Tuesday, June 24, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Threats & Breaches 

Home » Security Bloggers Network » Fraud schemes explained: Proxy Phantom, Pig Butchering, and Crypto Cashout

SBN

Fraud schemes explained: Proxy Phantom, Pig Butchering, and Crypto Cashout

by Sift Trust and Safety Team on August 16, 2023

The battle against digital fraud intensifies every day. Among the countless threats that lurk on the internet, increasingly advanced fraud schemes and organized fraud rings loom large as risks to the trust and safety of businesses and consumers.

As cybercriminals continuously refine their tactics, businesses must remain proactive in bolstering their defenses to protect users from the dangers of fraud. In this blog, we delve into the world of fraud schemes and provide best practices for protecting users from these attacks.

What is Proxy Phantom?

In recent years, Sift discovered a sophisticated attack dubbed “Proxy Phantom,” a fraud ring that spanned across multiple large IP clusters within the Sift global network. Proxy Phantom was targeting e-commerce businesses around the world, unleashing waves of large-scale account takeover (ATO) attacks. Proxy Phantom leveraged a network of proxy servers to conceal the true source of their attacks, making it challenging for security teams to trace and block their malicious activities.

Techstrong Gang Youtube
AWS Hub

Sift developed an interactive visualization that provided crucial insights into the Proxy Phantom fraud ring’s operations. The visualization depicted the interconnected web of proxy servers used by the attackers, giving investigators a comprehensive view of the attack infrastructure. This valuable visualization allowed security experts to identify patterns, trace connections, and ultimately thwart the malicious campaign.

What is Pig Butchering?

“Pig Butchering” is a romance scam that preys on vulnerable individuals through dating apps, manipulating them to invest into a fake cryptocurrency exchange.

Pig Butchering begins with a scammer creating a fraudulent profile on a dating app, often using stolen photos to appear genuine. Once the scammer matches with a victim, they move the conversation to a private, encrypted messaging platform.

After building a sense of trust through emotional manipulation, the conversation takes a turn toward cryptocurrency investing. The scammer fabricates false profits on a phony platform, offering their victim the opportunity to invest.

Once the victim has invested a substantial amount of money, the scammer seizes the opportunity to vanish into thin air, cutting off all communication. The victim is left devastated, realizing they have fallen victim to an elaborate and heartless scam.

Listen to our Pig Butchering podcast with Jane Lee, Trust and Safety Architect at Sift, who went undercover to expose how these fraudsters were operating the scam.  

What is Crypto Cashout?

“Crypto Cashout” is a fraud scheme that involves a partnership between two fraudsters to obtain stolen funds. The collaboration between fraudsters involves accessing compromised bank accounts, crypto wallets, and crypto exchange accounts to launder money, making it difficult for authorities to trace and recover.

A crypto cashout begins when Fraudster A obtains access to stolen funds; they take to private messaging apps like Telegram to solicit a partner to access bank and crypto accounts. Once a partnership is forged, Fraudster A sends the illicit funds into Fraudster B’s compromised bank account, then Fraudster B transfers the funds from the bank account to a stolen crypto exchange account or wallet.

Fraudster B can further obfuscate their tracks by withdrawing the stolen funds from the crypto exchange to an offline wallet, which is much more challenging for law enforcement to trace. Finally, the fraudsters divide the spoils, ensuring each participant gets a cut of the stolen funds. 

How to prevent emerging fraud from impacting your business

Protecting users from fraud schemes like Proxy Phantom, Pig Butchering, and Crypto Cashout is essential for the integrity of online businesses. To proactively secure customer accounts, trust and safety teams need holistic risk assessment methods and an end-to-end solution to accurately surface and prevent fraud. Here are some best practices you can implement to protect your business and users against these attacks:

  • User authentication: Implement multi-factor authentication (MFA) to prevent unauthorized access, reducing the risk of ATO attacks like Proxy Phantom and Crypto Cashout. Solutions like Sift Account Defense help teams instantly identify large-scale, bot-based account attacks with ease and confidence using a full suite of built-in MFA tools.
  • Continuous monitoring: Advanced fraud detection systems can continuously monitor user activity and transactions for suspicious behavior. Early detection of anomalies can thwart romance scams like Pig Butchering before they move off-site. Sift Content Integrity, for example, helps businesses easily identify phishing scams and spammy text, investigate related content, and take bulk actions to maintain platform integrity.
  • User education: Educate users about the potential risks and common fraud schemes associated with online interactions.
  • Know Your Customer (KYC): Financial services should enforce robust verification and KYC procedures to verify user identities, which can help prevent money laundering attempts.

Employing advanced fraud detection technologies, educating users, and collaborating with cybersecurity experts form the pillars of a robust fraud prevention strategy. By embracing these measures and continuously improving their security practices, online businesses can effectively protect their users, maintain trust, and uphold the integrity of their digital platforms in the face of ever-evolving fraud threats.

See more fraud schemes on our Fraud Intelligence Center. 

The post Fraud schemes explained: Proxy Phantom, Pig Butchering, and Crypto Cashout appeared first on Sift Blog.

*** This is a Security Bloggers Network syndicated blog from Sift Blog authored by Sift Trust and Safety Team. Read the original post at: https://blog.sift.com/fraud-schemes-explained-proxy-phantom-pig-butchering-and-crypto-cashout/?utm_source=rss&utm_medium=rss&utm_campaign=fraud-schemes-explained-proxy-phantom-pig-butchering-and-crypto-cashout

August 16, 2023August 16, 2023 Sift Trust and Safety Team account takeovers, crypto cashout, Data & Insights, Fraud, fraud rings, fraud schemes, pig butchering, proxy phantom
  • ← Data Resilience, Insights, Action! Recapping Splunk .conf 2023
  • CIAM for Digital Marketers: The Key to Nurture & Convert Leads →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
Is Your CISO Ready to Flee? 
Scattered Spider Targets Aflac, Other Insurance Companies
AWS Raises Expertise Bar for MSSP Partners
Your passwords are everywhere: What the massive 16 billion login leak means for you
Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security | Impart Security
The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive
Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google Catches Pro-Russia Hackers Impersonating Feds
Top 7 Ambient Listening AI Tools Revolutionizing Healthcare in 2025

Industry Spotlight

WhatsApp BANNED by House Security Goons — But Why?
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

WhatsApp BANNED by House Security Goons — But Why?

June 24, 2025 Richi Jennings | 1 hour ago 0
Scattered Spider Targets Aflac, Other Insurance Companies
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

Scattered Spider Targets Aflac, Other Insurance Companies

June 22, 2025 Jeffrey Burt | 1 day ago 0
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Analytics & Intelligence Blockchain Cyberlaw Cybersecurity Data Privacy Digital Currency Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

June 20, 2025 Richi Jennings | 3 days ago 0

Top Stories

DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs
AI and Machine Learning in Security AI and ML in Security Cybersecurity Featured Governance, Risk & Compliance News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs

June 24, 2025 John D. Boyle | 5 hours ago 0
16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat

June 22, 2025 Jeffrey Burt | 2 days ago 0
AWS Raises Expertise Bar for MSSP Partners
AI and Machine Learning in Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

AWS Raises Expertise Bar for MSSP Partners

June 22, 2025 Michael Vizard | 2 days ago 0

Security Humor

amie Crotts, the Chief Information Officer for the U.S. House of Representatives.

WhatsApp BANNED by House Security Goons — But Why?

Download Free eBook

7 Must-Read eBooks for Security Professionals

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×