Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/Threats/FBI & Thai Partners Target Asia Scam Centers Hitting
Threats

FBI & Thai Partners Target Asia Scam Centers Hitting

Deceptive scams, often linked to sophisticated Asia-based operations, rarely announce their true nature upfront. Instead, they typically begin innocuously: a friendly message on social media, a...

David kimber
David kimber
March 20, 2026 3 Min Read
0 0

Deceptive scams, often linked to sophisticated Asia-based operations, rarely announce their true nature upfront. Instead, they typically begin innocuously: a friendly message on social media, a misdialed text evolving into a conversation, or a

For tens of thousands of Americans, those innocent interactions have ended in financial ruin — savings wiped out, retirement funds emptied, and assets scattered across untraceable accounts.

Behind these schemes are organized scam compounds spread across Southeast Asia, and the FBI has made dismantling them a top operational priority.

These are not improvised schemes run by lone criminals. Scott Schelble, Deputy Assistant Director of the FBI’s International Operations Division, described them as “industrial-scale fraud operations” during a U.S. Department of State press briefing on February 24, 2026.

After traveling to Thailand, Cambodia, and Vietnam to observe these centers firsthand, he said, “It is impossible to fully grasp the magnitude of these operations until you see them yourself.”

The compounds operate like fortified office parks — buildings filled with workers sitting at rows of computers, following detailed scripts to extract money from victims thousands of miles away.

FBI.gov analysts identified these fraud networks as highly organized criminal enterprises that blend cyber fraud, money laundering, and human trafficking into a single operation.

According to FBI Internet Crime Complaint Center (IC3) data, more than 80,000 complaints were filed in 2025 alone, with total losses exceeding $2.9 billion.

The FBI has linked many of these operations to Chinese organized crime syndicates that exploit regional borders, local laws, and inconsistent enforcement to run their networks with near impunity.

Thailand has emerged as a central partner in the U.S.-led response. The FBI’s Bangkok office formed a joint task force with the Royal Thai Police in August 2025, and agents now rotate into Thailand on six-month assignments to support active investigations.

Seizures from those operations included more than 8,000 mobile phones and 1,300 hard drives recovered from suspected scam compounds.

Thai authorities also arrested 21 individuals linked to these networks, while a major technology company disabled over 150,000 accounts tied to scam operations.

The U.S. Department of Justice established a Scam Center Strike Force in November 2025, which has since frozen and seized more than $580 million in digital assets.

The Pig-Butchering Playbook: Engineering Trust Before the Strike

One of the most financially devastating methods used by these compounds is known as pig butchering.

The tactic gets its name from the concept of fattening a pig before slaughter — scammers invest significant time building emotional trust with a target before introducing the financial trap. Contact typically starts through a message that appears to be sent to the wrong number, or through a dating application.

Once a connection forms, scammers gradually introduce what appears to be a promising cryptocurrency investment opportunity, showing victims convincing but entirely fake trading platforms with impressive-looking profit figures.

Seized phones (Source - FBI.gov)
Seized phones (Source – FBI.gov)

Victims are allowed — and even encouraged — to make small withdrawals early in the scheme to build confidence in the fake platform. As they deposit increasingly larger amounts, the platform displays returns that look almost too good to believe.

When they eventually attempt to withdraw their funds, they are told they must first pay fees, taxes, or penalties. After those payments are made, the platform vanishes completely, along with every dollar invested.

The FBI has warned that retirees, small-business owners, and people seeking companionship online are among the most frequently targeted groups.

To reduce exposure, the FBI recommends that individuals remain cautious of unsolicited contact from strangers online, particularly those who steer conversations toward investment opportunities.

Any promise of guaranteed cryptocurrency returns should be treated as suspicious. Victims and those who suspect they are being targeted are encouraged to file a report through the FBI’s Internet Crime Complaint Center at ic3.gov and contact local law enforcement without delay.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

Exploit

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Microsoft Teams Optimizations for Windows App on iOS &

Next Post

Perseus Android Malware Steals Notes & Enables Device

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
CyberSecurity News

Top 10 High-Risk Vulnerabilities Exploited in Wild

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us