Friday, October 3, 2025
Cyber Safety Canada | Scam Shield Digest
  • Login
  • Register
  • Home
  • Latest Scam Alerts
  • Fraud Prevention News
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    Trending Tags

    • romance investment fraud Canada
    • crypto romance scam
    • Chinese State-Sponsored Hacking
  • Cybersecurity Trends
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    grandmother on her computer at home

    The 2025 Cyber Safety Checklist for Seniors

    Trending Tags

    • Nation-State Cyber Threats
    • China Telecom Hack
    • Chinese State-Sponsored Hacking
    • Salt Typhoon China Hack
  • Investment & Retirement Scams
    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers

    🚨 Orange Belgium Hack 2025: 850,000 Customers Impacted in SIM Data Breach – Protect Yourself

    African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

    Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

    Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

    🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

    Trending Tags

    • protect retirement savings online
    • investment scam prevention
    • Nation-State Cyber Threats
    • romance investment fraud Canada
  • Protection Guides
No Result
View All Result
  • Home
  • Latest Scam Alerts
  • Fraud Prevention News
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    Trending Tags

    • romance investment fraud Canada
    • crypto romance scam
    • Chinese State-Sponsored Hacking
  • Cybersecurity Trends
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    grandmother on her computer at home

    The 2025 Cyber Safety Checklist for Seniors

    Trending Tags

    • Nation-State Cyber Threats
    • China Telecom Hack
    • Chinese State-Sponsored Hacking
    • Salt Typhoon China Hack
  • Investment & Retirement Scams
    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers

    🚨 Orange Belgium Hack 2025: 850,000 Customers Impacted in SIM Data Breach – Protect Yourself

    African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

    Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

    Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

    🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

    Trending Tags

    • protect retirement savings online
    • investment scam prevention
    • Nation-State Cyber Threats
    • romance investment fraud Canada
  • Protection Guides
No Result
View All Result
Cyber Safety Canada | Scam Shield Digest
No Result
View All Result
Home Cybersecurity Trends

How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

by Stacey
September 9, 2025
in Cybersecurity Trends, Fraud Prevention News, Latest Scam Alerts, Romance & Dating Scams
Reading Time: 4 mins read
0 0
A A
0
0
SHARES
27
VIEWS
Share on FacebookShare on LinkedInShare on XShare on PinterestShare Via Email
Reading Time: 4 mins read

Table of Contents

This scam, also known as a romance or crypto grooming scam, starts with someone you meet online—often on a dating or social app. They build trust, share fake success stories about crypto profits, and eventually ask you to invest. Once you do, they disappear with your money.
This manipulation is called “pig‑butchering” because scammers focus on wealthy white people (pleasantly referred to as “pink skins”) fattening you with trust before “slaughtering” your savings.

Scam in Action: Real Canadian Context

In 2023, the Canadian Anti‑Fraud Centre (CAFC) reported $309 million in investment fraud alone—a record high. Many scam victims lost completely, with losses sometimes exceeding $1 million per person.

How the Scam Unfolds

  1. Trust Building
    The scammer begins with friendly messages, often using attractive photos and romantic language.

  2. Fake Investment Setup
    They suggest investing in cryptocurrency—setting up fake apps or websites that show “gains.”

  3. Financial Horror
    As you invest more, withdrawal requests are blocked or come with sudden fees. Eventually, the scammer vanishes.

How Big Is the Problem?

  • A University of Texas study found over US $75 billion stolen worldwide in pig‑butchering scams (2020–2024).

  • In 2024 alone, these scams grew 40% compared to the previous year, with deposits up 210%

Why Canadians (Especially Seniors) Should Care

  • Scammers exploit emotional trust and tech confusion.

  • Seniors are often targeted due to loneliness or less digital literacy.

  • Ear-education and awareness are essential—especially as crypto usage grows among older adults

How to Stay Safe

According to the Information Security Branch of British Columbia (OCIO) in their  recent post:

“How to spot and avoid Cryptocons” The rise in these scams is expected to continue, and soon you or someone you know will be targeted. Educate yourself on how to detect and neutralize these scams with the following tips: 

  • Be skeptical.

    • Be cautious in every situation. Don’t rely solely on the advice of someone you met over the internet or who is claiming to be someone you know. These scammers will claim to have guaranteed returns on investments and promises of good fortune. If something seems too good to be true, it probably is.
  • Research before you commit. Before you invest in anything, do some research on what you’re about to invest in.
    • Does it make sense? 
    • Is the exchange platform they want you to use legitimate? 
  • Many of these scammers will direct you to fraudulent exchange sites that their scam syndicate owns.
    • Check the domain registration of the site.
      • Does any of the information on it look fishy?
    • Educate yourself on how crypto works. Learn about the industry of digital currency before investing in it. An educated investor is unlikely to fall for fraudulent investments.
  • Know who you are working with. Don’t ever engage in business with someone you’ve never met face-to-face. Even if the person you think you are in contact with claims to be someone you used to know from the past, verify that it’s them.
    • If they avoid video calls, meeting in person, can’t recall information from your past that they should know, and cut contact immediately.
    • Many scammers will try to impersonate someone from your past. Always make sure you are talking to the person you think you are.
  • Verify the investment company. Verify if investment companies are registered with provincial securities agencies through the National Registration Search tool: Aretheyregistered. “

What to Do If You’ve Been Targeted

  • Report to the Canadian Anti-Fraud Centre.

  • Contact RCMP Seniors Safety.

  • If money was lost, talk to your bank and check holding structures.

  • Reach out to support groups such as Operation Shamrock for scam victims.

Related Posts

  • hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers
    Dynamic Capital Ltd IPO gets oversubscribed by over five times on Day 20
  • African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.
    Credit Suisse just rehired a specialty-finance dealmaker who’s a double boomerang
  • Close up of African American woman entering pin while using ATM machine.
    ABC’s head of AI research outlined the 7 areas the bank is looking to apply the tech
  • grandmother on her computer at home
    The 2025 Cyber Safety Checklist for Seniors
  • Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier
    The biggest shifts and trends driving short- and long-term growth in the future

  • OnlineEasyPay arrives on the online shopping platform ShopOnline.com
Stacey

Stacey

Recommended

Communist China military personnel in a high tech government hacking room work on stealing state secrets from rival countries in hybrid war. Chinese communist criminals and army exploit advanced technology, inflict fear. Camera B.

Communist China’s Telecom Hack with Salt Typhoon That Shook the World

1 month ago
What to Do if a DDoS Attack Disrupts Your Online Service

What to Do if a DDoS Attack Disrupts Your Online Service

3 weeks ago
Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

How to Review and Revoke Connected Apps in 2025: Complete Security Guide

4 weeks ago
hand of parcel delivery man, with qr code

Unsolicited Packages with QR Codes: A New Fraud Risk Canadians Need to Know About

8 months ago
Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

6 months ago
African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

5 months ago

Popular News

  • lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    0 shares
    Share 0 Tweet 0
  • Signs You Might Be a Hidden Victim of Brickstorm: Red Flags & What to Do If You Suspect It

    0 shares
    Share 0 Tweet 0
  • How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    0 shares
    Share 0 Tweet 0
  • What to Do if a DDoS Attack Disrupts Your Online Service

    0 shares
    Share 0 Tweet 0
  • What to Do If Apple Says You’ve Been Targeted by Spyware

    0 shares
    Share 0 Tweet 0

Connect with us

Newsletter

Stay one step ahead of scammers. Get our free weekly ScamShield Digest with the latest alerts and simple safety tips for seniors and families.

Category

  • Critical Infrastructure Security
  • Cybersecurity Trends
  • Fraud Prevention News
  • Investment & Retirement Scams
  • Latest Scam Alerts
  • Nation State Cyber Threats
  • Protection Guides
  • Ransomware & Extortion
  • Romance & Dating Scams
  • Tech Support Scams
  • Telecommunications Security

About Us

ScamShield Digest is part of the Shield IT Training Foundation. We believe online safety is for everyone — especially seniors and families. Our blog, guides, and newsletter are here to inform, protect, and empower.

  • About
  • Advertise
  • Careers
  • Contact

© 2025 ScamShield Digest

Welcome Back!

OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Cybersecurity Trends
  • Latest Scam Alerts
  • Tech Support Scams
  • Romance & Dating Scams
  • Investment & Retirement Scams

© 2025 ScamShield Digest