{"componentChunkName":"component---src-templates-blog-post-tsx","path":"/what-are-pig-butchering-scams","result":{"data":{"site":{"siteMetadata":{"siteUrl":"https://guard.io","title":"Browser Protection | Data & Privacy Security | Guardio Personal Blog"},"pathPrefix":"/blog"},"contentfulBlogPost":{"slug":"what-are-pig-butchering-scams","title":"How to avoid pig butchering scams","metaTitle":"Protect your investments from pig butchering scams: Essential safety tips","showExitPop":true,"descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Discover what pig butchering scams are, understand the risks, and learn comprehensive strategies to protect your financial and cryptocurrency investments."}},"description":{"childMarkdownRemark":{"rawMarkdownBody":"Explore the deceptive world of pig butchering scams. Learn how to navigate these sophisticated cons with savvy awareness and the right cybersecurity tools like Guardio. Discover why we're all potential targets, how scammers exploit our need for connection, and how you can safeguard your digital life. "}},"author":{"name":"Rotem Tal - Senior Cybersecurity Expert |Writer & Editor|","image":{"fixed":{"src":"//images.ctfassets.net/tdnn4v0n6ild/5VFI2fXyi3N5Fuhnj3EXRX/38102343f57bcb5f1228f632b389c8e6/Rotem_Tal_cyber_security_content_writer.png?w=40&h=40&q=50&fit=fill"}}},"coverImage":{"fixed":{"width":810,"height":477,"src":"//images.ctfassets.net/tdnn4v0n6ild/5QAdle9VDRYHoXRnuNTafw/945ebe49b74dfb04e3166a50f74be535/mattolpinski_a_broken_piggy_bank_on_a_wooden_shelf_with_loose_c_9f78f3da-28d9-466d-936d-975817c0150d-min.png?w=810&h=477&q=50&fit=fill"}},"tags":null,"publishDate":"2024-05-05T00:00+03:00","publishDateFormatted":"May 4th","body":{"childMarkdownRemark":{"tableOfContents":"","timeToRead":9,"htmlAst":{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"h2","properties":{"id":"new-threat-on-the-block-pig-butchering-scams","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#new-threat-on-the-block-pig-butchering-scams","ariaLabel":"new threat on the block pig butchering scams permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"New threat on the block: Pig butchering scams"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"It's not news that the internet is filled with scammers, but you might have noticed a particular new scam popping up more frequently. It starts off with a seamlessly innocent yet weird text from an unknown number. Something like, \"Sarah, can we move lunch to 2?\" when you're not Sarah, or \"Steve, what time is the show tonight?\" even though you're not Steve and have no concert tickets."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Most people ignore these messages, but some write back, get sucked into a conversation, and eventually end up losing a lot of money. Welcome to the world of \"pig butchering\" scams. Despite its gruesome name, rest assured that no pigs are harmed in a pig butchering scam. The term chillingly illustrates how scammers groom their victims with sweet nothings or dazzling dollar signs, only to plunder their bank accounts when they least expect it. Picture less oinking, more swindling."}]},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"In the last 4 years, people lost over "},{"type":"element","tagName":"a","properties":{"href":"https://time.com/6836703/pig-butchering-scam-victim-loss-money-study-crypto/","title":"Time - New Study Estimates as Much as $75 Billion in Global Victims’ Losses to Pig-Butchering Scam","target":"_blank","rel":["nofollow"]},"children":[{"type":"text","value":"$75 billion"}]},{"type":"text","value":" due to pig-butchering scams."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"In this article, we'll dive deep into the deceptive world of pig butchering scams, how they work, the intricate methods scammers use to build trust, and the devastating impact on victims. We’ll also offer you some practical tips on how to spot these scams and steer clear using Guardio's cybersecurity tools. Ready? Let’s dive in!"}]},{"type":"element","tagName":"native-ad","properties":{"id":"ad_install","btn_label":"Get Started","btn_label_mobile":"Start Free Scan","title":"Turn the tables on scammers"},"children":[{"type":"text","value":"\nLet Guardio help you keep your financial farm secure!\n"}]},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"table-of-contents","properties":{},"children":[]}]},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 500px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 55.99999999999999%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/4AAQSkZJRgABAQEASABIAAD/2wBDAAMCAgMCAgMDAwMEAwMEBQgFBQQEBQoHBwYIDAoMDAsKCwsNDhIQDQ4RDgsLEBYQERMUFRUVDA8XGBYUGBIUFRT/2wBDAQMEBAUEBQkFBQkUDQsNFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBT/wAARCAAWACgDASIAAhEBAxEB/8QAGgAAAwADAQAAAAAAAAAAAAAAAAcIAgQFBv/EAC0QAAEDAgUDAwMFAQAAAAAAAAECAwQGEQAFBxIhEzFBCBQiFVFhGEJTcYHB/8QAGAEBAAMBAAAAAAAAAAAAAAAABQIDBgT/xAAjEQACAQMDBAMAAAAAAAAAAAABAhEAAwQSITETIlFhQYGR/9oADAMBAAIRAxEAPwBcaW6m1Dk1Y0u8qpM2dZjZlGVKDk1xYKOqkLBuogixPFvJw1q5zusaZrmRl1aqk1HQKlqEyLL3vQ3WVKu2G/O69iEoN07TewGJtp1aEREqQva4gpWD9rEH/mHrqdqzOZkts5zJiSpMRaXW2No6SwL7Dtub9+f9waXDrqJIYHaPfmtFgMcbXa6autxd5EkR8j9p4aravOSKKj5HRUZzLZkpxmGxLZQGtqCSE9Jzd8QS2U7j255BwvHWKl/TRqxmmfImJdeyZTTpzFtSX+shJuklRJNtx/HIxpaVa0vVI8uPVn0L6Q46j2V2W23GPlylA/jSNpufI/NsYetnVKs2MlzWFAcdcoyoMjbfZdYh9RpSSVJcBdA+I4SR9woWPOJY69S+HZjI+6tzL64WBcwrVpYuR3eIg7GPVQNAzufGhMluW+3ZIHwcIwY5qZSUw0IHhODC2s1kior11L1a8ClBBI7YtKrfSHnWs+U5HmxqODBZZgtOsN+3c3pQttKtqjuN/luPjvbxgwYPtWkZmJHFJtkXLSLoPM+KTGb+leZSMWa5Llws7RudZ6PVcjWCf3hYSuyuxAKSPvjlana1zJukztI5tClSG48VtmA+rMUOe34Qk8iOhSkq2cpKiLkm3axgxLGAeWPINW5t1xCg7EVPdN0jPqRZaaksMKNthXcg/wB8cYMGDHeokUMxIO1f/9k='); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Pig butchering scams","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/4Gzv1bFgC7mtekEYsz3NYR/1146752b19545aadac35fe9417ff6902/Pig_butchering_copy.jpg","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/4Gzv1bFgC7mtekEYsz3NYR/1146752b19545aadac35fe9417ff6902/Pig_butchering_copy.jpg?w=125 125w","https://images.ctfassets.net/tdnn4v0n6ild/4Gzv1bFgC7mtekEYsz3NYR/1146752b19545aadac35fe9417ff6902/Pig_butchering_copy.jpg?w=250 250w","https://images.ctfassets.net/tdnn4v0n6ild/4Gzv1bFgC7mtekEYsz3NYR/1146752b19545aadac35fe9417ff6902/Pig_butchering_copy.jpg?w=500 500w"],"sizes":"(max-width: 500px) 100vw, 500px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"element","tagName":"h2","properties":{"id":"how-pig-butchering-scams-work","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#how-pig-butchering-scams-work","ariaLabel":"how pig butchering scams work permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"How pig butchering scams work"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Unlike the hit-and-run deception of typical "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/phishing-explained-everything-you-need-to-know-about-phishing-scams#how-can-i-protect-myself-from-phi10-paypal-scams-to-watch-outshing-emails","title":"Guardio Blog - Don't Take the Bait: Your Guide to Phishing Email Protection","target":"_blank","rel":["nofollow"]},"children":[{"type":"text","value":"phishing"}]},{"type":"text","value":", which bombards you with urgent texts or emails, pig butchering scams are more like a slow dance with a stranger pretending to be the perfect partner or financial guru. Often centered around the seductive world of cryptocurrency investments, these scams have globally drained millions of dollars from unsuspecting people."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"The mechanics of pig butchering scams are like a meticulously crafted Martin Scorsese thriller—they're complex, surprising, and expertly designed to bamboozle you. At the heart of this hustle is the scammer, a complete stranger who skillfully builds a relationship with you, weaving a web of trust through charm and seemingly genuine interest. This deception is a long play and unfolds through a series of calculated steps, each one meticulously designed to deepen the illusion and draw you further into the trap."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Imagine this: Someone contacts you out of the blue, gradually builds a rapport, and then introduces an incredible investment opportunity. Here's how the scam would usually play out."}]},{"type":"element","tagName":"blockquote","properties":{"className":["instagram-media"],"dataInstgrmCaptioned":"","dataInstgrmPermalink":"https://www.instagram.com/reel/C48rJ2-ODbv/?utm_source=ig_embed&utm_campaign=loading","dataInstgrmVersion":"14","style":" background:#FFF; border:0; border-radius:3px; box-shadow:0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width:540px; min-width:326px; padding:0; width:99.375%; width:-webkit-calc(100% - 2px); width:calc(100% - 2px);"},"children":[{"type":"element","tagName":"div","properties":{"style":"padding:16px;"},"children":[{"type":"text","value":" "},{"type":"element","tagName":"a","properties":{"href":"https://www.instagram.com/reel/C48rJ2-ODbv/?utm_source=ig_embed&utm_campaign=loading","style":" background:#FFFFFF; line-height:0; padding:0 0; text-align:center; text-decoration:none; width:100%;","target":"_blank"},"children":[{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" display: flex; flex-direction: row; align-items: center;"},"children":[{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":"background-color: #F4F4F4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":"display: flex; flex-direction: column; flex-grow: 1; justify-content: center;"},"children":[{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" background-color: #F4F4F4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" background-color: #F4F4F4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"},"children":[]}]}]},{"type":"element","tagName":"div","properties":{"style":"padding: 19% 0;"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":"display:block; height:50px; margin:0 auto 12px; width:50px;"},"children":[{"type":"element","tagName":"svg","properties":{"width":"50px","height":"50px","viewBox":"0 0 60 60","version":"1.1","xmlns":"https://www.w3.org/2000/svg","xmlnsXLink":"https://www.w3.org/1999/xlink"},"children":[{"type":"element","tagName":"g","properties":{"stroke":"none","strokeWidth":"1","fill":"none","fillRule":"evenodd"},"children":[{"type":"element","tagName":"g","properties":{"transform":"translate(-511.000000, -20.000000)","fill":"#000000"},"children":[{"type":"element","tagName":"g","properties":{},"children":[{"type":"element","tagName":"path","properties":{"d":"M556.869,30.41 C554.814,30.41 553.148,32.076 553.148,34.131 C553.148,36.186 554.814,37.852 556.869,37.852 C558.924,37.852 560.59,36.186 560.59,34.131 C560.59,32.076 558.924,30.41 556.869,30.41 M541,60.657 C535.114,60.657 530.342,55.887 530.342,50 C530.342,44.114 535.114,39.342 541,39.342 C546.887,39.342 551.658,44.114 551.658,50 C551.658,55.887 546.887,60.657 541,60.657 M541,33.886 C532.1,33.886 524.886,41.1 524.886,50 C524.886,58.899 532.1,66.113 541,66.113 C549.9,66.113 557.115,58.899 557.115,50 C557.115,41.1 549.9,33.886 541,33.886 M565.378,62.101 C565.244,65.022 564.756,66.606 564.346,67.663 C563.803,69.06 563.154,70.057 562.106,71.106 C561.058,72.155 560.06,72.803 558.662,73.347 C557.607,73.757 556.021,74.244 553.102,74.378 C549.944,74.521 548.997,74.552 541,74.552 C533.003,74.552 532.056,74.521 528.898,74.378 C525.979,74.244 524.393,73.757 523.338,73.347 C521.94,72.803 520.942,72.155 519.894,71.106 C518.846,70.057 518.197,69.06 517.654,67.663 C517.244,66.606 516.755,65.022 516.623,62.101 C516.479,58.943 516.448,57.996 516.448,50 C516.448,42.003 516.479,41.056 516.623,37.899 C516.755,34.978 517.244,33.391 517.654,32.338 C518.197,30.938 518.846,29.942 519.894,28.894 C520.942,27.846 521.94,27.196 523.338,26.654 C524.393,26.244 525.979,25.756 528.898,25.623 C532.057,25.479 533.004,25.448 541,25.448 C548.997,25.448 549.943,25.479 553.102,25.623 C556.021,25.756 557.607,26.244 558.662,26.654 C560.06,27.196 561.058,27.846 562.106,28.894 C563.154,29.942 563.803,30.938 564.346,32.338 C564.756,33.391 565.244,34.978 565.378,37.899 C565.522,41.056 565.552,42.003 565.552,50 C565.552,57.996 565.522,58.943 565.378,62.101 M570.82,37.631 C570.674,34.438 570.167,32.258 569.425,30.349 C568.659,28.377 567.633,26.702 565.965,25.035 C564.297,23.368 562.623,22.342 560.652,21.575 C558.743,20.834 556.562,20.326 553.369,20.18 C550.169,20.033 549.148,20 541,20 C532.853,20 531.831,20.033 528.631,20.18 C525.438,20.326 523.257,20.834 521.349,21.575 C519.376,22.342 517.703,23.368 516.035,25.035 C514.368,26.702 513.342,28.377 512.574,30.349 C511.834,32.258 511.326,34.438 511.181,37.631 C511.035,40.831 511,41.851 511,50 C511,58.147 511.035,59.17 511.181,62.369 C511.326,65.562 511.834,67.743 512.574,69.651 C513.342,71.625 514.368,73.296 516.035,74.965 C517.703,76.634 519.376,77.658 521.349,78.425 C523.257,79.167 525.438,79.673 528.631,79.82 C531.831,79.965 532.853,80.001 541,80.001 C549.148,80.001 550.169,79.965 553.369,79.82 C556.562,79.673 558.743,79.167 560.652,78.425 C562.623,77.658 564.297,76.634 565.965,74.965 C567.633,73.296 568.659,71.625 569.425,69.651 C570.167,67.743 570.674,65.562 570.82,62.369 C570.966,59.17 571,58.147 571,50 C571,41.851 570.966,40.831 570.82,37.631"},"children":[]}]}]}]}]}]},{"type":"element","tagName":"div","properties":{"style":"padding-top: 8px;"},"children":[{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" color:#3897f0; font-family:Arial,sans-serif; font-size:14px; font-style:normal; font-weight:550; line-height:18px;"},"children":[{"type":"text","value":"View this post on Instagram"}]}]},{"type":"element","tagName":"div","properties":{"style":"padding: 12.5% 0;"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":"display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;"},"children":[{"type":"element","tagName":"div","properties":{},"children":[{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":"background-color: #F4F4F4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":"background-color: #F4F4F4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":"background-color: #F4F4F4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"},"children":[]}]},{"type":"element","tagName":"div","properties":{"style":"margin-left: 8px;"},"children":[{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" background-color: #F4F4F4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg)"},"children":[]}]},{"type":"element","tagName":"div","properties":{"style":"margin-left: auto;"},"children":[{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" background-color: #F4F4F4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"},"children":[]}]}]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":"display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;"},"children":[{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" background-color: #F4F4F4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"div","properties":{"style":" background-color: #F4F4F4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"},"children":[]}]}]},{"type":"element","tagName":"p","properties":{"style":" color:#c9c8cd; font-family:Arial,sans-serif; font-size:14px; line-height:17px; margin-bottom:0; margin-top:8px; overflow:hidden; padding:8px 0 7px; text-align:center; text-overflow:ellipsis; white-space:nowrap;"},"children":[{"type":"element","tagName":"a","properties":{"href":"https://www.instagram.com/reel/C48rJ2-ODbv/?utm_source=ig_embed&utm_campaign=loading","style":" color:#c9c8cd; font-family:Arial,sans-serif; font-size:14px; font-style:normal; font-weight:normal; line-height:17px; text-decoration:none;","target":"_blank"},"children":[{"type":"text","value":"A post shared by Guardio Security (@guardiosecurity)"}]}]}]}]},{"type":"text","value":" "},{"type":"element","tagName":"script","properties":{"async":true,"src":"//www.instagram.com/embed.js"},"children":[]},{"type":"element","tagName":"h2","properties":{"id":"the-pig-butchering-playbook","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#the-pig-butchering-playbook","ariaLabel":"the pig butchering playbook permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"The pig butchering playbook"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Creating a fake identity:"}]},{"type":"text","value":" Scammers create detailed online personas and fake profiles, often posing as attractive singles or successful investors on social media and dating apps. They use stolen or AI-generated photos coupled with compelling backstories to make themselves appear trustworthy and appealing. These profiles are so well-crafted that you might find yourself drawn to their charm and apparent success without even realizing it."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"The scammers invest significant effort into making their profiles resonate with you, selecting interests and hobbies that align closely with yours, thus fostering a sense of connection and familiarity. This strategic alignment makes you more likely to trust them and feel a bond, setting the stage for deeper engagement as they gradually draw you into their schemes."}]},{"type":"element","tagName":"h4","properties":{},"children":[{"type":"text","value":"Tip: Avoid accepting friends or message requests from anyone you don’t recognize."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Random messages:"}]},{"type":"text","value":" Scammers reach out to you through various channels, including dating apps, social media, or direct communication methods like texts or calls. They use scripted messages to initiate contact and target those who are more likely to fall for the scam. One common tactic is the \"wrong number\" strategy, where the scammer might send a text saying something like, \"Hey Mike, I'll send you the documents first thing in the morning.\""}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"When you respond to clarify that they have the wrong number, they use the opportunity to strike up a conversation. This seemingly harmless interaction serves as a stepping stone for the scammer to gradually build a relationship with you, often extending over weeks or even months. By forming this connection, they create a foundation of trust, which they can later exploit when introducing fake investment opportunities."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Establishing trust:"}]},{"type":"text","value":" As mentioned, over weeks or months, the scammer will engage with you frequently, gradually \"fattening\" you up by mirroring your interests and sentiments to create a strong bond. This process might include sending small gifts or performing thoughtful gestures, all designed to enhance their credibility and deepen the emotional connection between you. These actions are not just random acts of kindness; they’re calculated moves to make you feel appreciated and understood, thereby making you more receptive to their suggestions and advice. This continuous and attentive communication helps to build a seemingly genuine relationship, setting the stage for more significant manipulations and requests in the future."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"“Too good to be true” investment opportunities:"}]},{"type":"text","value":" Once a level of trust is established, the scammer introduces the concept of investing together in cryptocurrency or other assets, painting it as a shortcut to financial freedom. Interestingly, they might not even explicitly invite you to join in on these \"lucrative\" opportunities right away. Instead, they cleverly flaunt their own financial success and the supposedly easy gains they're making, which can spark envy and a strong desire in you to get involved."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"By showing off their significant returns without directly asking for your participation, they create an irresistible allure. You're then more likely to bring up the topic of investing yourself, which pulls you deeper into their carefully laid trap. This subtle approach enhances the scam's credibility, making the whole scheme appear more legitimate and enticing, ultimately making it tougher for you to resist the temptation to dive in."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Fake returns:"}]},{"type":"text","value":" After successfully guiding you to make an initial small deposit through a fraudulent investment app, the scammer cleverly manipulates data to show astounding returns on that modest investment. What adds credibility to the investment opportunity is the sophistication of the fake websites and investment platforms. They are so polished and professional-looking that they could easily be mistaken for legitimate operations. They feature user interfaces that dazzle with financial data, which, although entirely fabricated, appears convincingly real. Seeing these promising numbers, you’re naturally inclined to believe that larger investments will yield even greater returns."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Motivated by the manipulated success, you could easily persuaded to pour more money into the scheme, expecting to capitalize on what appears to be a golden opportunity. This stage is critical for the scammer, as it not only secures a larger commitment from you but also deepens your trust, making you more susceptible to further deception and increasing the likelihood of the scam's continued success."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Vanishing act:"}]},{"type":"text","value":" After extracting as much money as possible, the scammer executes a cold and calculated disappearance, cutting off all communication and leaving you in a state of shock and financial disarray. You suddenly find yourself unable to access your funds or reach the scammer through any previously used channels of communication. Emails bounce back, phone numbers are disconnected, and any online profiles vanish into thin air."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"The sudden ghosting is devastating, as it not only strips you of your financial assets but also leaves you without any recourse or ability to seek immediate help. Often, you're left grappling with the harsh reality of the situation, struggling to understand how your investment turned into an elaborate betrayal, and facing the difficult task of explaining the situation to banks and law enforcement without substantial proof of the scam. The combination of "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/social-engineering","title":"Guardio Dictionary - What's social engineering?","target":"_blank","rel":["nofollow"]},"children":[{"type":"text","value":"social engineering"}]},{"type":"text","value":", sophisticated fake platforms, and emotional manipulation in these scams can trap even the wary investor."}]},{"type":"element","tagName":"native-ad","properties":{"id":"ad_install","btn_label":"Get Started","btn_label_mobile":"Start Free Scan","title":"Don’t let scammers hog your hard-earned cash!"},"children":[{"type":"text","value":"\nBlock online threats with Guardio and keep your finances secure.\n"}]},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 500px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 100%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Pig butchering scams","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/1FU5AjH4ecxE7CWEAymgwr/9b6a2ab12d23644ad139d79909a78c44/A_whimsical_illustration_depicting_a_female_talking_on_a_phone_on_one_side__and_an_evil-looking_pig_on_the_other_side__sitti.jpg","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/1FU5AjH4ecxE7CWEAymgwr/9b6a2ab12d23644ad139d79909a78c44/A_whimsical_illustration_depicting_a_female_talking_on_a_phone_on_one_side__and_an_evil-looking_pig_on_the_other_side__sitti.jpg?w=125 125w","https://images.ctfassets.net/tdnn4v0n6ild/1FU5AjH4ecxE7CWEAymgwr/9b6a2ab12d23644ad139d79909a78c44/A_whimsical_illustration_depicting_a_female_talking_on_a_phone_on_one_side__and_an_evil-looking_pig_on_the_other_side__sitti.jpg?w=250 250w","https://images.ctfassets.net/tdnn4v0n6ild/1FU5AjH4ecxE7CWEAymgwr/9b6a2ab12d23644ad139d79909a78c44/A_whimsical_illustration_depicting_a_female_talking_on_a_phone_on_one_side__and_an_evil-looking_pig_on_the_other_side__sitti.jpg?w=500 500w"],"sizes":"(max-width: 500px) 100vw, 500px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"element","tagName":"h2","properties":{"id":"how-to-protect-yourself-from-pig-butchering-scams","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#how-to-protect-yourself-from-pig-butchering-scams","ariaLabel":"how to protect yourself from pig butchering scams permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"How to protect yourself from pig butchering scams:"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Not all is lost, and you can definitely avoid falling victim to these scams by taking a few proactive steps. Here are a few scam protection tips to keep you safe from pig butchering scams:"}]},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Limit sharing personal information:"}]},{"type":"text","value":" This is a general rule of caution when it comes to the internet. Be cautious about how much personal information you share online, especially with people you don’t know, new contacts, or unverified individuals."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Be skeptical of overly lucrative offers:"}]},{"type":"text","value":" If an investment seems too good to be true, it probably is. Always verify the legitimacy of the person offering the investment and the platform itself."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use reliable security software:"}]},{"type":"text","value":" Tools like "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page","target":"_blank","rel":["nofollow"]},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" offer essential security against malicious sites, fake investment platforms, phishing emails, and malicious links. Even if you accidentally click on a harmful link, Guardio will block it, ensuring that your identity and finances remain secure online."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Educate yourself and your family:"}]},{"type":"text","value":" Understanding the signs of these scams can significantly reduce the risk of falling victim to them. Awareness is a powerful tool against cybercrime."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"element","tagName":"h2","properties":{"id":"how-can-guardio-help-against-pig-butchering-scams","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#how-can-guardio-help-against-pig-butchering-scams","ariaLabel":"how can guardio help against pig butchering scams permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"How can Guardio help against pig butchering scams?"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Pig butchering scams can be tricky, but you don’t have to face them alone. With Guardio’s cybersecurity protection, you can keep your online activities safe and sound."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Here’s how Guardio helps:"}]},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Blocks shady websites: It stops you from accidentally visiting sites that look real but are set up to trick you."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Filters out sketchy messages: Whether it’s a weird text or an email, Guardio keeps scams out of your inbox and phone."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Keeps an eye on your inbox: Guardio scans your emails for signs of scams and alerts you if something’s fishy."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Protects your social media: It manages your account cookies to prevent hackers from taking over."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Stops dangerous links: If you click on a malicious link, Guardio will immediately block it, keeping you and your device safe from potential threats."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Checks for data leaks: Guardio lets you know if your personal info has been compromised somewhere online."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"With Guardio by your side, there's no way you'll get tangled up in pig butchering or cryptocurrency scams."}]},{"type":"element","tagName":"native-ad","properties":{"id":"ad_install","btn_label":"Get Started","btn_label_mobile":"Start Free Scan","title":"Difficult to recognize, easy to fall for"},"children":[{"type":"text","value":"\nDon't be a victim of pig butchering scams. Protect yourself with Guardio!\n"}]},{"type":"element","tagName":"h2","properties":{"id":"the-even-darker-side-of-pig-butchering-scams","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#the-even-darker-side-of-pig-butchering-scams","ariaLabel":"the even darker side of pig butchering scams permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"The even darker side of pig butchering scams"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"While it's hard to feel sympathy for scammers, digging deeper into pig butchering scams reveals that these scammers themselves are often victims, ensnared in a nefarious web of exploitation. Many are actually victims of human trafficking, coerced into participating in these frauds under dire circumstances."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Lured under the guise of legitimate employment opportunities abroad, these workers find themselves tricked and transported to remote locations where they are forced into digital "},{"type":"element","tagName":"a","properties":{"href":"https://www.propublica.org/article/pig-butchering-scams-raided-cambodia-apple-trafficking","title":"Propublica - Authorities Raid Alleged Cyberscam Compounds in Cambodia","target":"_blank","rel":["nofollow"]},"children":[{"type":"text","value":"scam sweatshops"}]},{"type":"text","value":" by criminal syndicates. Threatened and controlled, they are compelled to engage in scamming activities, often targeting unsuspecting individuals across the globe."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"These workers are often confined in large warehouse-like facilities resembling sweatshops, where they are made to work up to 20 hours a day under constant surveillance. Their personal documents are typically confiscated to prevent escape, effectively trapping them in a cycle of forced labor. Reports indicate that tens of thousands have been deceived into these conditions through false job advertisements and fraudulent interviews."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"This chilling exploitation amplifies the reach and impact of pig butchering scams, turning them into a systemic issue of forced labor and human rights violations within the cybercrime industry. The individuals caught in this cycle are not just unwilling participants in the scams but are also victims of a much larger criminal enterprise that preys on their vulnerability and desperation."}]},{"type":"element","tagName":"h2","properties":{"id":"the-bottom-line","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#the-bottom-line","ariaLabel":"the bottom line permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"The bottom line"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Navigating the murky waters of pig butchering scams might seem daunting, but with a bit of savvy and the right tools, you can steer clear of trouble. It's important to remember that we're all potential targets because, at the end of the day, we're human and crave connection. When someone reaches out, it taps into our innate desire to believe in them, especially when the conversation comes with the allure of making easy money."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Equipping yourself with investment scam awareness and Guardio’s cybersecurity shield can keep your bank account safe and ensure a scam-free online experience. By understanding the playbook of these digital con artists, you're better prepared to spot their tricks from a mile away. So keep your wits about you, and let's keep our online neighborhoods as safe as our real ones."}]},{"type":"element","tagName":"native-ad","properties":{"id":"ad_install","btn_label":"Get Started","btn_label_mobile":"Start Free Scan","title":"Fatten up your security, not their wallets"},"children":[{"type":"text","value":"\nUse Guardio to block the butchers behind these scams!\n"}]}]}}},"exitPop":{"title":"Stay safe online","buttonDest":"https://guard.io/lp","btnText":"Get Started Now","contentfulid":"default","image":{"fixed":{"width":420,"height":250,"src":"//images.ctfassets.net/tdnn4v0n6ild/2nsINtiyvjptpsLBcQzfpa/16bd7cbf6cfb39f1cde72cc5e4a5424b/A_digital_landscape_showing_a_bustling_online_world_with_numerous_connected_devices_like_smartphones__laptops__and_tablets._.png?w=420&h=250&q=50&fit=fill"}},"body":{"childMarkdownRemark":{"html":"

Stay one step ahead with Guardio. Secure your digital world today and start with a free 7-day trial – your safety net against online scams.

"}}}},"allContentfulBlogPost":{"edges":[{"node":{"title":"Signal Scams: How to Spot and Avoid Fraud on Secure Messaging Apps in 2024","slug":"signal-scams","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=110&h=50&fl=progressive&q=50&fm=jpg 110w,\n//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=220&h=100&fl=progressive&q=50&fm=jpg 220w,\n//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg 440w,\n//images.ctfassets.net/tdnn4v0n6ild/2S3013Fwg0YjDOqiVG2QNM/ce55103deb40b5afdc904990ee9d29f0/Signal_Scams-min.jpg?w=880&h=400&fl=progressive&q=50&fm=jpg 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#788898","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"October 10th","body":{"childMarkdownRemark":{"timeToRead":4}},"description":{"childMarkdownRemark":{"excerpt":"With secure messaging apps like Signal becoming more popular, it’s no surprise scammers are finding new ways to exploit them. While Signal offers end-to-end encryption, fraudsters still…"}}}},{"node":{"title":"VPN scams are everywhere—are you ready to fight back?","slug":"vpn-scams","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=440&h=200&fl=progressive&q=50&fm=jpg","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=110&h=50&fl=progressive&q=50&fm=jpg 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=220&h=100&fl=progressive&q=50&fm=jpg 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=440&h=200&fl=progressive&q=50&fm=jpg 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6rbNb5AVKwaJI7YWYZyCHK/a9294b82dc1d4df63358666c70bdf42e/Man_working_on_virtual_touch_screen_presses_VPN_sign._Virtual_Private_Network___VPN___concept._Business_internet_technology..jpg?w=880&h=400&fl=progressive&q=50&fm=jpg 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#d8b848","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"September 29th","body":{"childMarkdownRemark":{"timeToRead":7}},"description":{"childMarkdownRemark":{"excerpt":"In a world where VPNs should be your digital bodyguard, scam VPNs are actually the ones robbing you blind. From fake services to shady data logging, these scams put your privacy at risk…"}}}},{"node":{"title":"How to spot and avoid free iPhone scams in 2024","slug":"free-iphone-scams","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6IzICEtOulNZBbksa2ph55/0b18df557061238485518434c512574f/top_down_of_side_be_side_iphone_11_next_to_an_iphone_14_pro__showing_backside_of_the_phone_only__on_top_of_light_orange_back.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#882808","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"September 25th","body":{"childMarkdownRemark":{"timeToRead":7}},"description":{"childMarkdownRemark":{"excerpt":"This article uncovers the tactics behind free iPhone scams, from fake giveaways to phishing links. Learn to spot red flags, protect your data, and use tools like Guardio to block scams…"}}}}]}},"pageContext":{"slug":"what-are-pig-butchering-scams","breadcrumb":{"location":"/what-are-pig-butchering-scams","crumbs":[{"pathname":"/","crumbLabel":"Blog"},{"pathname":"/what-are-pig-butchering-scams","crumbLabel":"what-are-pig-butchering-scams"}]}}},"staticQueryHashes":["1614255152"]}