JPMorgan, Goldman, or Bridgewater never message strangers about private trading groups; they recruit via formal hiring processes, and they would lose their licenses for soliciting investment outside that. The "Discord trading class" variant is a 2026 evolution that adds a paid "membership tier" before the platform pitch (a $200 entry fee that doubles as identity-verification of a willing victim). Any LinkedIn DM that ends with "drop me a WhatsApp" is the opening of a pig-butchering script. Block, report, and never engage off-platform.

Red Flags

  • Unsolicited LinkedIn InMail or DM that pivots to WhatsApp, Telegram, or Discord within the first exchange
  • Sender's title is senior at a recognizable firm but their profile activity is unusually thin (no posts, no comments, only connections)
  • The "private group" or "mentor circle" requires a small entry fee ($100–$500) — a filter for willing victims, not a real cost
  • Daily "trading sessions" show extraordinary returns (5–15% per day) on a platform you've never heard of
  • Other "members" of the group are unfailingly enthusiastic and profitable — no losses, no skeptics, no bad days

How to Avoid

  • Do not move LinkedIn conversations off-platform until you have verified the sender's identity through a second channel — a video call on a different account, a mutual connection's confirmation, or the firm's HR.
  • Real finance professionals at JPMorgan, Goldman, or Bridgewater do not cold-pitch strangers on private trading groups; it would violate licensed-fiduciary obligations and internal compliance policy. Any "VP at [name-brand firm]" doing this is impersonating a real person.
  • Reverse-image-search the sender's profile photo. Many use AI-generated headshots that show up nowhere else online — that absence is itself the signal.
  • If you've joined the group, do not deposit a single dollar on the recommended platform. The "live trading sessions" are scripted demos; the dashboards are fabricated.
  • Report the LinkedIn profile via the three-dot menu → "Report this profile" → "Pretending to be someone else / Scam" — LinkedIn's trust team is responsive to these reports.

All three entry variants converge on the same trap. Whether you arrived via Hinge, an SMS misfire, or a LinkedIn pitch — the deposit cycle ends in the same place.

Variant #4
The Withdrawal-Tax Trap
⚠️ High
📞 Channel: Inside any pig-butchering platform — the moment of withdrawal request triggers the second-stage extraction script

You see $42,000 on the dashboard and try to withdraw it. The "support" chat tells you the IRS requires a 10–20% withholding tax paid up front, refundable on transfer. You pay; then it's a "liquidity fee," then a "compliance review deposit." Each escalation is sized to the apparent balance. The withdrawal never happens — but the additional deposits do.

The withdrawal-tax trap is the single most lucrative phase of the pig-butchering economy because it activates after the victim has already crossed every other psychological barrier. The platform shows substantial profits (typically 2x to 5x the deposited amount), and the request to withdraw triggers the second-stage script. The first ask is almost always framed as a tax obligation: "Per IRS regulations, capital gains tax of 10% is collected at withdrawal. Once received, your full balance plus the tax payment will be transferred." The number is large enough to hurt but small relative to the apparent gains.

If the victim pays the tax, the script escalates: a "liquidity verification fee" (the platform claims your balance must be matched 1:1 in their reserves before transfer); a "compliance review deposit" (because your withdrawal exceeded a threshold); an "anti-money-laundering certification fee" (a real concept twisted into a fraud lever); a "wallet activation fee" if they're moving to crypto rails. Each escalation is sized at 10–25% of the displayed balance. The Reddit r/CryptoScams threads document victims who paid four to seven escalating fees, each time told they were one payment away from receiving their funds. A retired federal employee who lost $400,000 to a platform called Wealth Fims (later rebranded as ETRDStocks) documented the entire ladder of fees in a 168-upvote post.

The hardest fact to communicate: the moment a withdrawal is denied for any reason on a platform of this kind, every dollar previously deposited is already gone. The dashboard is a screen. It shows whatever the operators want it to show. There is no balance to release. Real exchanges do not collect taxes for the IRS; the IRS collects its own taxes via 1099 reporting at year-end. Real exchanges do not require deposit fees to enable withdrawals. The single sentence to remember: any platform that requires you to deposit additional funds to withdraw your own money is a scam, in any jurisdiction. Stop depositing now.

Red Flags

  • You are told that withdrawing your own money requires a "tax," "fee," "deposit," or "verification payment" up front
  • The "support" chat is responsive within seconds, even at unusual hours — a hallmark of a 24/7 compound operation
  • The ask escalates: a tax, then a liquidity fee, then a compliance review, each presented as the "final" step
  • The platform sends "official-looking" documents (PDFs with logos, fabricated IRS letterhead) to validate the demand
  • You are told that not paying will "freeze" or "forfeit" your balance — designed to weaponize sunk-cost feelings

How to Avoid

  • Stop depositing. Every additional dollar is gone the moment it's sent — there is no scenario in which paying the next fee unlocks the balance.
  • Take screenshots of the platform balance, every transaction record, every chat message, and every wallet address — you will need these for IC3 and bank claims.
  • Report to ic3.gov within 24–48 hours of the most recent transfer — the FBI has a narrow window to attempt wire reversal at the originating bank.
  • Visit the bank in person if your account is shared with a spouse — block further outgoing wires before the next escalation.
  • Block the contact who introduced you to the platform — they will pivot to "I'll lend you money to pay the fee" or "let me help you recover," both of which are the next-stage scripts.
"Never pay money to get money. Your husband is being fattened up for the (financial) kill and you will lose everything. Probably end up in debt too." r/Scams top reply, Nov 2025 (277 upvotes)

The withdrawal-tax wall is the dominant trap mechanism, but it is not the only one. A second variant strips wallets in a single transaction — no fattening, no fees, no escalation.

Variant #5
Telegram "Liquidity Provider" / Yield-Farming Variant
🔶 Medium
📞 Channel: Telegram or Discord groups, often referred from a Twitter/X "alpha" account; "DeFi" yield-farming or liquidity-mining platforms with 30–200% APYs

A Twitter "alpha" account or Telegram channel touts a new "DeFi liquidity-mining" opportunity with 50–200% APY. You connect your wallet to a clean-looking dApp; the moment you sign the approval transaction, the contract drains every approved token. The losses are total and instant — no withdrawal-tax phase, just a single malicious smart contract.

The yield-farming variant differs structurally from the romance-pivot variants because it weaponizes the wallet-connection model rather than persuasion. The funnel: a Twitter or Telegram channel posts a link to a "new DeFi protocol" offering implausibly high yields. The site looks polished, with Tailwind CSS, animated charts, a "TVL" counter, and a "team" page with stock-photo headshots. To "stake" or "provide liquidity" you connect your MetaMask or Phantom wallet and sign a token-approval transaction. The transaction is unlimited approval to a malicious contract. Within seconds, every token in the wallet that the contract is approved to spend is transferred out.

Unlike the deposit-cycle variants, there is no slow build and no withdrawal phase. The moment of approval is the moment of total loss. Victims report waking up to drained wallets after going to sleep with the approval transaction signed the night before; the drain happens when gas conditions are favorable to the attacker. This variant overlaps with classic pig-butchering when the Telegram referral itself originated from a Hinge or LinkedIn pivot, since the operators run both funnels in parallel.

The variant is "medium" rather than "high" only because the population at risk is narrower; most people who would never connect a hardware wallet to a random dApp are protected by ignorance rather than discipline. But for crypto-fluent users, the risk is severe and the recovery is zero: a draining contract on Ethereum, Solana, or Base is permissionless and untraceable to a recoverable identity. Never sign a token-approval transaction on a dApp you discovered through a Telegram or Discord referral. Use only protocols you've verified through Coinbase, DeBank, or DeFiLlama, and revoke unused approvals at revoke.cash monthly.

Red Flags

  • Telegram, Discord, or Twitter "alpha" account promoting a "new protocol" with 30–200% APYs
  • The dApp asks for an unlimited token-approval transaction rather than a specific-amount approval
  • The "team" page uses stock-photo headshots; the "audit" link goes to a screenshot rather than a verifiable Certik / Hacken page
  • The contract is unverified on Etherscan / Solscan, or verified but uses obfuscated function names
  • Time-pressure language: "first 100 LPs," "limited yield window," "ends in 6h"

How to Avoid

  • Use a hot wallet with a small balance for any new dApp interaction — never connect your main wallet to an unaudited contract.
  • Read every approval prompt before signing — if it says "unlimited," cancel and try again with a specific-amount approval. Most wallets let you edit the amount.
  • Verify a protocol via DeFiLlama or DeBank before staking — if the protocol does not appear in those aggregators, it does not have meaningful real TVL.
  • Run revoke.cash monthly to revoke any token approvals you no longer use; this limits the blast radius of a future malicious contract.
  • If you've been drained: do not try to "recover" — there is nothing to recover. Migrate remaining assets to a fresh wallet, document the contract address for IC3, and treat it as a complete loss.

The deposit cycle wears different masks. The damage runs deepest, however, when the script reaches your kitchen table.

Variant #6
"Spouse Doesn't Know" Secret-Account Variant
🔶 Medium
📞 Channel: Same entry vectors as variants #1–#3, but the scammer specifically encourages secrecy from spouse, family, or financial advisor — turning the relationship into the exfiltration tool

The pig-butchering script includes an isolation phase: the "mentor" or "girlfriend" suggests the trading is a "personal financial journey" your spouse "wouldn't understand" — and to keep it private until the profits are realized. Victims open separate accounts, take secret HELOCs, and drain joint savings without their spouse's knowledge. The financial damage is compounded by the relational damage.

The secrecy hook is the most carefully built phase of the script and the one that produces catastrophic outcomes. After the victim has shown initial profit, the contact suggests that the trading should remain private for now: "your husband would just worry," or "let's surprise her with the gains," or "this is your project." The framing maps to whatever isolation pattern the victim already has: a wife who handles the finances, a husband who doesn't ask, a parent whose adult children are too busy to notice.

The r/BestofRedditorUpdates thread "My spouse got caught in a pig slaughtering scam and now our life's savings are gone" (4,971 upvotes as of Apr 2026) is the canonical case: an academic spouse who took a HELOC against the family home, drained joint retirement, opened individual brokerage accounts, and cumulatively wired more than a million dollars to a fake exchange over eight months — entirely without the other spouse's knowledge. The thread captures the discovery moment, the legal aftermath, the bankruptcy filing, and the marriage's near-collapse. A second thread, "San Francisco retiree loses $500K life savings to pig butcher scam despite warnings from family" (423 upvotes), shows the elderly variant: an adult son who "alerted 3 police agencies including the FBI" was unable to stop his father once the secrecy hook was set.

The defense is structural rather than tactical: both spouses must have visibility into all financial accounts, and any "private investing" framing should itself be the red flag. The r/financialindependence thread "What's your plan to avoid pig butchering?" (333 upvotes) surfaces the consensus rule: "It's important for both spouses to be aware of the finances. This can happen when one spouse sits by and lets the other one make all the financial decisions." For elderly relatives, contact your state's Adult Protective Services the moment you suspect a pig-butchering script is active — they have legal authority to intervene that family members do not. The single sentence: any "investment opportunity" that requires you to keep it secret from your spouse, financial advisor, or banker is a scam. Real investments do not need to be hidden.

Red Flags

  • Your contact specifically encourages secrecy from your spouse, parent, or financial advisor — "let's surprise them" or "they wouldn't understand"
  • You find yourself opening individual accounts, taking out a HELOC, or moving funds out of joint visibility
  • Your bank or financial advisor asks unusual questions about a wire transfer and you find yourself rehearsing a cover story
  • You feel a strong impulse to defend the contact when family members express concern — the script weaponizes loyalty
  • You are reluctant to attempt a meaningful withdrawal because "you don't want to spook the algorithm" — that reluctance is the trap

How to Avoid

  • Establish a household rule: any new investment over $5,000 is discussed with your spouse and your financial advisor before funding. No exceptions, no surprises.
  • If a contact tells you to keep an investment secret, that secrecy instruction is itself the diagnostic — exit the conversation immediately.
  • For elderly parents: set up bank alerts on their accounts (most banks allow a designated viewer with no transaction authority) and quietly check monthly for unusual outflows.
  • If a parent or spouse is already in a script and refuses to listen: contact Adult Protective Services in your state, the bank's fraud department, and consider a temporary financial-power-of-attorney petition. Family pleading rarely works once the script is engaged; institutional intervention sometimes does.
  • If you've been pulled in: tell someone today. The shame is not yours; the script is designed to produce exactly the secrecy that makes recovery impossible. The faster you break the silence, the faster the deposits stop.

By the time most victims publicly post their loss, the operators have already moved on. But a second wave of fraudsters is just arriving — a meta-scam that targets people whose defenses are now zero.

Variant #7
Recovery-Scam Follow-On (DMs after a public victim post)
⚠️ High
📞 Channel: Reddit DMs, Twitter/X DMs, or email after you post about being scammed; YouTube comments under "I lost X to crypto" videos; victim-support Facebook groups

Within hours of posting "I lost $X to a crypto scam," you receive a flood of DMs from "professional fund-recovery specialists," "blockchain forensic experts," and "ethical hackers" who claim they can trace and reverse the transactions for a small upfront fee. Every one of them is a follow-on scammer farming people who have already proven they will pay.

The recovery-scam ecosystem is a parasite on the pig-butchering ecosystem. The moment a victim posts publicly about a loss (on r/Scams, r/CryptoScams, r/personalfinance, Twitter, or a victim-support Facebook group), they receive a deluge of unsolicited messages from accounts claiming to specialize in fund recovery. The pitch is written for someone in a state of financial grief: "I am a former [FBI / SEC / Chainalysis] investigator," "I have proprietary blockchain-tracing software," "I have a 92% recovery rate," "the consultation is free."

The actual sequence is a small upfront "investigation fee" ($200–$2,000), then a larger "court filing fee" or "exchange unlock fee" ($5,000–$20,000), then a final "tax payment to release the recovered funds." It is the same withdrawal-tax script weaponized against people whose defenses are now zero. The r/Scams moderators auto-post a sticky comment on every new submission warning about this exact pattern; the comment in the corpus reads: "you will start getting private messages from scammers saying they know a professional hacker or a recovery expert lawyer that can help you get your money back, for a small fee. We call these RECOVERY SCAMMERS, so NEVER take advice in private."

The hard truth, repeated by the FBI, the FTC, and every legitimate consumer advocate: funds sent to pig-butchering platforms are bridged through mixers within hours. Six-figure recoveries do happen occasionally — but only through bank wire reversal in the first 24–48 hours, never through a stranger who DMed you on Reddit. There is no "blockchain forensic expert" who can claw back funds from a Cambodian compound for a $1,500 retainer. Anyone who DMs you offering recovery services is a scammer. Block them all without exception. The only legitimate recovery path is IC3 + your bank's fraud department, both pursued without paying anyone a fee.

Red Flags

  • Unsolicited DM, email, or comment offering "fund recovery," "blockchain tracing," or "ethical hacking" services after a public post about a loss
  • Claims of being a former FBI / SEC / IRS / Chainalysis / "ethical hacker" professional with no verifiable employment history
  • "Free consultation" followed by an upfront fee for "investigation," "court filing," or "exchange unlock"
  • Telegram or WhatsApp pivot — recovery scammers do their work off Reddit because the platform deletes their accounts
  • Pressure to act quickly because "the funds are still traceable" or "the exchange will lock the wallet in 48 hours"

How to Avoid

  • Block every unsolicited recovery DM without engaging — there is no legitimate recovery business that operates by cold-DMing victims.
  • Report each one to the platform (Reddit's "Report" → "Spam" → "Recovery scam" works) — the trust teams act on these.
  • Pursue only the legitimate paths: ic3.gov, FTC reportfraud.ftc.gov, your state attorney general, and your bank's fraud department. None of these charge a fee.
  • Do not pay a single dollar to anyone claiming they can "recover" your funds. Every "small upfront fee" is the entire scam.
  • If you want professional help, hire a licensed attorney via your state bar's referral service — and verify that the attorney's bar membership is current at your state bar's website before you transfer any retainer.
"Your inbox is now filled with new scammers trying to help you 'recover' your funds. Please be aware they are all Fake and will take you again. You are an easy target to them as you have already been scammed. DO NOT PAY ANYONE TO HELP YOU RECOVER YOUR FUNDS — they are gone." r/CryptoScams top reply, June 2025 (55 upvotes)

The Numbers (and Where They Come From)

The headline figures on this page are drawn from federal agency reports and one independent NGO study. Where a stat is an estimate rather than an agency-reported figure, the source card is shaded differently.

$5.8B
U.S. losses to crypto-investment fraud in 2024 — the category that includes pig-butchering. Up from $3.96B in 2023 (a 46% YoY increase).
Source: FBI IC3 2024 Annual Report · ✓ verified
$9.3B
Total U.S. losses involving cryptocurrency across all fraud categories in 2024 — a 66% YoY increase. Crypto is now the dominant payment rail for organized fraud.
Source: FBI IC3 2024 Annual Report (PDF) · ✓ verified
~150,000
People estimated to be working in scam compounds in Cambodia, Myanmar, and Laos. Most are trafficked from 60+ countries and held in prison-like conditions.
Source: U.S. Institute of Peace, May 2024 · ⚠ NGO estimate
$3.5B+
Estimated annual losses to U.S. victims from Southeast Asian compound scams alone (a subset of, and overlapping with, the FBI IC3 figure above). Globally: ~$64B/yr.
Source: USIP Senior Study Group Report (PDF) · ⚠ NGO estimate

Two more numbers are worth knowing. The DOJ's Scam Center Strike Force, formed in 2025, has so far seized $112M in cryptocurrency tied to compound operations. The FBI's Operation Level Up — which proactively contacts victims it has identified mid-script — notified more than 4,300 victims and prevented an estimated $285M in further losses in its first year. Both efforts are recent. Neither makes recovery probable for any individual victim. Both make reporting at ic3.gov meaningfully more useful than it was in 2022.

📌 Where the script runs from, and why it matters

The script does not come from a single individual sending you messages from a laptop in Manila. It comes from a compound. The U.S. Institute of Peace's 2024 study identifies three primary host regions: Cambodia (Sihanoukville, Bavet, Poipet), Myanmar (Myawaddy, Shwe Kokko, KK Park along the Thai border), and Laos (the Bokeo Special Economic Zone). Most compounds are repurposed casinos and Belt-and-Road real-estate developments emptied by the COVID pandemic and fortified for online scamming. They are operated by Chinese organized crime networks and protected by local political elites.

The workforce inside these compounds is overwhelmingly trafficked. Workers are recruited through fraudulent job ads on Facebook and Telegram (Mandarin teacher, customer-service rep, IT support), flown to Bangkok, then driven across borders into the compounds. Their passports are confiscated; quotas are enforced with violence. The U.S. State Department's 2024 Trafficking in Persons Report and Interpol's Operation Storm Makers II have documented tens of thousands of rescues, with tens of thousands more workers still inside.

This matters for two reasons. First: the person on the other end of your WhatsApp is, in many cases, also a victim of a different crime. Anger at "the scammer" is misdirected; the operator is themselves under duress. Second: this is why recovery is essentially impossible. The funds are not sitting in some scammer's personal wallet. They have been laundered through compound infrastructure into accounts held by the syndicates, often within hours of leaving your bank. In October 2025, OFAC designated the Cambodian Prince Group as a transnational criminal organization, sanctioning 146 associated persons and seizing roughly $15B in cryptocurrency, the largest single action of its kind to date.

Recovery Reality (and the Banking Sector's Response)

For most pig-butchering victims, the realistic recovery rate is zero. The reasons are structural: funds sent via wire to a U.S. or international bank account controlled by the operators are typically converted to crypto within hours, bridged through mixing services, and off-ramped in jurisdictions with no U.S. cooperation. By the time a victim recognizes the scam — often weeks or months after the first deposit — the trail has gone cold.

The narrow window in which recovery is possible is the first 24–48 hours after a wire is sent. If the wire has not yet cleared at the receiving bank, your originating bank can sometimes recall it. This is why the single most useful thing a victim can do, after stopping further deposits, is to visit the originating bank in person and ask specifically for the fraud department. The fraud team has internal authority to attempt a recall that the general customer-service line does not have.

Major U.S. banks have begun deploying pig-butchering-specific protocols since 2024 — flagging wires that match certain patterns such as large unprecedented transfers from older account holders to new beneficiaries, transfers to accounts at smaller correspondent banks in high-fraud jurisdictions, or rapid sequences of transfers to crypto exchanges. When you call the fraud line, ask: "Does your fraud team have a pig-butchering or crypto-investment-fraud hold protocol I can request?" Naming the typology often opens a different escalation path than a generic fraud claim.

Beyond the bank, the legitimate recovery channels are the FBI's IC3 portal, the FTC's reportfraud.ftc.gov, and your state attorney general's consumer-protection unit. None charge a fee. None will guarantee recovery. All of them feed federal enforcement priorities and may, in time, contribute to seizures like the DOJ's $112M Scam Center Strike Force action: money that occasionally gets returned to victims through restitution proceedings months or years later.

How to Help Someone in the Script

The hardest pig-butchering scenario is not your own. It's a parent, a spouse, or an older sibling who is currently in the middle of a script and refuses to listen. The r/Scams threads from family members converge on a small set of tactics that occasionally work where pleading does not.

  1. Don't lecture. The script has already isolated them from skeptics. Direct argument confirms the contact's framing that "your family doesn't understand." Lead with curiosity instead: "I want to understand how this works. Can you walk me through what they showed you?"
  2. Ask them to attempt a $5,000–$10,000 withdrawal. The friction reveals the fraud faster than any external argument. Either the withdrawal is denied (and the scam exposes itself) or it succeeds (in which case the trust is real and you've lost nothing). The r/Scams thread "My mother is in the middle of a pig butchering scam" documents this tactic working.
  3. Route through trusted third parties. Ask: "Would you be willing to talk to your bank's fraud department, your accountant, or the financial advisor we used in 2019, before you put any more in?" The third party doesn't have to "win" the argument; they just need to be the second voice that breaks the operator's monopoly on framing.
  4. Visit the bank in person. If you share an account, you can request a wire-transfer freeze in person. If you don't share the account but you're a co-signer or have power of attorney, the bank can place outflow holds. Many bank fraud teams will quietly do this for elderly customers even at a family member's request.
  5. For elderly relatives, escalate to Adult Protective Services. Every U.S. state has an APS office with legal authority to intervene in suspected elder financial exploitation. They can do things family members cannot, including, in extreme cases, petitioning for emergency conservatorship. Find your state's office at napsa-now.org.

Two warnings. First, do not engage the contact yourself; it provides them information and may accelerate the script. Second, do not invest your own time and money trying to "recover" funds for the victim through informal channels; you will become the next victim of recovery scammers who scrape these conversations for new targets. Stick to IC3, the bank, APS, and licensed professionals.

🆘 What to Do If You've Been Pig-Butchered

📋 Report to IC3 within 24–48h

File at ic3.gov — the FBI's Internet Crime Complaint Center. Include every transaction date, amount, wallet address, and platform domain. The first 24–48 hours are the only window in which a wire reversal is realistically possible.

🏦 Call Your Bank's Fraud Line

Most U.S. banks have a 24/7 fraud line on the back of your debit card. Tell them: "I am the victim of a pig-butchering investment fraud and need to attempt a wire recall on transfers from [date] to [date]." Visit a branch in person if the wires were large.

🛡 File with FTC + State AG

FTC: reportfraud.ftc.gov. State AG: search "[your state] attorney general consumer protection." Both feed federal enforcement priorities and may activate state-level victim-restitution funds in some jurisdictions.

🚫 Block All Recovery DMs

Within hours of a public victim post, you will receive 5–50 DMs offering to "recover" your funds. Every one is a follow-on scam. Block them, report to the platform, and do not pay anyone a fee — the only legitimate recovery paths (IC3 + your bank) are free.

👵 Suspect Elderly Targeting?

Contact Adult Protective Services in your state. They have legal authority to intervene in elder-financial-abuse cases that family members do not. Also notify the bank — most have specialized elder-fraud teams who can place holds.

💬 Share Your Story

Post on r/Scams or r/CryptoScams (with your loss documented). The shame is manufactured by the script; public posts are how the next victim recognizes their own situation in time. Many of the variants on this page were named in posts exactly like the one you would write today.

If You're Reporting Outside the United States

The pig-butchering compounds target English-speakers across the entire Anglosphere; reporting paths exist in every major jurisdiction. The principles are identical to the U.S. flow above (report fast, contact your bank's fraud line, never pay a recovery fee), but the agencies differ.

Frequently Asked Questions

Pig-butchering is a long-con investment fraud where the scammer cultivates a personal relationship over weeks before pivoting to a fake cryptocurrency trading platform. Victims see fabricated profits, are encouraged to deposit more, then hit a wall of "taxes," "liquidity fees," or "verification deposits" when they try to withdraw. The FBI's 2024 IC3 report attributed $5.8B in U.S. losses to crypto-investment fraud, the majority of it pig-butchering. Most operators run from compounds in Cambodia, Myanmar, and Laos staffed by trafficked workers.
The script (杀猪盘, "shā zhū pán" — "kill pig plate") originated with Mainland Chinese organized crime around 2016 and migrated to Southeast Asian compounds in 2020 when the COVID pandemic emptied Cambodian casinos and Myanmar special economic zones. The U.S. Institute of Peace (May 2024) estimates 150,000+ workers — most trafficked from 60+ countries — staff these compounds today, generating roughly $64B/year globally and $3.5B+ from Americans.
Three openings dominate the 2025–2026 r/Scams archives: (1) a match on Hinge, Bumble, or Tinder who pushes to WhatsApp within two messages, (2) a "wrong number" SMS ("Hi Sarah, are we still on for dinner?") that the sender keeps replying to after your polite correction, and (3) a LinkedIn DM about a "trading mentor" or "side-hustle group." Crypto is never mentioned in week one — it's introduced 2–6 weeks in, often through an "uncle" or "trading guru" who shares signals.
In the overwhelming majority of cases, no. Funds sent to the scam exchange are bridged through multiple wallets within hours and disappear into mixing services or off-ramps in jurisdictions with no U.S. cooperation. The FBI's IC3 has occasionally clawed back funds when victims report within 24–48 hours and the wires can be reversed at the U.S. bank, but six-figure recoveries are rare. The DOJ's Scam Center Strike Force seized $112M in November 2025; FBI Operation Level Up has prevented an estimated $285M in losses by warning victims mid-script.
Report to (1) the FBI's Internet Crime Complaint Center at ic3.gov within 24–48 hours — they coordinate with banks on wire reversal, (2) the FTC at reportfraud.ftc.gov, (3) your state attorney general's consumer protection unit, (4) the bank that initiated the wire (every business day matters for recall attempts), and (5) the dating app or platform where the contact began. Save every screenshot, transaction ID, and wallet address before you delete anything.
The r/Scams playbook from victims' family members is consistent: (1) do not lecture — the script already isolates them from skeptics, (2) ask them to attempt a withdrawal of $5,000–$10,000 from the platform; the friction reveals the fraud faster than any argument, (3) ask whether they would talk to their bank's fraud department, a financial advisor, or a third party they already trust, (4) freeze further wires by visiting the bank in person if you share an account, (5) for elderly relatives, contact Adult Protective Services in your state — they have legal authority to intervene that family members do not.
A traditional romance scam ends with the scammer asking for money directly ("I need $3,000 for a flight to come see you"). Pig-butchering never asks the victim for money — it invites them to make money on a shared investment platform. The deposit is voluntary, the dashboard shows profit, and the relationship is the bait, not the ask. That's why pig-butchering produces six- and seven-figure losses where romance scams typically produce four-figure ones.
The U.S. Institute of Peace identifies three primary host countries for the compounds: Cambodia (Sihanoukville, Bavet, Poipet), Myanmar (Myawaddy, Shwe Kokko, KK Park along the Thai border), and Laos (the Bokeo Special Economic Zone). Operations are typically run by Chinese organized crime networks. Workers are trafficked from 60+ countries. OFAC sanctioned the Cambodian Prince Group as a transnational criminal organization in October 2025, designating 146 associated persons and seizing roughly $15B in cryptocurrency.
No. The platforms are entirely fabricated — the dashboard, the balance, the chart, the support chat, the withdrawal screen are all a custom front-end the operators control. The small early withdrawal that "works" pays out from the operators' own pool to win trust. The hundreds of platforms documented in r/CryptoScams (Wealth Fims, ETRDStocks, BitForex-clones, etc.) follow the same template; each domain typically goes offline within 60–90 days and reappears under a new name.

📚 Source Threads (Reddit, 2024–2026)

The canonical case

"My spouse got caught in a pig slaughtering scam and now our life's savings are gone" — r/BestofRedditorUpdates, 4,971 upvotes (as of Apr 2026). The full arc: secrecy phase, seven-figure loss, HELOC, near-divorce, slow recovery.

The near-miss

"[US] I think I nearly got pig butchered" — r/Scams, 469 upvotes. Hinge → WhatsApp → "uncle's signals" → recognition before the deposit phase.

The mid-loss recognition

"Just realized I'm in a 'Pig Butchering' scam. $15k gone" — r/CryptoScams, 153 upvotes. Tech worker, 2 months in, $15K gone, posted as a warning.

The retiree case

"San Francisco retiree loses $500K life savings to pig butcher scam" — r/bayarea, 423 upvotes. Adult son alerted 3 agencies including FBI; could not stop the script.

Stopping a parent

"My mother is in the middle of a pig butchering scam and refuses to listen" — r/Scams, 277 upvotes. Top reply's "have her withdraw $10K" tactic is the standard intervention.

$400K loss documentation

"Lost $400K in a crypto scam — please learn from my experience (Wealth Fims / ETRDStocks)" — r/CryptoScams, 168 upvotes. Retired federal employee, names two scam-platform domains, documents the recovery-scam follow-on.

Related Reading

Pig-butchering shares operational infrastructure with several other scam types covered on tabiji. Internal: the Everywhere hub indexes all general (non-travel) scams (more pages forthcoming). External authorities: the FBI IC3 2024 Annual Report on crypto-investment fraud; the U.S. Institute of Peace Senior Study Group report on Southeast Asian compounds; the DOJ Scam Center Strike Force announcement; Operation Shamrock, the cross-industry coalition led by Santa Clara County DDA Erin West; and John Oliver's Last Week Tonight episode on pig-butchering (HBO, March 2024) for a 25-minute primer.

📖 Coming Soon

A field-guide to the scams happening everywhere — phone, text, online, in person.

tabiji's tourist-scam atlases cover 17 countries. The next book is different — it covers the scams that don't care where you live: pig-butchering, AI voice-clone calls, real-estate wire fraud, fake job offers, recovery scams, and dozens more. Same research method (FBI / FTC / OFAC sources cross-referenced with thousands of Reddit victim threads). Same $4.99 Kindle price. Same free re-downloads of future editions.

  • 30+ scams documented across phone, text, online, and in-person channels
  • The script, the red flags, and the exit lines that end each conversation
  • Family-intervention scripts for elderly relatives in active scams
  • U.S. and international reporting paths (IC3, FTC, Action Fraud, CAFC, Scamwatch)