INTERPOL urges end to 'Pig Butchering' term, cites harm to online victims

December 23, 2024

Many people are now familiar with the term Pig Butchering, whether from observing the news or from painful personal experience. Based on an original Chinese term used by hackers, the term refers to identifying a potential target, or pig, and “fattening them up”, i.e. luring them into a fake romance or friendship, before convincing them to send them money or participate in some fraudulent investment scheme, which is the so-called “butchering.” Being the victim of such schemes is no doubt emotionally traumatizing, and worse, embarrassing. INTERPOL is concerned that this embarrassment keeps victims from coming forward, and causes great emotional and psychological harm. They may have a point: multiple cases exist where individuals who have been victimized by these scams and lost large sums of money have gone on to take their own lives.

For these reasons and others, INTERPOL has urged a change in terminology regard these con artist schemes. Rather than referring to them as Pig Butchering, which shames the victim by referring to them as a pig, the agency now prefers the more neutral term “romance baiting.” In a public statement, INTERPOL Acting Executive Director of Police Services Cyril Gout said that choice of words can have a significant effect in the reporting of crimes. Romance baiting has many elements in common with crimes such as sexual abuse, domestic abuse, or online child exploitation that make it harder for victims to come forward. By changing terminology to focus more on the fraudsters and encouraging people to come forward without shame, it becomes more likely that these crimes can be brought home to their culprits. This change in terminology is part of INTERPOL’s Think Twice campaign, intended to raise awareness about major online threats such as ransomware, malware, phishing, AI fraud, and romance baiting.

More from Blackwired

April 9, 2025

Hunters International Dumps Ransomware, Goes Full-on Extortion

Ransomware groups shift to data privacy extortion as law enforcement and reduced profits make double-extortion less viable.

Read more
April 2, 2025

How SSL Misconfigurations Impact Your Attack Surface

SSL misconfigurations increase cyber risks. EASM platforms offer continuous monitoring to detect and address vulnerabilities effectively.

Read more
March 26, 2025

Deceptive Signatures: Advanced Techniques in BEC Attacks

BEC attacks use email signature tampering to hide phishing links, bypassing security; companies should monitor signature changes.

Read more