{"id":12363,"date":"2025-10-09T05:55:14","date_gmt":"2025-10-09T12:55:14","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12363"},"modified":"2025-10-10T13:59:10","modified_gmt":"2025-10-10T20:59:10","slug":"pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/","title":{"rendered":"Pig Butchering Scams and Their DNS Trail: Linking Threats to Malicious Compounds"},"content":{"rendered":"<h3><strong>Author: Ma\u00ebl Le Touz and John W\u00f2jcik<\/strong><\/h3>\n<p>&nbsp;<br \/>\nAfter uncovering Vigorish Viper in June of 2024, we kept following the DNS trail and have discovered dozens of other actors involved in illegal activities in Southeast Asia. While we spend our days knee-deep in domains related to these threats, there is a rich human story behind the scenes. This blog provides a sneak peek of what we\u2019ve learnt about the ecosystem surrounding illegal gambling in the region over the past 18 months.<\/p>\n<h3>Background<\/h3>\n<p>Chinese-speaking criminal groups have been involved in gambling and the drug trade for decades, and have long had a footprint in Southeast Asia. In recent years, however, they have rapidly scaled up their involvement in cyber-enabled fraud, generating tens of billions of dollars in financial losses for victims around the world. In the United States alone, authorities reported more than USD $5.6 billion in financial losses to cryptocurrency scams in 2023, with an estimated USD $4.4 billion attributed to so-called \u201cpig butchering\u201d schemes most prevalent in Southeast Asia.<sup>1<\/sup> Regionally, countries in East and Southeast Asia combined have lost up to an estimated USD $37 billion to cyber-enabled fraud during that same year, according to latest available data, with much larger estimated losses being reported globally.<sup>2<\/sup><\/p>\n<p>Powerful criminal groups based out of Southeast Asia have quietly taken control of some of the most vulnerable parts of the region to conduct these industrial-scale operations, infiltrating or even establishing so-called Special Economic Zones (SEZs). In recent years, it has become clear that many of the region\u2019s SEZs, alongside casinos, hotels, and other business parks and property developments infiltrated by Asian crime syndicates, have evolved into sprawling citadels of organized crime\u2014lawless enclaves where scam centers, modern slavery, and illicit finance converge under the veneer of legitimate development.<\/p>\n<p>These zones, often touted as engines of economic growth, have emerged as fortress-like strongholds for sophisticated transnational Asian crime syndicates, complete with their own armed security, entertainment, criminal service providers, and more. Within their walls, entire industries of exploitation thrive: human trafficking pipelines feed captive workforces, high-tech fraud operations siphon billions from victims worldwide, blurring the boundaries between state authority and criminal enterprise while fundamentally reshaping the regional cyberthreat landscape. <\/p>\n<p>As these criminal enclaves continue to expand, investigators face steep challenges in disrupting them, thanks to fraud schemes like pig butchering and the fluid, decentralized networks behind them designed to evade detection at every level. This has not only allowed pig butchering to thrive in the blind spots of traditional threat hunting methods, but has allowed these operations to adapt and deliver fraud content at scale with remarkable speed.  <\/p>\n<p>Schemes like pig butchering leave an unusually faint digital footprint: a single fraudulent website can be enough to siphon millions of dollars, and most victim outreach occurs through private messaging platforms, generating little public evidence to track. At the same time, while individual scams may not require deep technical sophistication, executing them at scale does\u2014demanding robust backend infrastructure and a broader criminal service ecosystem to identify and social engineer targets, sustain deception campaigns, streamline technical workflows, and launder vast volumes of illicit funds. <\/p>\n<p>In light of this, rather than listing domain names or crypto wallets, the below analysis serves as an introduction to a series of short releases focusing on pig butchering scams originating from Asia, highlighting how DNS can be used to track the criminal networks responsible and map out parts of their online infrastructure. <\/p>\n<p>Using this approach, we examine scam campaigns originating from two infamous compounds\u2014Laos\u2019 Golden Triangle Special Economic Zone (GTSEZ) and Myanmar\u2019s KK Park\u2014and offer insights into a recent high-profile case currently being prosecuted in the United States. In doing so, we also describe the tactics, techniques, and procedures (TTPs) the scammers have used to dupe their victims and set up their infrastructure. <\/p>\n<p>In both cases examined below, Infoblox has detected hundreds of near-identical websites registered and deployed by the criminals. That said, the criminal networks behind those campaigns remain active and continue to attract potential victims via social media and registration of new domains. <\/p>\n<h3>What Is Pig Butchering?<\/h3>\n<p>Pig butchering, known in Chinese as \u201cSh\u0101 Zh\u016b P\u00e1n\u201d (\u6740\u732a\u76d8) is a prolonged investment fraud or long-con where criminals entice victims into depositing ever-larger sums into sham platforms and accounts, frequently tied to cryptocurrencies. It first took root in countries of East and Southeast Asia, where criminal groups have a long history of running sophisticated organized fraud operations. The term describes the process of \u201cfattening up\u201d victims with trust and false promises before ultimately \u201cslaughtering\u201d their savings. Here\u2019s how the scheme typically unfolds: <\/p>\n<ul>\n<li>Scammers initiate contact with victims through dating apps, social media platforms, or private messaging services like WhatsApp. Relationships between scammers and victims may include friendship, romance, or investment mentorship. <\/li>\n<li>After establishing rapport, they steer the conversation toward supposed investment opportunities as well as other schemes, including fake job offers or task scams, often tied to cryptocurrency markets.<\/li>\n<li>Victims are gradually persuaded to commit ever larger sums into fraudulent platforms which display huge profits, only to see everything vanish once the criminals get a sense that the victim has deposited everything they can and abscond. <\/li>\n<\/ul>\n<p>Central to the scam is psychological manipulation: perpetrators cultivate emotional bonds, instill confidence, and in some cases even simulate romantic relationships. This drawn-out grooming process lowers victims\u2019 defenses and primes them to believe in promises of extraordinary returns, leading to devastating financial losses. <\/p>\n<p>These schemes are predominantly run out of criminally controlled areas scattered across Southeast Asia, particularly congregating around SEZs such as the GTSEZ (see Figure 1 below) which have been established in vulnerable borderlands and militia-controlled territories where thousands of people have been lured and forced to scam. See Figure 2.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-1.png\" alt=\"Figure 1. The GTSEZ, an entire city dedicated to criminal activity, leisure and entertainment (UNODC, 2024) \" width=\"940\" height=\"490\" class=\"alignnone size-full wp-image-12378\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-1.png 940w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-1-300x156.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-1-768x400.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/p>\n<p class=\"image-caption\">Figure 1. The GTSEZ, an entire city dedicated to criminal activity, leisure and entertainment (UNODC, 2024) <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-2.png\" alt=\"Figure 2. Locations of known or reported scam centers in the Mekong region, 2023 \u2013 2025 (UNODC, 2025) \" width=\"618\" height=\"771\" class=\"alignnone size-full wp-image-12377\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-2.png 618w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-2-240x300.png 240w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/p>\n<p class=\"image-caption\">Figure 2. Locations of known or reported scam centers in the Mekong region, 2023 \u2013 2025 (UNODC, 2025) <\/p>\n<p><strong>Golden Triangle Special Economic Zone<\/strong><\/p>\n<p>Representing one of the most prolific cyber-enabled fraud hubs in Southeast Asia, the GTSEZ is a 3,000-hectare zone in Laos located at the border with Thailand and Myanmar (listed as Bokeo in Figure 2). In 2007, the Kings Romans Group was awarded a special 99-year lease by the Laos government to develop the zone. However, the area is de facto under the control of senior triad leader Zhao Wei (\u8d75\u4f1f), who is currently subject to U.S. treasury sanctions (see Figure 3), accused of crimes including money laundering, child sexual abuse, as well as human, drug, and\u202fwildlife trafficking. For good measure, in 2023, Zhao announced the launch of his own airport while also securing concessions for three islands off the coast of neighboring Cambodia\u2019s infamous crime hub, Sihanoukville, using his newly acquired Cambodian citizenship.<sup>3,4<\/sup><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-3.png\" alt=\"Figure 3. Zhao Wei Transnational Criminal Organization (OFAC, 2018) \" width=\"817\" height=\"586\" class=\"alignnone size-full wp-image-12376\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-3.png 817w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-3-300x215.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-3-768x551.png 768w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/p>\n<p class=\"image-caption\">Figure 3. Zhao Wei Transnational Criminal Organization (OFAC, 2018) <\/p>\n<p>Zhao has incorporated dozens of companies and has links to an extensive network of shell companies around the world. Among his greatest operational security (OpSec) fails, however, has been his Landun or Blue Shield brand, which relates to the group\u2019s land-based casino, online gambling, logistics, transportation, property development, and investment portfolios. In reality, the criminal conglomerate runs diversified money laundering, underground banking, and cyber-enabled fraud operations, which operate internationally on an industrial scale. This is most apparent through examination of Kings Romans\u2019 Landun Gaming trademark, which was recently tied to a significant pig butchering scheme reported by the Taiwanese police and UNODC (see Figures 4, 5, and 6).<sup>5,6<\/sup><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-4.png\" alt=\"Figure 4. Intellectual property corresponding to Landun Gaming registered by Kings Romans Casino and Entertainment Co. Ltd in various jurisdictions, 2025 \" width=\"891\" height=\"323\" class=\"alignnone size-full wp-image-12375\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-4.png 891w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-4-300x109.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-4-768x278.png 768w\" sizes=\"auto, (max-width: 891px) 100vw, 891px\" \/><\/p>\n<p class=\"image-caption\">Figure 4. Intellectual property corresponding to Landun Gaming registered by Kings Romans Casino and Entertainment Co. Ltd in various jurisdictions, 2025 <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-5.png\" alt=\"Figure 5. Screenshot of Landun Global Investment platform reported by victims of online fraud, 2025 \" width=\"881\" height=\"525\" class=\"alignnone size-full wp-image-12374\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-5.png 881w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-5-300x179.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-5-768x458.png 768w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><\/p>\n<p class=\"image-caption\">Figure 5. Screenshot of Landun Global Investment platform reported by victims of online fraud, 2025 <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-6.png\" alt=\"Figure 6. Taiwan National Police Cyber-Enabled Fraud dashboard, which lists pig butchering-related domains and corresponding investment platforms, the majority of which have also been identified by our research as malicious (2025) \" width=\"892\" height=\"447\" class=\"alignnone size-full wp-image-12373\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-6.png 892w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-6-300x150.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-6-768x385.png 768w\" sizes=\"auto, (max-width: 892px) 100vw, 892px\" \/> <\/p>\n<p class=\"image-caption\">Figure 6. Taiwan National Police Cyber-Enabled Fraud dashboard, which lists pig butchering-related domains and corresponding investment platforms, the majority of which have also been identified by our research as malicious (2025) <\/p>\n<p>Using these starting points, we were able to trace one of the fraudulent Landun Investment websites reported by multiple fraud victims back to a cluster of hundreds of similar pig butchering domains pushing a mix of fraudulent foreign exchange, crypto investment, wealth management, and online gambling platforms.\u202f <\/p>\n<p>While the network tried to use public cloud proxies and hosting, hoping to obfuscate their trail and hide in the sea of legitimate traffic, they did not excel at covering their online tracks. That said, they have now switched to using Cloudflare. The scam domains they operate are briefly hosted on specific IPs before being shielded by the Cloudflare proxy, which is consistent across different campaigns. This unique pattern allowed our researchers to detect dozens of websites through passive DNS (pDNS), tying back to websites linked to numerous Hong Kong and UK front companies registered at PO boxes and incorporated by Chinese nominees. Addresses used by the only two UK-registered Landun entities in existence trace back to PO boxes that have been used as domiciles for more than 13,000 companies in total. The majority of those companies are linked to widespread complaints and warnings issued by authorities and victims alike, with several tracing back to our cluster. <\/p>\n<p>One entity relates to Carrod Securities Co Ltd, which has been widely reported by fraud victims online and formally implicated as part of a high-profile pig butchering case in Delaware (Figures 7 and 8).7 Victims of the trading platform described a typical pig butchering scheme whereby they were encouraged to continue increasing their initial investments until finally attempting to withdraw their apparent profits. Users would subsequently lose account access and all contact with platform administrators. Dozens of complaints online indicate that Carrod Securities targeted victims from Canada, Europe, the United Kingdom, and the United States, among other countries. DNS records reveal upward of 350 unique domains are part of the broader fraud network. The same website template has been used by the cluster since at least 2017. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-7.png\" alt=\"Figure 7. Screen capture of Carrod Securities\u2019 fraudulent investment platform (Source: DomainTools) \" width=\"875\" height=\"679\" class=\"alignnone size-full wp-image-12372\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-7.png 875w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-7-300x233.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-7-768x596.png 768w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/p>\n<p class=\"image-caption\">Figure 7. Screen capture of Carrod Securities\u2019 fraudulent investment platform (Source: DomainTools) <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-8.png\" alt=\"Figure 8. Screen capture of text messages sent between Carrod Securities affiliate and online fraud victim shared, 2023 \" width=\"273\" height=\"464\" class=\"alignnone size-full wp-image-12371\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-8.png 273w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-8-177x300.png 177w\" sizes=\"auto, (max-width: 273px) 100vw, 273px\" \/><\/p>\n<p class=\"image-caption\">Figure 8. Screen capture of text messages sent between Carrod Securities affiliate and online fraud victim shared, 2023 <\/p>\n<p><strong>KK Park<\/strong><\/p>\n<p>Located near Myawaddy, on the Myanmar\/Burmese border with Thailand, KK Park is an infamous scam and casino compound operated by a large Chinese-speaking criminal network linked to senior triad leader, Wan Kuok-Koi (\u5c39\u570b\u99d2), better known as \u201cBroken Tooth.\u201d <\/p>\n<p>Similar to the forced labor conditions found within many GTSEZ operations, the conditions within KK Park are reportedly among the worst in the region. Testimonies from survivors consistently describe 18-hour working days and rigid performance quotas. Victims are incentivized to meet their quotas through systematic public beatings, electrocution, as well as various forms of sexual violence and abuse.  <\/p>\n<p>The compound is secured by heavily armed local militia forces, surrounded by layers of barbed wire fences, monitored by CCTV surveillance, has bars on the dormitory windows, and the strictly enforced communication and mobility protocols prevent workers from contacting the outside world for help or coordinating escapes. Those who fail to comply suffer devastating consequences. <\/p>\n<p>Despite years of international pressure from human rights groups and governments around the world\u2014including power and internet cuts by neighboring Thailand, and U.S. sanctions related to billions of dollars in losses\u2014 the compounds have continued their rapid expansion, as shown in Figure 9.\u202f But what do these operations really look like online? <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-9.png\" alt=\"Figure 9. KK Park\u2019s expansion over the last several years (Source: UNODC) \" width=\"954\" height=\"308\" class=\"alignnone size-full wp-image-12370\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-9.png 954w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-9-300x97.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-9-768x248.png 768w\" sizes=\"auto, (max-width: 954px) 100vw, 954px\" \/><\/p>\n<p class=\"image-caption\">Figure 9. KK Park\u2019s expansion over the last several years (Source: UNODC) <\/p>\n<p>In a recent high-profile report by investigative journalists at Mizzima, a leading independent Myanmar media organization, investigators identified several pig butchering domains that we used as our starting point, attempting to replicate and build on their initial analysis, using our own data. Lo and behold, we quickly identified hundreds of identical websites dedicated to a robust network of online scams and money laundering at scale. <\/p>\n<p>Due to the scammers reusing the same website templates (see Figures 10 and 11),  Infoblox Threat Intel was able to identify hundreds of similar pig butchering domains, as with networks operating out of the GTSEZ. These domains all use the same code and naming patterns: only the default language and cryptocurrency wallet addresses change.  <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-10.png\" alt=\"Figure 10. Capture of ethmp[.]net mentioned in the Mizzima investigation \" width=\"724\" height=\"541\" class=\"alignnone size-full wp-image-12369\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-10.png 724w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-10-300x224.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/p>\n<p class=\"image-caption\">Figure 10. Capture of ethmp[.]net mentioned in the Mizzima investigation <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-11.png\" alt=\"Figure 11. Other variations of the ethmp template, using an AI chatbot for \u201ccustomer\u201d (victim) support \" width=\"961\" height=\"722\" class=\"alignnone size-full wp-image-12368\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-11.png 961w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-11-300x225.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-11-768x577.png 768w\" sizes=\"auto, (max-width: 961px) 100vw, 961px\" \/><\/p>\n<p class=\"image-caption\">Figure 11. Other variations of the ethmp template, using an AI chatbot for \u201ccustomer\u201d (victim) support <\/p>\n<p>Making use of another significant OpSec fail, we were able to gain access to victim-facing pages containing rotating deposit wallet addresses used by the scammers. Coincidentally (not really) many of these addresses were also referenced by victims of human trafficking in connection to phishing and no-KYC (know your customer) crypto casinos, presumably utilized and integrated into the network\u2019s operations for money laundering purposes.\u202fTheir presence is not accidental. Systematically, the KK Park operators will launder the revenue from pig butchering through crypto casinos, including the Hash Bet 28 online casino as shown below in Figure 12.<sup>8<\/sup><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/pig-butchering-scams-fig-12.png\" alt=\"Figure 12. A gambling website used by KK Park to launder their crypto gains \" width=\"721\" height=\"704\" class=\"alignnone size-full wp-image-12367\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-12.png 721w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-scams-fig-12-300x293.png 300w\" sizes=\"auto, (max-width: 721px) 100vw, 721px\" \/><\/p>\n<p class=\"image-caption\">Figure 12. A gambling website used by KK Park to launder their crypto gains <\/p>\n<p>These anonymous crypto casinos are a far cry from the sophisticated offerings of Vigorish Viper\u2014only offering sports betting, live baccarat, scratch games, etc.\u2014and are actually very crude. They are a simple way to clean, layer, and obscure the nature of dirty money without resorting to expensive third-party games, cleverly using the blockchain itself to determine random outcomes.   <\/p>\n<p>In this particular model, players deposit their \u201cbets\u201d anonymously into a given wallet and proceed to bet on the last digit of the next blockchain hash. Will it be even? Greater than five? And so forth. By way of a smart contract, a bot will analyze the results in real time to determine the winners and split the winnings.\u202fNo player interaction is needed, and any losses are simply factored into the scammer\u2019s cost of doing business. All one needs is a crypto wallet and some time. Since the odds are fixed, like roulette, the cost of laundering money is consistent and generally negligible.<\/p>\n<p>The fraud network can systematically cycle their criminal proceeds through these platforms for hours\u2014a process sometimes referred to as \u201cchip dumping\u201d\u2014before ultimately cashing out or moving the funds further along the laundering chain. On sites that support multi-player gambling, scammers can also stage deliberate losses, transferring large portions of stolen funds to collaborating accounts under the guise of legitimate play. Together, these methods not only make victim funds far more difficult to trace, but also provide criminals with a ready-made cover story for their otherwise inexplicable wealth. When challenged, they can simply point to gambling \u201cwinnings\u201d\u2014a claim difficult to disprove given that these casinos are typically registered offshore, deliberately opaque, and rarely compliant with law enforcement requests. <\/p>\n<h3>Pig Butchering-as-a-Service<\/h3>\n<p>Unsurprisingly, the abovementioned examples both show strong signs of leveraging a pig butchering-as-a-service (PBaaS) model, through which online fraud operators can systematically push and deliver fraud content to targets at scale. While these types of operations will be explored in greater depth in a future article, the approach has supercharged the ongoing crisis, proving highly effective in providing criminal groups with the ability to lower costs and automate setup through ready-made infrastructure. This includes prebuilt scam websites, investment platforms, laundering methods, and scripted chat playbooks, as well as scalable targeting mechanisms that allow low-skill actors to reach large pools of victims with ease. Moreover, PBaaS has resulted in scam infrastructure becoming so cheap and replicable that a domain is treated as a single-use asset, rendering domain-by-domain blocking functionally obsolete. <\/p>\n<p>By commoditizing the tools, narratives, and workflows of pig butchering and other related scams, these service providers have dramatically lowered the barriers to entry for would-be criminals and amplified the overall reach and persistence of the fraud ecosystem in and increasingly beyond Southeast Asia, warranting deeper examination of the networks behind them. <\/p>\n<h3>Conclusion and Future Trends <\/h3>\n<p>As highlighted throughout this article, pig butchering has exploded into an industrialized fraud economy generating tens of billions of dollars annually. Sophisticated Asian crime syndicates have proven adept at spinning up hundreds of disposable websites in minutes, overwhelming governments that cannot detect or block them fast enough to shield victims. Arrests and takedowns, when they happen at all, struggle to impact the stream of new domains and cloned platforms pushed out daily by syndicates operating from fortress-like compounds in the region. DNS has thus become a decisive battleground, with every scam domain, no matter how disposable, having to resolve in order to reach its victims. By identifying shared templates, resolution patterns, and network-level fingerprints, defenders and researchers alike can effectively disrupt thousands of scam domains at scale.  <\/p>\n<p>As highlighted in our case studies, domains traced back to Southeast Asia\u2019s scam centers exhibit consistent reuse of hosting infrastructure and DNS configurations across fraudulent investment sites, allowing entire clusters of pig butchering domains to be efficiently flagged and potentially neutralized. <\/p>\n<h3 style=\"font-size:18px;\">Footnotes<\/h3>\n<ol style=\"font-size:14px;\">\n<li>\n    <em>2023 Internet Crime Report, Internet Crime Complaint Center (IC3)<\/em>, Federal Bureau of Investigation, 2023. <a href=\"https:\/\/www.ic3.gov\/annualreport\/reports\/2023_ic3report.pdf\" target=\"_blank\"><br \/>\n      https:\/\/www.ic3.gov\/annualreport\/reports\/2023_ic3report.pdf<br \/>\n    <\/a>\n  <\/li>\n<li>\n    <em>Transnational Organized Crime and the Convergence of Cyber-Enabled Fraud, Underground Banking and Technological Innovation in Southeast Asia<\/em>: A Shifting Threat Landscape, United Nations Office on Drugs and Crime (UNODC), October 2024. <a href=\"https:\/\/www.unodc.org\/roseap\/uploads\/documents\/Publications\/2024\/TOC_Convergence_Report_2024.pdf\" target=\"_blank\"><br \/>\n      https:\/\/www.unodc.org\/roseap\/uploads\/documents\/Publications\/2024\/TOC_Convergence_Report_2024.pdf<br \/>\n    <\/a>\n  <\/li>\n<li>\n    Casinos, Money Laundering, Underground Banking and Transnational Organized Crime in East and Southeast Asia: A Hidden and Accelerating Threat, UNODC, January 2024.\n  <\/li>\n<li>\n    Osiano Trading Sole Co., Media Release, 2022.\n  <\/li>\n<li>\n   Taiwan National Police Agency, Ministry of Interior of Taiwan, Online Fraud Alert Bulletin, \u7063\u8b66\u653f\u7f72165\u9632\u9a19\u7db2111\/7\/18-111\/7\/24\u6c11\u773e\u901a\u5831\u5047\u6295\u8cc7(\u535a\u5f08)\u8a50\u9a19\u7db2\u7ad9. <a href=\"https:\/\/165.npa.gov.tw\/\" target=\"_blank\"><br \/>\n       https:\/\/165.npa.gov.tw\/<br \/>\n    <\/a>\n  <\/li>\n<li>\n    <em>Transnational Organized Crime and the Convergence of Cyber-Enabled Fraud, Underground Banking and Technological Innovation in Southeast Asia: A Shifting Threat Landscape<\/em>, UNODC.\n  <\/li>\n<li>\n    Carrod Securities Co Ltd, mentioned in Investor Protection Matter Nos 21-0137, 220-119, 09\/23\/2022.  <a href=\"https:\/\/attorneygeneral.delaware.gov\/wp-content\/uploads\/sites\/50\/2022\/10\/Order-to-Cease-and-Desist-Crypto-PBS.pdf\" target=\"_blank\"><br \/>\n      https:\/\/attorneygeneral.delaware.gov\/wp-content\/uploads\/sites\/50\/2022\/10\/Order-to-Cease-and-Desist-Crypto-PBS.pdf<br \/>\n    <\/a>\n  <\/li>\n<li>\n    Tron Scan, 2025. Accessed at: <a href=\"https:\/\/tronscan.io\/#\/address\/TMLQfHV1ChFtBNb55zD9soX9LSbtksKuUT\" target=\"_blank\"><br \/>\n      https:\/\/tronscan.io\/#\/address\/TMLQfHV1ChFtBNb55zD9soX9LSbtksKuUT<br \/>\n    <\/a>\n  <\/li>\n<\/ol>\n<style>\n.savy-seahorse-table {font-size:14px;word-break: keep-all;}.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {padding-right:10px;}.\/*code-format {\tfont-family: 'Courier New';}*\/.image-caption {    font-size: 12px;margin-top:auto;}.list-spacing li{margin-bottom:20px}.img-container, .img-container-3-col {display: flex;}.img-container img {    width: 40%;    margin-bottom: 10px;    height: max-content !important;}.img-container-3-col img {width: 30%;margin-bottom: 10px;}@media (max-width: 767px) {.img-container, .img-container-3-col {display: block;}.img-container img, .img-container-3-col img {width: 100%;}.grid-container {    grid-template-columns: 1fr!important;  }}@media (min-width: 767px) {.img-50{width:50%;}}.grid-container {  display: grid;  grid-template-columns: repeat(2, 1fr);  gap: 40px;  max-width: 800px;  margin: 0 auto;  align-items: stretch;}.grid-item {   display: flex;  flex-direction: column;  justify-content: flex-start;}.grid-item img {  width: 100%;  height: auto;}.image-caption {font-size: 12px;}<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Pig Butchering Scams and Their DNS Trail<\/span>: Linking Threats to Malicious Compounds');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Ma\u00ebl Le Touz and John W\u00f2jcik &nbsp; After uncovering Vigorish Viper in June of 2024, we kept following the DNS trail and have discovered dozens of other actors involved in illegal activities in Southeast Asia. While we spend our days knee-deep in domains related to these threats, there is a rich human story behind [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":12364,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[1222,1345,828,1346,1347,1092,1348,1349,1350,1351,1330,40,30],"class_list":{"0":"post-12363","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-pig-butchering","9":"tag-sha-zhu-pan","10":"tag-scam","11":"tag-fraud","12":"tag-asia","13":"tag-crypto","14":"tag-casinos","15":"tag-human-trafficking","16":"tag-cambodia","17":"tag-myanmar","18":"tag-threat-research","19":"tag-threat-intelligence","20":"tag-dns","21":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pig Butchering Scams: DNS Patterns and Criminal Compounds<\/title>\n<meta name=\"description\" content=\"DNS analysis reveals how pig butchering scams link to criminal compounds in Southeast Asia, exposing fraud infrastructure and threat actor patterns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pig Butchering Scams: DNS Patterns and Criminal Compounds\" \/>\n<meta property=\"og:description\" content=\"DNS analysis reveals how pig butchering scams link to criminal compounds in Southeast Asia, exposing fraud infrastructure and threat actor patterns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-09T12:55:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-10T20:59:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-detour-dog-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Pig Butchering Scams: DNS Patterns and Criminal Compounds\" \/>\n<meta name=\"twitter:description\" content=\"DNS analysis reveals how pig butchering scams link to criminal compounds in Southeast Asia, exposing fraud infrastructure and threat actor patterns.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-detour-dog-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Pig Butchering Scams and Their DNS Trail: Linking Threats to Malicious Compounds\",\"datePublished\":\"2025-10-09T12:55:14+00:00\",\"dateModified\":\"2025-10-10T20:59:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/\"},\"wordCount\":2924,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Blog-Pig-Butchering-Scams-thumbnail.jpeg\",\"keywords\":[\"pig butchering\",\"sha zhu pan\",\"scam\",\"fraud\",\"asia\",\"crypto\",\"casinos\",\"human trafficking\",\"Cambodia\",\"Myanmar\",\"threat research\",\"Threat Intelligence\",\"DNS\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/\",\"name\":\"Pig Butchering Scams: DNS Patterns and Criminal Compounds\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Blog-Pig-Butchering-Scams-thumbnail.jpeg\",\"datePublished\":\"2025-10-09T12:55:14+00:00\",\"dateModified\":\"2025-10-10T20:59:10+00:00\",\"description\":\"DNS analysis reveals how pig butchering scams link to criminal compounds in Southeast Asia, exposing fraud infrastructure and threat actor patterns.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Blog-Pig-Butchering-Scams-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Blog-Pig-Butchering-Scams-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pig Butchering Scams and Their DNS Trail: Linking Threats to Malicious Compounds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pig Butchering Scams: DNS Patterns and Criminal Compounds","description":"DNS analysis reveals how pig butchering scams link to criminal compounds in Southeast Asia, exposing fraud infrastructure and threat actor patterns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/","og_locale":"en_US","og_type":"article","og_title":"Pig Butchering Scams: DNS Patterns and Criminal Compounds","og_description":"DNS analysis reveals how pig butchering scams link to criminal compounds in Southeast Asia, exposing fraud infrastructure and threat actor patterns.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/","og_site_name":"Infoblox Blog","article_published_time":"2025-10-09T12:55:14+00:00","article_modified_time":"2025-10-10T20:59:10+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-detour-dog-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Pig Butchering Scams: DNS Patterns and Criminal Compounds","twitter_description":"DNS analysis reveals how pig butchering scams link to criminal compounds in Southeast Asia, exposing fraud infrastructure and threat actor patterns.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-detour-dog-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Pig Butchering Scams and Their DNS Trail: Linking Threats to Malicious Compounds","datePublished":"2025-10-09T12:55:14+00:00","dateModified":"2025-10-10T20:59:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/"},"wordCount":2924,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-Pig-Butchering-Scams-thumbnail.jpeg","keywords":["pig butchering","sha zhu pan","scam","fraud","asia","crypto","casinos","human trafficking","Cambodia","Myanmar","threat research","Threat Intelligence","DNS"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/","name":"Pig Butchering Scams: DNS Patterns and Criminal Compounds","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-Pig-Butchering-Scams-thumbnail.jpeg","datePublished":"2025-10-09T12:55:14+00:00","dateModified":"2025-10-10T20:59:10+00:00","description":"DNS analysis reveals how pig butchering scams link to criminal compounds in Southeast Asia, exposing fraud infrastructure and threat actor patterns.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-Pig-Butchering-Scams-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-Pig-Butchering-Scams-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Pig Butchering Scams and Their DNS Trail: Linking Threats to Malicious Compounds"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12363"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12363\/revisions"}],"predecessor-version":[{"id":12382,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12363\/revisions\/12382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12364"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}