Sift Fraud Intelligence Center

Insights, trends, advisories, and analysis from the leader in Digital Trust & Safety

Connect with fraud experts

Fraud By the Numbers:

Where consumers most frequently encounter fraudulent content

Social Networks

0%

Classifieds

0%

Messaging Apps

0%

Pig Butchering: The Mechanics of the Scam

Click through the timeline to see how the scam works.

Create phony profiles
Scammer creates dozens of phony profiles on dating apps
Swipe
right
Scammer matches with multiple victims
Switch platforms
Conversation moves to a private, encrypted messaging platform
Manipulate Emotionally
Scammer emotionally manipulates victim
Talk
crypto
Conversation turns to crypto investing
Pressure to invest
Scammer convinces victim to invest using fake crypto exchange
Show False Profit
Victim starts seeing false profit and is persuaded to invest more
Steal
Funds
Scammer takes money and ceases communication

Close X

Close X

Close X

Close X

Close X

Close X

Close X

Close X

Jane Lee, Sift Trust and Safety Architect

Businesses can’t keep turning a blind eye to content abuse. Catching scams on one platform could prevent downstream disasters involving account takeover and financial theft on countless other sites.

Proxy Phantom: The anatomy of a fraud ring

In Q3 2021, the Sift data science team identified and blocked an attack coming from multiple large IP clusters (related groups of internet protocol addresses) across the Sift global network. This interactive visualization illustrates the fraud ring and how it used bots to commit sweeping, large-scale account takeover (ATO) attacks against e-commerce merchants all over the world.

Disclaimer: All personally identifiable information is simulated.

In Q3 2021, the Sift data science team identified and blocked an attack coming from multiple large IP clusters (related groups of internet protocol addresses) across the Sift global network. The video below illustrates the fraud ring and how it used bots to commit sweeping, large-scale account takeover (ATO) attacks against e-commerce merchants all over the world.

FRAUDSTER
TRANSACTION
CREDENTIALS
PAYMENT DETAILS
PROXY SERVER

Your information will be used to contact you about our service and subscribe you to our direct marketing communications. You can, of course, unsubscribe at any time. Please see our Website Privacy Notice.