An Explorative Study of Pig Butchering Scams
- URL: http://arxiv.org/abs/2412.15423v1
- Date: Thu, 19 Dec 2024 22:15:50 GMT
- Title: An Explorative Study of Pig Butchering Scams
- Authors: Bhupendra Acharya, Thorsten Holz,
- Abstract summary: We provide the first comprehensive study of pig-butchering scams from multiple vantage points.
Our study analyzes the direct victims' narratives shared on multiple social media platforms, public abuse report databases, and case studies from news outlets.
In total, we approximated losses of over $521 million related to such scams.
- Score: 18.980991664884556
- License:
- Abstract: In the recent past, so-called pig-butchering scams are on the rise. This term is based on a translation of the Chinese term "Sha Zhu Pan", where scammers refer to victims as "pig" which are to be "fattened up before slaughter" so that scammer can siphon off as much monetary value as possible. In this type of scam, attackers perform social engineering tricks on victims over an extended period to build credibility or relationships. After a certain period, when victims transfer larger amounts of money to scammers, the fraudsters' platforms or profiles go permanently offline and the victims' money is lost. In this work, we provide the first comprehensive study of pig-butchering scams from multiple vantage points. Our study analyzes the direct victims' narratives shared on multiple social media platforms, public abuse report databases, and case studies from news outlets. Between March 2024 to October 2024, we collected data related to pig butchering scams from (i) four social media platforms comprised of more than 430,000 social media accounts and 770,000 posts; (ii) more than 3,200 public abuse reports narratives, and (iii) about 1,000 news articles. Through automated and qualitative evaluation, we provide an evaluation of victims of pig-butchering scams, finding 146 social media scammed users, 2,570 abuse reports narratives, and 50 case studies of 834 souls from news outlets. In total, we approximated losses of over \$521 million related to such scams. To complement this analysis, we performed a survey on crowdsourcing platforms with 584 users to broaden the insights on comparative analysis of pig-butchering scams with other types of scams. Our research highlights that these attacks are sophisticated and often require multiple entities, including policymakers and law enforcement, to work together alongside user education to create a proactive detection of such scams.
Related papers
- Pirates of Charity: Exploring Donation-based Abuses in Social Media Platforms [15.45960607413968]
We conduct a large-scale analysis of donation-based scams on social media platforms.
We identified 832 scammers using various techniques to deceive users into making fraudulent donations.
Our study highlights significant weaknesses in social media platforms' ability to protect users from fraudulent donations.
arXiv Detail & Related papers (2024-12-20T07:26:43Z) - A Survey of Scam Exposure, Victimization, Types, Vectors, and Reporting in 12 Countries [3.2545498077804083]
The present study addresses this gap through a nationally representative survey on scam exposure, victimization, types, vectors, and reporting in 12 countries.
We find, first, that residents of less affluent countries suffer financial loss from scams more often.
Second, we find that the internet plays a key role in scams across the globe, and that GNI per-capita is strongly associated with specific scam types and contact vectors.
arXiv Detail & Related papers (2024-07-17T14:35:56Z) - Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates [8.24724427283375]
We study how cryptocurrency giveaway scams operate at scale.
We find that 1 in 1000 scam tweets, and 4 in 100,000 livestream views, net a victim.
Scammers managed to extract nearly $4.62 million from just hundreds of victims.
arXiv Detail & Related papers (2024-05-16T01:50:50Z) - Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams [19.802676243375615]
There is an increase in an emerging fraud trend called cryptocurrency-based technical support scam.
We present an analysis apparatus called HoneyTweet to analyze this kind of scam.
arXiv Detail & Related papers (2024-01-18T09:31:45Z) - Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild [4.129433926074777]
This paper presents the first comprehensive analysis of an emerging cryptocurrency scam named "arbitrage bot" disseminated on online social networks.
The scam revolves around Decentralized Exchanges (DEX) arbitrage and aims to lure victims into executing a so-called "bot contract" to steal funds from them.
To collect the scam at a large scale, we developed a fully automated scam detection system named CryptoScamHunter.
arXiv Detail & Related papers (2023-10-18T20:13:17Z) - ManiTweet: A New Benchmark for Identifying Manipulation of News on Social Media [74.93847489218008]
We present a novel task, identifying manipulation of news on social media, which aims to detect manipulation in social media posts and identify manipulated or inserted information.
To study this task, we have proposed a data collection schema and curated a dataset called ManiTweet, consisting of 3.6K pairs of tweets and corresponding articles.
Our analysis demonstrates that this task is highly challenging, with large language models (LLMs) yielding unsatisfactory performance.
arXiv Detail & Related papers (2023-05-23T16:40:07Z) - Tainted Love: A Systematic Review of Online Romance Fraud [68.8204255655161]
Romance fraud involves cybercriminals engineering a romantic relationship on online dating platforms.
We characterise the literary landscape on romance fraud, advancing the understanding of researchers and practitioners.
Three main contributions were identified: profiles of romance scams, countermeasures for mitigating romance scams, and factors that predispose an individual to become a scammer or a victim.
arXiv Detail & Related papers (2023-02-28T20:34:07Z) - Uncovering the Dark Side of Telegram: Fakes, Clones, Scams, and
Conspiracy Movements [67.39353554498636]
We perform a large-scale analysis of Telegram by collecting 35,382 different channels and over 130,000,000 messages.
We find some of the infamous activities also present on privacy-preserving services of the Dark Web, such as carding.
We propose a machine learning model that is able to identify fake channels with an accuracy of 86%.
arXiv Detail & Related papers (2021-11-26T14:53:31Z) - Echo Chambers on Social Media: A comparative analysis [64.2256216637683]
We introduce an operational definition of echo chambers and perform a massive comparative analysis on 1B pieces of contents produced by 1M users on four social media platforms.
We infer the leaning of users about controversial topics and reconstruct their interaction networks by analyzing different features.
We find support for the hypothesis that platforms implementing news feed algorithms like Facebook may elicit the emergence of echo-chambers.
arXiv Detail & Related papers (2020-04-20T20:00:27Z) - Whose Tweets are Surveilled for the Police: An Audit of Social-Media
Monitoring Tool via Log Files [69.02688684221265]
We obtained log files from the Corvallis (Oregon) Police Department's use of social media monitoring software called DigitalStakeout.
These log files include the results of proprietary searches by DigitalStakeout that were running over a period of 13 months and include 7240 social media posts.
We observe differences in the demographics of the users whose Tweets are flagged by DigitalStakeout compared to the demographics of the Twitter users in the region.
arXiv Detail & Related papers (2020-01-23T19:35:12Z) - #MeToo on Campus: Studying College Sexual Assault at Scale Using Data
Reported on Social Media [71.74529365205053]
We analyze the influence of the # trend on a pool of college followers.
The results show that the majority of topics embedded in those # tweets detail sexual harassment stories.
There exists a significant correlation between the prevalence of this trend and official reports on several major geographical regions.
arXiv Detail & Related papers (2020-01-16T18:05:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.