Romance Scams, Crypto Laundering, and Human Trafficking: Inside the $8.2M Pig Butchering Case
Federal authorities seized over $8.2 million in stolen USDT linked to a pig butchering scam that preyed on romance-seeking victims across the U.S. But this wasn’t just about financial fraud—it exposed a global network tied to human trafficking and Chinese organized crime.

On February 27, 2025, the U.S. Attorney’s Office for the Northern District of Ohio filed a civil forfeiture complaint to seize $8.2 million in stolen USDT, the stablecoin tethered to the U.S. dollar. The funds were traced back to a sprawling "pig butchering" scheme—a predatory form of online romance fraud with a disturbingly international footprint.
What is Pig Butchering?
It’s a cruel scam that combines emotional manipulation with financial exploitation. Criminals pretend to form romantic connections with victims through anonymous messages or dating apps. Once trust is built, victims are slowly coaxed into “investing” in fake crypto platforms. The term “pig butchering” refers to how scammers fatten up the victim with affection and fake profits before financially slaughtering them.
In one harrowing case, a Cleveland-area woman was persuaded to empty her retirement savings, losing over $650,000 to a fake investment site. She’s one of at least 31 known victims. The FBI, leveraging blockchain tracing tools like TRM Labs, followed the money trail across centralized exchanges, Ethereum and TRON networks, decentralized finance (DeFi) platforms, and a web of unhosted wallets. Despite the scam’s complexity, agents successfully recovered the full $8.2 million.
A Breakdown of the Victim Losses:
Victims came from across the country—Ohio, Michigan, California, Utah, North Carolina—often losing life savings. One example: “A.H.” from Mentor, Ohio, lost $663,352 after responding to a text in late 2023. The scam didn’t stop at initial investments. Scammers used fake tax and withdrawal fees, and in some cases, threats, to extract even more. Five victims alone lost nearly $1.7 million; the broader pool suffered losses over $5.2 million.
How the Scam Was Laundered:
This wasn’t a simple wire fraud. The stolen crypto was funneled through DeFi protocols, cross-chain swaps, and non-custodial wallets to obscure its origins. Still, agents tracked the flow to three TRON addresses, freezing nearly $5.3 million. That figure is part of the broader $8.2 million seizure, possibly due to additional traced wallets or valuation differences at the time of filing.
The International Twist No One Expected:
What sets this case apart is its link to international organized crime. The scam networks behind it are reportedly tied to human trafficking operations in Cambodia and Myanmar, where trafficked victims are forced to carry out the fraud. These aren’t freelancers in a basement—they’re part of a transnational racket operated by Chinese crime syndicates using forced labor. That changes the conversation from financial crime to human rights crisis.
Legal Action and Ongoing Investigation:
The complaint, filed under Case No. 1:25-cv-00386, is based on violations of federal wire fraud and money laundering statutes, including 18 U.S.C. § 981(a)(1)(C). Notices were served directly via the Ethereum blockchain—yes, the court system is now serving crypto wallets. The FBI and DoJ are still tracing funds, with more victims and potentially larger losses likely to surface.
This case isn’t just about crypto crime. It’s about how digital deception, emotional exploitation, and international organized crime now intersect in ways law enforcement is still learning to navigate.
For more detail, read the full TRM Labs report and official DOJ filing.