The 5 Stages of Financial Grooming

In today’s digital age, building connections online has never been easier, but neither has falling victim to a scam. Financial grooming, often linked to romance scams and the increasingly prevalent “pig-butchering” schemes, involves scammers methodically building trust to exploit victims financially. The term pig-butchering originates from the scammers’ perspective: they “fatten up” victims with affection or promises of wealth before “slaughtering” them by draining their savings.

Understanding the stages of financial grooming is crucial for protection. By recognizing patterns, we can prevent emotional and financial devastation. Romance frauds alone caused over $600 million in reported losses in 2024. Investment scams, which often overlap with pig-butchering, resulted in over $6.5 billion in losses.

Stage 1: Initial Contact (“The Hook”)

The process begins with an unsolicited outreach designed to seem harmless or unexpected to the victim. Scammers often use automated messages to contact thousands of potential victims.

Red Flags:

“Wrong number text or random social media message” from a stranger who quickly turns friendly during the conversation.

“Profiles on dating apps or professional networks” like Tinder, OkCupid, or LinkedIn that feature attractive, professional photos but lack verifiable details.

“Quick attempts to move conversations off public platforms” to private apps like WhatsApp or Telegram for “privacy.”

Real-Life Scenario:

It’s common for the victim to be retired or approaching retirement. Text messages lead into a fabricated romance and crypto investment pitch. Victims often report feeling an instant “connection,” but this is engineered from the scammer through data harvested online from public information gathered on the victim.

Why It’s Critical:

This is the first stage used to test your responsiveness. Ignoring or blocking early these attempts prevents deeper involvement. Pig-butchering scams are especially effective in this scenario, as scammers (often part of organized crime rings in Southeast Asia) use trafficked labor for maximum social engagement. Early detection saves time and emotional energy, especially for older adults who may seek companionship.

Stage 2: Building Rapport (“The Grooming Phase”)

Once hooked, scammers invest weeks or months in fostering trust from a victim. They share fabricated life details, express admiration, and create emotional dependency.

Red Flags:

“Excessive compliments or love-bombing” the victim, often this feels flattering initially, but the underlying intent is control, often making the recipient feel uncomfortable or overwhelmed.

“Stories of wealth, success, or hardship” that cause sympathy from the victim to make the storyline seem all the more believable.

“Avoidance of video calls or in-person meetings” with excuses like travel or poor internet connection.

Real-Life Scenario:

It’s common for the victim to be a widower that connects with a (“fill in the blank”) individual on a dating site. Over two months, they shared photos of vacations and discussed shared hobbies and interests. The individual will mention a “minor” financial hardship. The victim is convinced to transfer small amounts initially, building to larger sums.

Why It’s Critical:

Grooming exploits human needs for connection. For retirees, isolation can amplify vulnerability. The victim doesn’t want to lose the companionship, or wants to prove they can be trusted in the new relationship. Spotting this prevents the scalability of fraud to be perpetrated. Failure to identify this is occurring, often will escalate to the scammer “bonding” with the victim and will result in irreversible losses. 

Stage 3: Establishing Trust (“The Test”)

Here, scammers introduce small requests to work on solidifying the bond.

Red Flags:

“Requests for favors” like buying gift cards or sending small sums for “an emergency” that forces the victim to choose to help.

“Sharing investment tips” or claiming success from family connections or “insider” knowledge that will benefit the victim.

“Inconsistencies in stories” begin to develop, such as details about current location or job.

Real-Life Scenario:

A victim may be encouraged to invest in a crypto platform and the scammer will present “fake” profits from the trade. This “win” will prompt larger investments before the site disappears along with any profits from making the trade.

Why It’s Critical:

This phase normalizes giving, making larger demands seem reasonable. Banks may normally begin flagging unusual small transfers, especially if the funds appear to have been sent to a cryptocurrency exchange. When a bank begins to question any account activity, often scammers will come up with instructions not to discuss the activity and they may convince the victim the bank cannot be trusted.

Stage 4: Exploitation (“The Butchering”)

The scammer pivots to the kill, urging investments in fake schemes or demanding money for fabricated reasons.

Red Flags:

“Pressure to invest in unregulated platforms” like crypto exchanges, with promises of higher returns from the investment.

Demands for more money” to “unlock” funds, pay “taxes,” or cover “fees.”

“Account lockouts or unexpected volatility” from the investment, which requires additional payment or funds.

Real-Life Scenario:

The victim is guided to a bogus app showing rapid gains. After investing a large sum from retirement savings, withdrawal attempts fail, and the scammer demands additional payment.

Why It’s Critical:

This is the stage where financial losses rapidly escalate, often reaching life-changing amounts in weeks or months. For financial institutions, monitoring of cryptocurrency transfers is critical because large transactions may only trigger alerts after significant damage has occurred. Smaller initial transfers often appear routine, allowing victims to be groomed.

Stage 5: Disappearance and Aftermath (“The Ghosting”)

Once funds are extracted, contact ceases, leaving victims to grapple with their financial losses.

Red Flags:

“Sudden unresponsiveness” after money is sent. The victim can no longer reach the individual, including profiles on dating apps or professional networks, and private conversations on apps like WhatsApp or Telegram.

“Excuses for delays” are occurring regularly and followed by complete unresponsiveness.

“Attempts to re-engage” only appear prevalent if more money is available or possible for the scammer to obtain through continuing contact.

Real-Life Scenario:

After losing a large sum of money, scammers sometimes return with new personas for repeat victimization.

Why It’s Critical:

Post-scam trauma includes shame and financial ruin. Reporting to the FBI’s IC3 or FTC aids investigations and prevents further victims, or repeat victimization.

How Common Are These Scams?

Romance and pig-butchering scams are rampant, with FBI data showing a 33% rise in total cybercrime losses to $16.6 billion in 2024. Pig-butchering, often crypto-based, drove much of this, with revenues up 40%. FinCEN notes these schemes target millions globally, exploiting trust for massive gains. Education reduces incidence—share this with loved ones.