Cyber Justice Law Group

How Pig Butchering Works In 8 Stages

The common steps pig-butchering scammers follow to lure victims and extract their assets.

From the Top

Pig butchering works through a combination of social engineering tactics to convince victims they are in a genuine relationship with an online contact before defrauding the individual of their assets. Scammers contact their targets via messaging services, apps, or through "wrong number texts" and invest weeks or months into cultivating trust before luring them onto fake crypto trading platforms.

Victims are told to participate in "exclusive", or "special" investment opportunities, allowed to withdraw small amounts, and finally convinced to deposit larger sums. When the victim attempts to make a large withdrawal, they are blocked from doing so, and oftentimes scammed of even more money as they attempt to "unlock" the funds they've already lost.

The cases we see in our practice on a daily basis follow this exact pattern, almost without exception. To ad in the investigation process and to help our clients understand how they were defrauded, we've broken the scam into eight distinct stages.

Pig Butchering Scam Lifecycle Flowchart

If you see your own experience in any of these steps, treat it as a cue to stop, document everything, and get advice from an attorney or certified investigator before sending another dollar.

Stage 1: The Approach

In our experience, the scam almost always begins with with something that feels mundane and low‑stakes: a wrong‑number text, a random social‑media follow, or a surprisingly polished dating‑app match.

While pig butchering often takes the form of a fake romance, it's common today for scammers to impersonate fellow professionals or crypto experts as well. As a rule of thumb, you should assume that anyone you've never met in real life who is offering outsized returns on crypto investments is a scammer.

Some of the ways you may be contacted by a scammer include:

Wrong‑Number Texts

We've all received a casual wrong number text:

  • “Hi Anna, are we still on for dinner?”
  • “Did you receive the documents I sent yesterday?”
  • “Hello Mr. Chen, this is Lisa from the investment group.”

This seemingly innocuous message is really a text from a pig butchering scam. When you reply "Wrong number," the scammer doesn't just apologize and disappear. Instead, they pivot instantly into friendly small talk, often with an unusual level of warmth for a stranger:

Example of wrong number texts designed to hook new victims.

Wrong number text example

Reddit Discussion

The easiest way to avoid a pig butchering scam is to ignore these texts entirely. Once you begin responding, things can get out of hand very quickly.

“Accidental Message” Scripts

Closely related to wrong‑number texts are “accidental” messages sent via WhatsApp, Telegram, or other encrypted apps:

  • A photo of a meal with “Table is ready”
  • A screenshot of supposed trading profits
  • A voice note clearly intended for someone else

What looks like spontaneity is usually a tested, copy‑and‑paste script used across dozens or hundreds of victims.

Anyone contacting you directly via an encrypted messaging service is immediately suspect. This goes for lawyers or "recovery agents," too.

LinkedIn Professional Lures

Scammers may also masquerade as new professional connections through platforms like Linked-In. Red flag messages include:

  • A random connection request from someone claiming to be a "senior analyst," "wealth manager," or "blockchain consultant."
  • Messages praising your background, then asking to "compare notes" on markets or "share investment insights."

The tone here is collegial and businesslike, not flirtatious.

Scammers lean on fake titles, fabricated company names, and jargon‑heavy messages to position themselves as credible financial insiders. Watch out for profiles with very recent creation dates but hundreds of connections, work histories that don’t match public records or known firms, and stock‑image profile photos or AI‑generated headshots.

Tinder / Bumble Romance Approaches

On dating apps, the approach is carefully engineered to feel like a dream match, not a cold outreach:

  • Profiles often show travel, fitness, luxury dining, and subtle hints of wealth.
  • Bio lines frequently reference “financial freedom,” “crypto trading,” or “helping friends invest wisely.”
  • Early messages escalate quickly into long, emotionally intimate chats.

Instead of pushing for an in‑person meeting right away, scammers often prefer to move you off‑platform—to WhatsApp, Telegram, or SMS—where moderation and reporting tools are weaker.

From there, they gradually steer the conversation toward trading, “side hustles,” and “opportunities” you could pursue together.

How to respond at this stage

Preserve these early interactions.

They often establish:

  • The origin platform (phone carrier, WhatsApp, Telegram, Instagram, Tinder, Bumble, LinkedIn, etc.).
  • The initial phone number, handle, or profile URL that may later be tied to other victims.
  • Early clues that the scammer is following a script rather than behaving like a genuine acquaintance.

Screenshots, profile links and message metadata can later help a cybercrime lawyer or investigator connect your case to a wider scam network.

As you'll see in the next phase—the Hook—the scammer's goal during the Approach is to convert a stranger into a trusting, emotionally invested contact who will be receptive when the "investment opportunity" appears.

Stage 2: The Hook

Once the scammer has your attention, they shift to turning casual contact into real attachment. On the surface, this looks like a new friend or romantic partner taking genuine interest. In reality, scammers are following a script designed to build trust and dependence that opens the door to poor financial decision making.

Rapport‑Building Scripts

Scammers use repeatable scripts that feel personal but are deployed across hundreds of victims. They ask about your family, work, and goals, then mirror your answers back to create false intimacy. This trust-building phase is essential to how pig butchering scams work.

Red flags include:

  • Fast escalation: Early use of nicknames, endearments, and talk of "fate" or "destiny."
  • Mirrored struggles: Stories about their own losses that conveniently echo yours.
  • Future‑oriented talk: References to retiring together, shared property, or joint business plans.

Example of a training script used by pig butchering scam syndicate.

Pig Butchering Script

Reference link

Translation: Grasping Customer Psychology

  • Raise the difficulties and pressures the customer faces in life → (Pressure)
  • Bring up opportunities that must be seized; ask whether they've missed their chance → (Rarity / Fear of Missing Out)
  • Encourage the customer's ability and change their mindset about their destiny → (Ambition / Improvement)
  • Awaken what the customer wants deep inside, and anchor their goals to a mindset of striving → (Motivation)
  • Create the perfect dream so the customer imagines living a wonderful life within it → (Enjoyment / Desire)

Scammers may also send daily missives like voice notes, selfies, gym photos, and workspace shots to make the relationship feel even more real. They establish daily check‑in routines, often with good morning and good night texts, share curated images of wealth and success, and create reciprocity pressure by nudging you to share more of your own life.

Example of pig butchering scam text exchange.

Pig butchering text example

arXiv Research Paper

Even worse, AI is enhancing scammers' ability to create convincing impersonations and vastly increasing their revenues. According to Chainalysis, scams linked to AI vendors enjoy 4.5 times more revenue per scam than those without, driving daily revenues up from $518 to $4,838. This is likely also due to the increased operational efficencies AI may provide. As with all industries, AI is likely to change how pig butchering works forever.

Tip

Preserve fake images: Screenshots with profile names, timestamps, and media can help forensic teams determine whether images are stolen or reused across multiple scam profiles.

Fake Credentials and Business Personas

As rapport solidifies, scammers introduce a formal persona: successful entrepreneur, crypto trader, or finance professional with "rare access" to profitable opportunities. The emotional bond makes these claims feel believable.

Common tactics include:

  • Screenshots of trading dashboards showing consistent profits.
  • Photos of conference badges, office buildings, or business cards with impressive titles.
  • Stories about "helping friends and family" achieve financial freedom.

The sum of these parts is often a pre‑packaged character with fake company names, unverifiable titles, and recycled images across multiple identities.

As the Hook phase progresses, conversations drift from "How was your day?" to "Here's how I invest"—the bridge into the Grooming Phase where emotional dependence and financial advice become intertwined.

Stage 3: The Grooming Phase

In the Grooming Phase, the scammer shifts from building connection to shaping your habits, routines, and decision‑making around them.

By this point, many victims describe feeling as if this person is part of their daily life—a source of encouragement, advice, and emotional support.

Legal perspective

Grooming demonstrates how the scammer systematically engineered trust and influence before any major investment was discussed.

That pattern can help distinguish legitimate financial advice from a premeditated crypto scam or pig‑butchering operation.

In practice, grooming usually shows up as a handful of repeatable patterns:

  • Rhythm and routine. Good‑morning and good‑night messages, midday check‑ins, and constant small talk that normalize continuous contact. Over time, chat logs show dense streams of messages with very few gaps.

  • Emotional mirroring. When you share stress about work, health, or family, the scammer responds with empathy, “similar” stories, and promises that financial security will fix many of your problems. They often repeat your own phrases back to you and claim to have gone through “the same thing.”

  • Shared “our future” language. Conversations shift from your goals to “our” goals—retiring together, buying property, traveling once “our portfolio” hits a target number. Screenshots of their supposed investments are framed as what “we can get you to” if you are “brave enough” to follow their plan.

Taken together, these tactics blur the line between personal loyalty and financial judgment.

By the time the investment pitch appears, many victims tell us they feel they would be letting down someone they care about—not just turning down a risky trade.

Stage 4: The Investment Introduction

Once the emotional groundwork is laid, the scam finally begins to look like an “investment opportunity.”

Transition from Personal to Financial

The shift into money talk is rarely abrupt. Instead, it often starts with casual references to how the scammer manages “their” finances or how they achieved their current lifestyle.

Common openings include:

  • Comments about making “extra income” from crypto or foreign‑exchange trading.
  • Screenshots of account balances or profit charts shared “just to motivate you.”
  • Stories of helping a sibling, friend, or colleague pay off debts or retire early through the same approach.

Crucially, the scammer frames this as sharing something special with you, not selling a product. They emphasize exclusivity, timing, and the idea that you are being invited into a more sophisticated level of investing.

Claims of Crypto Expertise

To make the invitation credible, scammers may describe themselves as early crypto adopters, quantitative traders, or insiders with professional experience at major financial institutions. They may share:

  • Screenshots of detailed trading interfaces with complex charts and indicators.
  • References to specific coins, pairs, or strategies that sound technical and impressive.
  • Explanations that they have “a system” or “mentor” that consistently beats the market.

Victims often report feeling out of their depth at this stage, but reassured by the prior emotional bonding. From an evidentiary standpoint, these chats can show how the scammer knowingly presented themselves as an expert to induce reliance on their advice.

Pressure via Urgency and Authority

As the investment angle becomes clearer, the tone often shifts from purely supportive to gently insistent.
The scammer highlights limited‑time opportunities, market windows, or “entry points” that supposedly require quick action.

Typical language includes:

  • “If you wait too long, you’ll miss this cycle.”
  • “I only share this with a few people I trust.”
  • “I don’t want you to regret not starting when you had the chance.”

This often marks the point where many victims first move money from traditional accounts into cryptocurrency exchanges.

Stage 5: The Fake Platform and Profit Mirage

Once you've agreed in principle to "invest," the scammer introduces a platform, app, or website where the trading supposedly happens. This infrastructure is central to pig‑butchering scams: it's where your deposits are displayed, your "profits" are fabricated, and your withdrawals are ultimately blocked.

Example of a fake crypto trading platform found on the Apple App Store.

Fake Platform

Reference link

These setups tend to follow a recognizable pattern:

  • Convincing wrappers: Websites, mobile apps, Web3 dApps, and mirror sites mimic real brokers and exchanges—complete with charts, order books, KYC flows, and support chats. Domains may differ from real brands by only a character or two, and “customer support” is staffed by the same scam operation.
  • Scammer‑controlled deposit funnels: You are given deposit addresses or QR codes, or asked to connect a wallet and approve transactions. On‑chain, those addresses almost always resolve to wallets directly controlled by scammers, not regulated institutions.
  • Fabricated performance: Once funds arrive, the dashboard shows near‑instant crediting and smooth, often unrealistic growth. Balances and profit figures are entirely under scammer control; there are no real trades behind the numbers.
  • UX that pushes deposits, not withdrawals: Buttons to “add funds” or “increase position size” are prominent, while withdrawals are buried, delayed, or subject to sudden “maintenance” and “compliance checks.” Regular prompts about limited‑time opportunities, badges tied to deposit size, and celebratory messages from your scammer‑contact all push you to keep topping up.

The combination of look‑alike infrastructure, scam‑controlled wallets, and unverifiable trading activity is one of the strongest signals that a pig‑butchering platform is in play—even before the final cut‑off.

Stage 6: The Big Ask

At some point, the scam shifts from a request for incremental deposits to a single, much larger commitment.

This is often the moment when victims move retirement funds, home‑equity proceeds, or the bulk of their savings. We regularly see victims lose tens,hundreds of thousands, or millions of dollars. The scam up to this point has been so convincing that what is really a massive leap from small deposits to one lump sum feels far less risky.

One industry report from cyber-security firm Cyvers estimates 75% of scammed individuals lost over half of their net worth. In one of the most striking instances of pig butchering, the CEO of Heartland Tri-State Bank, Shan Hanes, wired $47 million from customer accounts to scammers.

Cyvers report on pig butchering scams in crypto.

Cyvers report: Putting Lipstick on a Pig – A Deep Dive into Pig Butchering Scams in Crypto

Source: Cyvers — Putting Lipstick on a Pig

In traditional pig butchering terminology, this is the slaughtering phase. It comes at a devastating cost to many victims. As with all the other stages, it is often impossible to see from the inside looking out, but unmistakable in retrospect.

“One Big Deposit” Scripts

Scammers frequently frame this request as a special chance to level up. They may claim that a particular trade, coin, or market window is uniquely favorable and that you should “seize the moment.”

Common lines include:

  • “If you can make one bigger deposit now, you won’t have to worry about money again.”
  • “This is the last chance before the next halving / cycle / window closes.”
  • “You trust me, right? I wouldn’t suggest this if I wasn’t sure.”

These messages often come after weeks or months of apparent success on the fake platform, making the leap feel less risky than it truly is.

Social‑Engineering Nudges

To overcome hesitation, scammers deploy every tool of social engineering they’ve developed during earlier phases. They may combine flattery, mild disappointment, urgency, and even implied threats about missed opportunities.

These tactics are designed to override your internal risk alarms precisely when the stakes are highest.

Stage 7: The Exit Scam

After the Big Ask, many victims notice a subtle but decisive change. Suddenly, withdrawals stop working, support becomes evasive, and the person who once messaged you begins to disappear.

Sudden Disappearance and Delays

The first signs of the exit often look like ordinary technical issues:

  • “System maintenance” messages when you try to withdraw.
  • Requests to wait a few hours or days for “liquidity” or “compliance checks.”
  • Customer‑support tickets that receive vague or copy‑and‑paste responses.

On the chat side, the scammer may:

  • Respond more slowly or at odd hours.
  • Blame the platform, regulators, or “the finance team” for delays.
  • Reassure you that everything is fine as long as you don’t panic.

“Customer Service” as a Wall

As problems escalate, you are often pushed toward platform “customer service” instead of your original contact. This creates a buffer that lets the scammer maintain emotional rapport while the platform continues to stonewall.

You may experience:

  • Being asked to submit identity documents or additional information under the guise of compliance.
  • Being shuffled between multiple support reps who all give the same scripted answers.
  • Feeling that you’re trapped in a loop without any clear path to resolution.

These delays buy time for scammers to move funds further down the chain, making recovery harder.

Stage 8: The Extortion Phase

For many victims, the scam does not end when withdrawals fail. Instead, it evolves into a final phase of extortion and secondary scams that aim to extract even more money.

In fact, a paper from researchers at the University of California Davis showed nearly 58% of the victims they interviewed were contacted by fake law enforcement or recovery agents.

Fake Taxes and Unlocking Fees

One common tactic is to claim that your funds are “frozen” until you pay additional charges:

  • Supposed tax obligations to a foreign regulator.
  • “Security deposits” or “risk reserves” that must be posted before release.
  • High “service fees” or “gas fees” that must be prepaid.

These demands are almost always time‑sensitive and accompanied by official‑looking invoices or documents. Do not pay these fees. Paying them will never result in access to your funds.

Threats, Time Pressure, and Recovery Scams

In more aggressive cases, scammers escalate to threats and follow‑on schemes:

  • Implying legal trouble if you do not pay alleged taxes or fees.
  • Threatening to report you to authorities for “money laundering” or “tax evasion.”
  • Introducing a new “lawyer,” “recovery agent,” or “compliance officer” who claims they can fix everything—for an upfront payment.

This is where many victims lose a second round of funds, desperately trying to unlock what is already gone.

Important

Real crypto recovery lawyers offer free in-person consultations and will not ask for payment upfront. Be sure to meet and interview your attorney before making any payments. For a list of good questions to ask a crypto recovery lawyer, see our checklist.

Next Steps

If you are the victim of a scam, we understand this is a lot ot take in. The first thing, and we repeat, is to recognize you are not alone. It can take some time to recognize you've been scammed and sometimes even longer to get past feelings of humiliation and mistrust you may feel from the inital scam, or even a recovery scam.

Here are a few statistics outlining what victims surveyed in a paper from the University of California Davis experienced after they were scammed:

FindingPercent of victims
Victims contacted by fake "recovery agents" or "law enforcement"57.7%
Asked to pay upfront fees for "legal" or "tax" processing34.6%
Felt humiliation (deterring help-seeking)73%
Fear of judgment stopped them from reporting26.9%
Found term "pig butchering" offensive/dehumanizing69.2%

As we've already learned, pig butchering is a massive industry, and based on our experience, it's more than likely you or someone you know has been negatively affected by its ever-expanding reach.

If you find yourself in such a scam, reach out.

For a detailed look at how these operations work—where they run, how scam platforms are built, and where victim funds go—see our article Behind The Scenes of a Pig Butchering Operation. Next we look at why these scams work so effectively—and what that means for victims and recovery.