News Page

Main Content

How Modern Scammers Plot to Steal From You in Days: Inside the Cybercriminal Playbook

Libby Miles's profile
By Libby Miles
January 10, 2026
How Modern Scammers Plot to Steal From You in Days: Inside the Cybercriminal Playbook

A recent police raid at a compound used for internet scamming in the Philippines has given law enforcement an even better look at the tactics used in online scams. Dubbed a “cybercriminal playbook,” the documents recovered in the raid paint a far more sinister picture than what many people even realized was possible. Gone are the days of random emails from fraudsters claiming to be princes from another country. Instead, those scams have been replaced with psychological attacks aimed at preying on people at their most vulnerable points.

To make matters worse, this isn’t just a fringe occurrence. Across 2025, law enforcement and cybersecurity experts have seen a dramatic rise in online scams that blend emotional deception with financial exploitation. Techniques range from traditional phishing and romance scams to newer AI-enhanced social engineering. Understanding how these schemes operate and why they work is crucial for anyone navigating digital communication today.

What Scammers Teach Each Other: The Playbook Approach

The case in the Philippines, which has been ongoing for the last several months, revealed a series of written manuals. Each manual was written in both Chinese and English, and included step-by-step scripts for grooming targets. These guides outline every stage, from setting up a convincing persona to managing the emotional manipulation needed to build the victim’s trust. For instance, in multiple guides, scammers were taught that “a woman’s IQ is zero when she’s in love,” laying the groundwork for romance scams. “As long as the emotions are in place, the client's money will naturally follow,” the guide said.

Ultimately, the goal is to make the scam feel genuine and personal. According to documents recovered in the raid, scammers refer to this approach as a “pig butchering scam.” The goal, per the documents, is to “lead targets like hapless pigs to the slaughter.” According to the FBI, romance scams that adopt the practices outlined in the criminal playbook continue to be the most prevalent on a global level.

Detailed persona construction is an early focus. Scammers are encouraged to craft fake biographies that include believable jobs, compatible zodiac signs, shared interests, and even personal backgrounds tailored to the target’s preferences. This creates an illusion of connection and familiarity that lowers the victim’s guard.

The Role of Romance and Pig-Butchering Scams

Credit: Romance scams often start with flattery and connection, then shift into financial pressure and fake investment opportunities. Adobe Stock

Romance scams have long been considered the most predominant form of online scam, and upon discovering the playbooks, police learned why. These schemes typically start with fake dating profiles, attractive photos, or confidences shared on a legitimate platform.

The “pig butchering scam” combines the emotional manipulation tactics of romance scams with investment fraud. Once trust is established, scammers steer the conversation toward fraudulent investment opportunities, often involving cryptocurrency or fake trading platforms. Since these platforms are meticulously curated to appear legitimate, including fake returns and testimonials, victims, driven by the need for love and romance, find themselves willing or even eager to send money.

When victims start trusting the scammer and see false evidence of the investment’s success, they are often encouraged to transfer ever larger amounts of money. At a certain point, the scammer disappears entirely, leaving the victim with no access to their funds. This blend of emotional and financial manipulation helps explain why losses from such scams can be steep and why victims often feel personally betrayed as well as financially harmed.

AI and Technology: Supercharging Cybercrime

The rise of AI has certainly bolstered cybersecurity in some fields. Unfortunately, today’s cybercriminals are not relying solely on human-generated scripts anymore. In 2025, advancements in artificial intelligence have dramatically influenced the online landscape. Researchers and cybersecurity experts report that AI makes it far easier for cybercriminals to scale their scams at a faster pace. In some instances, this has included deepfake audio recordings and pictures that mimic a real, human connection.

For example, realistic voice-cloning and conversational AI can create messages that sound like someone the victim would trust, making it harder to distinguish a scam from a genuine communication. These technologies are increasingly part of social engineering campaigns, reducing the effort needed for criminals to run multiple scams simultaneously.

Beyond Romance: Other Cybercrime Tactics

Credit: Scammers also use fake login pages, spoofed phone calls, and data extortion to steal information and cash quickly. Adobe Stock

While romance and pig butchering scams continue to be popular among cybercriminals, other forms of cybercrime are also rampant. Phishing schemes, where scammers trick victims into revealing passwords or sensitive information, continue to evolve, with AI making messages more believable and harder to spot.

Voice phishing, or vishing, uses deceptive phone calls with spoofed caller IDs and scripts designed to extract financial or personal data under false pretenses. This type of attack often mimics banks, government agencies, or trusted services and is increasingly paired with other fraud strategies to amplify losses.

More traditional cyber attacks, like ransomware-as-a-service operations, show how digital extortion methods also remain a major threat. In these cases, attackers encrypt victims’ files or steal data and demand a ransom to unlock systems or prevent data leaks. This form of attack underscores how diversified and sophisticated the broader cybercrime ecosystem has become.

Protecting Yourself in an Online World

The scam handbook seized by police provides a rare window into the elaborate methods cybercriminals train each other to employ. These methods include emotional manipulation, exploitation of trust, and deception masked by technology. Reports show that cybercrime globally has become one of the fastest-growing types of criminal activity, with damages measured in the trillions annually.

Staying vigilant about suspicious contacts, verifying identities through independent channels, avoiding unsolicited investment opportunities, and regularly updating security software are essential steps toward protecting yourself. With cybercrime becoming a pervasive global issue, understanding how these scams work is one of the best defenses anyone can build.


Did you find this useful? Save it, share it with someone you care about, and keep reading with these related guides:

Latest News

Related Stories