Pig Butchering Crypto Scam Exposed: Fake Rich Friend Uses Deepfakes & Stolen Photos to Steal Billions

Last year, Americans lost a staggering $9.3 billion to cryptocurrency scams (FBI IC3 Report), with crypto investment fraud, including pig butchering schemes, driving $5.8 billion in losses, a 47% increase year-over-year. These scams continue surging into 2025, fueled by AI deepfakes and organized crime.

Pig butchering scam red flags infographic 2026: Stylized red pig silhouette filled with key scam statistics like $9.3 billion lost, warning signs including deepfakes and stolen photos, and protection tips to avoid cryptocurrency investment fraud

This undercover investigation exposes how pig butchering works: A fake "wealthy sister" steals photos of popular Chinese influencer Yangyang Sweet , flaunts luxury, builds unbreakable trust, then lures victims into bogus crypto platforms.

How cyber crooks trick you into making fake investments

Top 5 Pig Butchering Scam Red Flags

  1. Sudden "friendship" from a wealthy stranger promising to share success.
  2. Stolen photos of attractive influencers (often Asian women in luxury).
  3. Bragging about rapid crypto profits via "family connections."
  4. Pressure to invest on unknown platforms after emotional bonding.
  5. Deepfake video calls or rage when confronted.

The "Unbreakable Friendship" That Started It All

A random connection request sparks messages from "Minlu" – claiming to be a New York cosmetics executive and UPenn grad with a lavish life.

She calls you "sister," shares "personal" charity, spa, Paris trip, and shopping photos. Offers advice, gifts, even Hawaii trips.

But it's engineered to spark envy and deep trust.

The Shocking Reveal: Stolen Photos Exposed

Scammers often steal photos of popular Asian influencers like Yangyang Sweet to create aspirational, believable profiles.

Reverse image searches reveal: The FaceCheck.ID reverse image search results provide clear confirmation that this pic is part of a scam. Red flags explicitly linking the photo to scam tracking websites indicate it's stolen and commonly used in fraud, while the appearance of nine different LinkedIn profiles all featuring the same person but under various names is a classic hallmark of organized scammers recycling identities to target multiple victims simultaneously.

reverse image search results with red flags indicate that the images are used by scammers

The Classic Pig Butchering Playbook

"Minlu" uses the standard script:

  1. Rapid emotional bond – "In my heart, you are my family, dear sister."
  2. Wealth flaunting to inspire aspiration.
  3. "Uncle" at IDG Capital sharing crypto secrets.
  4. Fake profits demos ($53,000 in minutes).
  5. Step-by-step guidance to phony sites like SuperCI, demanding transfers/screenshots.

Deepfake Video Calls: The New Deception

To cement trust, "Minlu" uses live calls – often AI-generated deepfakes with realistic hands and expressions.

When Confronted: The Mask Slips

Challenge the lies? Sweet "sister" turns vicious: "You are nothing but a poor woman."

Account disappears – but photos reappear under new names (Andor, Bella, Yvonne, Amanda Mary).

Behind the Scam: Human Trafficking Compounds

Many operators are trafficked victims forced into fraud at guarded Asian compounds.

Locations of scam centers in Asia

Protect Yourself From Pig Butchering Scams

  1. Reverse image search every new contact's photos
  2. Never invest on unsolicited advice or "guaranteed" profits.
  3. Verify video calls with unpredictable questions.
  4. Avoid sending money/crypto to online contacts.
  5. Report the crime to the appropriate agency.

Suspect a fake profile? Share this article – it could protect someone's savings.

FAQ: Pig Butchering Scams

What is a pig butchering scam?

A long-term fraud where scammers build trust (as friend or romantic interest) before pushing fake crypto investments.

How much have victims lost?

$5.8 billion in U.S. crypto investment fraud in 2024 (FBI), largely from pig butchering – with billions more globally.

Are deepfakes common?

Yes, AI video calls are increasingly used, making hands and faces look real.

How to report?

File immediately at ic3.gov to help stop the networks.

(Updated 2026 with latest FBI IC3 and Chainalysis trends)

In this article, we're going to discuss

Christian Hidayat is a dedicated contributor to FaceCheck's blog, and is passionate about promoting FaceCheck's mission of creating a safer internet for everyone.



Read More on Search by Image


Unlocking the Power of Facial Recognition Technology: 10 Eye-Opening Facts

Facial recognition technology has become a hot topic in recent years, thanks to its many potential applications across a wide range of industries. In this blog post, we'll take a closer look at 10 fascinating facts about facial recognition technology, from how it works to its many applications. How it Works. Facial recognition technology works by analyzing and comparing unique facial features, such as the distance between the eyes and the shape of the nose, with a database of known faces. This...



FaceCheck and PimEyes: Expert Review and Test Scores