Defy
Security

What Is a Pig Butchering Scam? The Complete Guide to Sha Zhu Pan Crypto Fraud

Defy Team
2026-02-25
11 min read
#pig butchering scam#sha zhu pan#crypto fraud#romance scam#blockchain forensics#AML#crypto compliance#scam detection#DeFi fraud#human trafficking
## What Is a Pig Butchering Scam and Where Did It Come From? A pig butchering scam, known in Mandarin as *sha zhu pan*, is a long-horizon confidence fraud in which a criminal operator methodically cultivates a victim’s trust over weeks or months before introducing a fraudulent cryptocurrency investment opportunity. The name is deliberately brutal: the scammer “fattens the pig” through sustained relationship-building, then “slaughters” it by stealing all deposited funds. First documented in China around 2016, the scheme migrated globally as criminal syndicates expanded into Southeast Asia. The UNODC estimates that pig butchering operations generated between **$64 billion and $75 billion** in illicit proceeds between 2020 and 2024. The FBI reported that in 2023 alone, American victims lost over **$4.57 billion** to investment fraud schemes, the majority of which were pig butchering operations. ## What Are the Four Psychological Stages of a Pig Butchering Attack? | Stage | Common Name | Duration | Scammer Tactics | Red Flags for Victims | |-------|-------------|----------|-----------------|----------------------| | 1 | Initial Contact | Day 1–7 | Wrong number, LinkedIn connection, dating app match | Unsolicited contact from attractive stranger | | 2 | Trust Building | Week 1–8 | Daily messaging, shared interests, fake personal disclosures | Relationship feels unusually intense and fast | | 3 | Investment Introduction | Week 4–12 | Casual mention of trading profits, introduction to platform | Urgency to invest, promised returns of 20–300% | | 4 | Slaughter | Week 8–20+ | Withdrawal blocked by taxes, account frozen, platform vanishes | Demands for additional payment to release funds | **Stage 1: Initial Contact.** Scammers rarely cold-call. The approach is deliberately personal. A common vector is the “wrong number” text. LinkedIn and professional networks are increasingly targeted. **Stage 2: Trust Building.** This phase is the most labor-intensive. Workers in scam compounds follow detailed scripts covering conversational techniques drawn from psychological research on attachment and reciprocity. **Stage 3: Investment Introduction.** The scammer mentions offhand that they have been trading crypto on a “private” platform. Early small deposits produce visible gains — profits are real and withdrawable at this stage. **Stage 4: The Slaughter.** Once the victim has deposited a significant sum, the platform introduces obstacles to withdrawal. A fabricated “tax liability” requires additional funds. Eventually, the platform disappears entirely. ## How Is Cryptocurrency Exploited in Pig Butchering Schemes? Cryptocurrency is not incidental to pig butchering fraud — it is the mechanism that makes the scheme viable at industrial scale. Fake platforms are built on cloned open-source trading platform codebases. DeFi platforms present a newer attack surface through “approval phishing” — smart contracts with hidden drain functions. Funds are laundered through a layered process: victim deposits are immediately swept to aggregator wallets, distributed across hundreds of intermediate addresses, moved through cross-chain bridges, and off-ramped through OTC desks in jurisdictions without effective AML supervision. ## What Role Does Human Trafficking Play in Pig Butchering Operations? A significant proportion of the individuals conducting the scams are themselves victims of human trafficking. The Institute for Security and Technology estimated that more than **100,000 people** were being held in pig butchering compounds across Southeast Asia. Workers face physical punishment and passport confiscation. ## How Are Law Enforcement and Regulators Responding? The DOJ announced seizure of over **$112 million** in cryptocurrency linked to pig butchering operations. INTERPOL’s Operation Storm Makers resulted in over 3,000 arrests across six Southeast Asian countries. ## How Do Blockchain Forensics Tools Like Defy Help Trace Pig Butchering Funds? Defy’s blockchain analytics platform follows funds across multiple chains, through bridge transactions, and through mixer outputs using probabilistic clustering models. The platform’s real-time AML scanning evaluates incoming transactions against a continuously updated database of pig butchering infrastructure. The Vera AI module applies anomaly detection to identify behavioral patterns consistent with pig butchering victimization, enabling VASPs to proactively reach out to potentially victimized customers before total loss occurs.

More with Defy

Contact us to learn more about our compliance and security solutions.

Contact Us

Share This Article

Help this article reach more people by sharing it on social media.

Stay Updated on Compliance and AI Trends

Subscribe to our weekly newsletter and never miss the latest industry developments