Consumer Protection Tuesday: How “Pig Butchering” Scams Play the Long Game
Tl;dr: Social engineering scams, AKA “pig butchering” scams, are long-con schemes where criminals build trust before persuading victims to send increasingly large sums of money. Unlike quick-hit phishing attacks, these scams rely on emotional manipulation and can result in devastating financial losses. Understanding how they work is the first step toward protecting yourself and your loved ones.

This post is part of a weekly Tuesday series at Coinbase about the latest consumer protection and security measures for crypto owners.
At Coinbase, we’re on a mission to help update the financial system to make it safer and more secure. While under 1% of blockchain transactions are used for illicit activity, and cash remains the preferred medium for illegal transactions, crypto security is always a top priority. Coinbase maintains a robust compliance program, which includes Know Your Customer (KYC) checks, sanctions screenings, suspicious activity reporting, and strong law enforcement partnerships to detect and prevent illicit activity on our platform.
What Is Social Engineering?
Social engineering is a form of manipulation where scammers exploit human psychology to gain access to money or sensitive information.
Instead of hacking into your account, they hack into your trust.
Social engineering is also known as a “pig butchering” scam. The term refers to the way criminals “fatten up” victims over time before executing the financial theft.
These scams are often international, highly organized, and designed to extract far larger payouts than traditional quick-win scams like phishing emails.
The Long Game vs. the Quick Hit
It’s important to understand how pig butchering scams differ from other common fraud tactics.
Quick-Win Scams (Like Phishing)
Mass emails or texts sent to thousands of people
Designed to create urgency (“Your account is locked!”)
Aim to steal passwords or small amounts quickly
Limited interaction with the victim
Pig Butchering Scams (Social Engineering)
Begin with a friendly message on social media, dating apps, or even a “wrong number” text
Conversations can last weeks, months, and sometimes even years
The scammer builds emotional trust and credibility
Victims are persuaded to invest larger and larger sums
Losses can total tens or even hundreds of thousands of dollars
The key difference: These scams are patient. The criminal’s goal isn’t a quick $200 transfer, it’s a life-changing payout.
How a Pig Butchering Scam Typically Unfolds
Each case varies, but the playbook is the same.
Build trust slowly.
Isolate the victim from outside advice.
Introduce financial urgency.
Pig Butchering scams rely on time and psychological pressure. Here are two common set-ups to watch out for:
Scenario A: The “Exclusive” Investment Opportunity
Phase 1: The Warm Introduction
A stranger contacts you online or even through a wrong number text. They’re friendly, professional, and consistent.
Over time:
You message daily.
They share photos of travel, business success, or a luxury lifestyle.
They talk about financial discipline and smart investing.
There is no pressure in the beginning. The scammer is focused on building credibility and rapport.
Phase 2: The Casual Mention of Success
After trust is established, they mention their recent trading wins.
“I’ve been doing really well in the markets lately.”
“I follow a strategy that’s been very consistent.”
They show screenshots of profits and describe an opportunity that feels private or limited. Eventually, they offer to “teach” you.
Phase 3: The Fake Platform
You’re directed to:
A polished but fraudulent website
A mobile trading app not listed in legitimate app stores
A platform you’ve never heard of
You deposit a small amount. The account shows immediate gains. Often, you’re even able to withdraw a small profit, reinforcing legitimacy. Encouraged, you invest more.
Phase 4: The Lock and Pressure
When you attempt to withdraw a larger sum:
“You must prepay taxes.”
“There’s a liquidity verification fee.”
“Your account needs a security deposit upgrade.”
Each payment goes directly to the scammer. Eventually, the scammer disappears—and so does the money.
Scenario B: The Emergency Funds Plea
Phase 1: Emotional Connection
Similar to scenario A, the scammer spends weeks and months building an emotional connection. The goal of this initial phase is always to create a relationship that feels meaningful and real.
Phase 2: The Sudden Crisis
Without warning, emergency strikes:
A business deal falls apart
A bank account is frozen
A relative needs urgent medical care
They’re temporarily stuck overseas
They say things like:
“I’m embarrassed to ask.”
“You’re the only one I trust.”
“I’ll pay you back as soon as this clears.”
The urgency feels temporary and believable.
Phase 3: Escalation
If you send money once, a second complication often follows, with each request building on the last.
Eventually, communication stops, and you’re left confused and in debt.
Know The Red Flags
Pause immediately if someone:
Moves conversations to encrypted messaging apps
Discourages you from telling friends or family
Promises guaranteed returns
Requests crypto or wire transfers for emergencies
Claims repayment is “just days away”
Pressures you to act quickly
Always remember: Real investment professionals don’t cold-message strangers, and legitimate investment platforms do not require unexpected transfers to unlock your own funds.
Final Takeaway
Social engineering scams succeed because they feel personal. They are built on conversation, connection, and carefully staged trust.
That’s why awareness is your strongest defense.
Slow down. Verify independently. Talk to someone you trust before sending funds. And don’t forget: no legitimate opportunity, or relationship, should require you to risk your financial security.


