A suite of digital channels provided by financial institutions that allows customers to conduct financial transactions and manage their accounts via the internet and electronic devices, including online and mobile platforms. These services typically include account setup, viewing balances, fund transfers, bill payments, and statement access, offering convenience and accessibility.
Main/
Digital Banking Services
[]
Code
PS0096
[]
Name
Digital Banking Services
[]
Version
1.0
[]
Category
Deposit & Account Services
[]
Created
2025-03-14
[]
Modified
2025-04-02
Related Techniques
- Criminals can tamper with electronic account information or statements to mask suspicious transactions, relying on remote access and insufficient real-time checks.
- By leveraging digital channels with weak audit regimes, they artificially adjust balances, obscure transfer origins, or bypass alerts for abnormal account activity.
- VPN usage allows customers to open or access digital banking services undetected from sanctioned jurisdictions or flagged IP ranges.
- Banks reliant on geolocation indicators face blind spots, inhibiting real-time detection of potential cross-border laundering activity.
- This level of anonymity eases layering efforts by disguising the origination and destination of funds in digital transactions.
- Criminals leverage proxies to hide their true IP address when accessing digital banking portals, bypassing basic location-based restrictions and AML filters.
- Rapid switching of proxy endpoints prevents consistent device or session fingerprinting, complicating efforts to detect unusual login patterns or attribute activity to a single user.
- Accessing digital accounts via public WiFi bypasses location-based risk parameters, blending illicit traffic with legitimate session logs.
- Multiple logins from diverse hotspots in short intervals defeat device recognition protocols, hindering AML investigations.
- Criminals use multi-hop VPN to hide IP addresses during digital banking logins, circumventing location-based security measures.
- This technique allows them to maintain anonymity, complicating efforts to detect unusual login patterns or inconsistent user location data.
- Adversaries use remote or app-based onboarding processes, uploading altered identity documents to bypass in-person verification.
- Challenging investigation efforts further, they may continually adjust personal details in the digital profile to evade detection.
- Criminals rely on remote account setup and limited face-to-face interaction, exploiting fake IDs to appear legitimate during digital onboarding.
- They can quickly open multiple accounts under different aliases, cycling illicit earnings with minimal human oversight.
Walk-in remitters frequently rely on single-document checks; presenting a passport with a one-letter-off spelling enables cross-border cash payouts that dodge prior watch-list matches for the real name.
- Using forged or stolen IDs, criminals register for online-only bank accounts, circumventing in-person identity validation.
- They conduct transactions under assumed identities, moving funds swiftly while masking their real identity from financial institutions.
- Criminals open digital bank accounts remotely, submitting falsified identity documents or using synthetic profiles.
- Lack of face-to-face verification and optional liveness checks let offenders create multiple accounts from the same device under different names.
- Once onboarded, illicit funds can be moved seamlessly, bypassing more comprehensive KYC procedures typically required in-person.
- Compromised login credentials allow criminals to transact remotely under the guise of legitimate customers.
- By mimicking typical user behavior, they evade automated red flags and swiftly move illicit proceeds to external or layered accounts.
- Fraudsters manipulate remote onboarding by submitting altered or stolen identification records, bypassing limited or automated ID checks.
- They leverage multiple accounts from the same device or IP address, rotating identity data to avoid consistent detection triggers.
- Weak remote KYC processes enable continued access to digital bank accounts with minimal legitimate identification, facilitating illicit use.
- Fraudsters impersonate legitimate customers via deepfake audio or video calls to support teams, requesting password resets or security overrides.
- They exploit reliance on voice-based authentication or minimal remote verification measures.
- Once access is granted, criminals initiate unauthorized transactions or harvest sensitive account details with limited scrutiny.