- Table of contents
The Rise of Pig Butchering Scams
Background
In recent years, “Pig Butchering” (also referred to as “杀猪盘 shāzhūpán“) scams have rapidly emerged as a significant global threat, primarily targeting individuals with fraudulent investment schemes. This type of scam, originally known for its roots in China, has transformed into a global phenomenon, where victims are led to believe they are making lucrative investments, often in cryptocurrency. The name “pig butchering” comes from scammers “fattening up” their victims by gaining their trust before seizing their funds, leaving the victims with significant losses.
The scam involves criminals engaging with targets through social media, direct messaging apps, and dating apps, sometimes for months, to build a sense of trust and familiarity.
Eventually, the victims are convinced to invest in what appears to be a legitimate venture, only to realize later that their money has been stolen. This scam is now global, with operations frequently run by groups in Southeast Asia.
According to the FBI, cryptocurrency-related scams, including pig butchering scams, accounted for a staggering $5.6 billion in reported losses in 2023, a sharp increase from previous years.
On a global scale, losses attributed to pig butchering and similar schemes were conservatively estimated at around $64 billion annually.
Introduction
To demonstrate the dangers of pig butchering and investment scams, we have focused on analyzing and exploring domains that are known to be associated with these scams based on their website structure. These fraudulent websites often follow a similar template, aimed at deceiving potential victims into thinking they are engaging with a legitimate investment platform.
While most pig butchering scams are associated with Chinese-speaking threat actor groups, our investigation suggests that this specific scam appears to be linked mainly to threat actors originating in Africa, indicating the global expansion and diversification of such operations.
Scam websites typically feature a professional-looking home page promising high returns, a fabricated “About Us” section to establish credibility, and an “Investments” page promoting quick profits, often through cryptocurrency. Additional pages, such as Statistics, Registration, Login, and Cryptocurrency Prices, further enhance the illusion of legitimacy. A key feature across these sites is a chatbot, used to direct victims to messaging platforms like WhatsApp or Telegram for more personal interaction with scammers.
The combination of easily replicated website templates, the use of social engineering through chatbots, and the promise of high investment returns makes this scam highly effective in targeting all kinds of victims worldwide.
Executive Summary
Background
- This report investigates the rise of “Pig Butchering” scams, also known as “杀猪盘 shāzhūpán,” a global fraud phenomenon targeting individuals through fake investment schemes, primarily in cryptocurrency.
- Originating in China, these scams have expanded globally, with scammers using social media, dating apps, and direct messaging platforms to build trust over time before defrauding victims.
- These scams often employ professional-looking websites, using fabricated success stories, high-return promises, and fake documents to create an illusion of legitimacy and lure unsuspecting victims.
- The rise of AI has simplified the creation of convincing fraudulent platforms, enabling more threat actors to join and scale these operations.
Findings
- Our investigation uncovered over 1,000 domains with similar fraudulent templates, pointing to a large-scale scam linked to threat actor groups in Africa.
- Although the threat actors used relatively simple methods to deceive victims, these scams have still resulted in significant financial losses, with estimated annual losses reaching tens or even hundreds of thousands of dollars.
- Our investigation exposed poor security practices across six fraudulent websites, allowing access to sensitive internal files, including “.env” configuration files, database credentials, and logs, linked to the Laravel framework.
- We identified accessible directories containing uploaded images, personal identification documents, and transaction confirmations, which could be exploited for blackmail or sold as personal data.
- The impact spans 27 countries across multiple continents, affecting victims from diverse backgrounds with no specific demographic profile.
- Scammers promote their schemes on social media, especially Facebook, by impersonating “successful” and “attractive” individuals to lure victims into fake investment opportunities.
-
- They use fabricated success stories and motivational posts to create an illusion of financial gain, often including step-by-step instructions to deposit funds.
- Our controlled engagement exposed scammers’ tactics, including impersonating industry figures, using inconsistent cover stories, and displaying limited knowledge of claimed origins.
Origins and Components of Websites
We have identified that the first indications of threat actors using these website templates appeared in March 2022. In total, Cyberint identified over 1,000 domains that used this website template. The earliest YouTube instructional video we discovered was uploaded in September 2022 on a channel named “blex ony.” The video, narrated by a Nigerian individual, provides step-by-step instructions on setting up such a website. The video’s description includes a phone number, +2348088522446, for those interested in purchasing this template. It appears the channel features additional scam website templates for sale, which might indicate the involvement of a larger threat actor group.
Furthermore, we identified another YouTube video offering the script for free, published by a channel named “Codexoo.” Upon accessing the link in the description, we were able to download the template script.
We identified that the scammers are using the Laravel framework based on the presence of certain files. The script folder includes files such as “composer.json” and other default files that are typically generated automatically when creating web applications with Laravel.
Scam Impact
Our investigation actively leveraged poor security practices on six of the fraudulent platforms, enabling us to access internal directories and various sensitive files which are stored on these sites’ backends, including .env configuration files, logs files, and more. These types of files and directories are known to be associated with Laravel framework.
Additionally, we located directories where uploaded images are stored.
These platforms require victims to submit personal identification, such as ID cards, driver’s licenses, or passports, during registration, which can later be used for blackmail or sold as personal data.
We also discovered images related to transaction confirmations, which reveal victims’ attempts to transfer funds to these fraudulent schemes. The total estimated losses for victims impacted by these six platforms amounts to several thousand dollars. However, as Cyberint has identified over 1,000 domains using this specific scam template, victim losses are likely in the tens or even hundreds of thousands of dollars.
The impact of these 6 scam websites is worldwide, affecting a broad range of 27 countries, including: Algeria, Argentina, Brasil, Canada, Colombia, Dubai, Ecuador, Egypt, Iran, Jordan, Mauritania, Mexico, Morocco, Nicaragua, Philippines, Russia, South Africa, Spain, Sudan, Suriname, Tajikistan, Turkey, United Arab Emirates, United Kingdom, United States, Uzbekistan, and Yemen.
Based on the images, the victims come from diverse backgrounds, with no specific gender, age, or other demographic making an “ideal” target.
Scam Promotion
Our investigation has revealed that scam operations are primarily promoted via social media, with Facebook being a key platform. Scammers often impersonate “attractive” and “successful” men and women to lure potential victims into investing in fraudulent forex schemes. This tactic was first used by Chinese threat actors when pig butchering began in 2016, with romance scams being the primary method to lure victims. Scammers built fake relationships to gain trust before introducing fraudulent investments, similar to today’s approach of impersonating attractive, successful individuals on social media.
Examples of Promotional Content
Scammers post about financial success and the ease of investment, often sharing fabricated success stories and providing step-by-step instructions for depositing funds. Some examples include:
- Fabricated Success Stories:
Posts congratulating individuals on large “profits” from fraudulent platforms. to make victims think trading is easy and profitable.
2. Motivational Posts:
Inspirational quotes paired with links to fraudulent sites, appealing to users’ desire for financial success
Engaging With the Scammers
Our proactive controlled engagement revealed several key characteristics of this scam:
-
Impersonation of Industry Figures:
- The scammers exploited the identity of Larry Collin by using his profile picture and name on their Telegram account. The usage of Larry’s identity – a well-known figure in the crypto industry, originated in the Philippines, likely helped lend credibility to their scam.
The original social media profiles of Larry Collin have issued warnings about impersonation and scams.
2. Inconsistent Cover Story
- When further communication took place, the scammers then claimed to be Ramon S. Monzon, the President and CEO of the Philippine Stock Exchange, and not Larry.
- They claimed to be from the Philippines, but when asked if they spoke Tagalog, a popular language of the Philippines, they responded that they understood it but preferred to communicate in English, which made it less likely that they were actually from the Philippines.
3. Promising Exorbitant Returns:
- The threat actors offered victims a ten-time return on their investment, a highly unrealistic and unsustainable promise.
4. Social Engineering Tactics:
- The scammers shared fake screenshots of satisfied customers to build trust and credibility.
- They provided a fraudulent certificate of incorporation to further legitimize their operations.
5. Geographic Red Flags:
- Invoices sent by the threat actors were denominated in Papua New Guinean Kina (PGK), suggesting potential origins in that region.
Conclusions
Pig butchering scams have grown from their origins in China to become a global threat, with some operations led by groups in Africa. Using social media, especially Facebook, scammers impersonate successful individuals to lure victims into fake investment schemes.
Threat actors exploit the general public’s limited knowledge of cryptocurrency, and combined with pig butchering techniques, this makes these types of scams increasingly prevalent and efficient.
Our investigation uncovered over 1,000 domains promoting these scams, relying on low-sophistication tactics to interact with victims. Despite this simplicity, these scams are estimated to cause significant financial losses across 27 countries, impacting diverse demographics with no specific “ideal victim” profile.
With the rise of AI, creating convincing and functional fraudulent platforms has become easier, likely fueling the continued growth of these scams as more types of threat actors get involved, attracted by high success rates.
Recommendations
- Be Skeptical of High-Return Investment Offers: If an investment opportunity promises unusually high returns with little risk, it’s likely a scam. Genuine investments rarely guarantee high returns, especially within short timeframes.
- Verify Platform Legitimacy: Before investing, research the platform thoroughly. Check for verifiable registration details, official business licenses, and reviews from trusted sources. Be cautious of websites that lack transparency or only provide limited contact information.
- Avoid Sharing Personal Information: Scammers often request personal identification information during “registration.” Avoid sharing sensitive data like ID cards, passports, or driver’s licenses, especially on unfamiliar platforms, as these can be used for identity theft or blackmail.
- Be Skeptical of Social Media Profiles Claiming Success: Scammers use social media to impersonate attractive, successful individuals to build a sense of trust and legitimacy.
- Report Suspicious Platforms and Profiles: If you suspect a platform or individual is attempting to scam you, report it to relevant authorities or the social media platform. Reporting helps prevent others from falling victim to similar schemes.
About Cyberint, a Check Point Company
Cyberint, now a Check Point company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Check Point External Risk Management solution provides superior visibility through continuous discovery of the evolving attack surface, combined with the automated collection and analysis of vast quantities of intelligence from across the open, deep and dark web.
A team of global military-grade cybersecurity experts work alongside customers to rapidly detect, investigate, and disrupt relevant threats – before they have the chance to develop into major incidents. Global customers, including Fortune 500 leaders across all major market verticals, rely on Check Point External Risk Management to protect themselves from an array of external risks, including vulnerabilities,
misconfigurations, phishing, impersonation attacks, malware infections, exposed credentials, data leaks, fraud, and 3rd party risks.