Regulated Exchange Mule Transactions

Criminals exploit regulated exchanges by deploying multiple money mules or forging client documentation to slip through KYC checks. By opening accounts with falsified details, they undermine compliance measures and conceal the ultimate beneficiary of the funds. In some cases, the criminals directly operate mule accounts, while in others the mules themselves facilitate incoming and outgoing transfers, often toward external banks or money transfer services. This approach embeds illicit proceeds within regular trading records, creating transactional complexity that obscures the original source. Criminals may further target regulated exchanges in higher-risk or sanctioned jurisdictions, where oversight gaps or reliance on counterfeit KYC documentation can be more easily exploited. Through this network of mule accounts, illicit funds are gradually layered, reducing transparency and making it more difficult for regulators or financial institutions to trace proceeds back to their criminal origins.

[
Code
T0011.001
]
[
Name
Regulated Exchange Mule Transactions
]
[
Version
1.0
]
[
Parent Technique
]
[
Tactics
]
[
Risk
Customer Risk, Jurisdictional Risk
]
[
Created
2025-03-12
]
[
Modified
2025-04-02
]

Use of Money Mules or Fraudulent Documents at Legitimate Exchanges

Tactics

ML.TA0007
|
|

Criminals repeatedly transfer illicit funds across multiple regulated-exchange mule accounts, often using forged KYC documents. These transactions deliberately obscure the illicit source, creating a complex audit trail that distances the funds from their criminal origins.

Risks

RS0001
|
Customer Risk
|

The technique relies on forging or falsifying KYC documentation and using multiple mule accounts to bypass identity and beneficial ownership checks at regulated exchanges. Criminals exploit these false identities and mule arrangements to layer illicit funds and conceal the true beneficiaries.

RS0004
|
Jurisdictional Risk
|

Criminals specifically target regulated exchanges in higher-risk or sanctioned jurisdictions where falsified KYC documentation is more likely to slip through, exploiting weaker AML oversight and minimizing the detection of their layered transactions.

Indicators

IND00112
|

Accounts purportedly registered in different regions share identical IP addresses or device fingerprints when accessing the exchange.

IND00591
|

Multiple new exchange accounts opened within a short timeframe using overlapping personal details (e.g., similar addresses or phone numbers) across ostensibly different individuals.

IND00596
|

Identity documents submitted during KYC checks show signs of forgery or tampering, detected across multiple accounts at the same exchange.

IND00597
|

Newly opened accounts, with minimal trading history, rapidly execute high-volume trades that lack a discernible investment approach.

IND00611
|

Funds quickly consolidated from multiple mule accounts into a single central exchange account without an apparent commercial or personal rationale.

IND00643
|

Account holders repeatedly modify key KYC details (e.g., name, address, or beneficiary information) in a short period, contradicting previous submissions.

IND00654
|

Frequent or significant cross-border transactions to or from high-risk or sanctioned jurisdictions via the same exchange accounts, lacking legitimate business or personal rationale.

Data Sources

  • Consolidates information on jurisdictions with elevated money laundering or sanctions risks.
  • Enables identification of accounts or transactions linked to higher-risk geographies, supporting enhanced due diligence on potential mule accounts operating in or routing funds to such locations.
  • Official listings of individuals, entities, and jurisdictions subject to economic or financial restrictions.
  • Allows screening for sanctioned parties or jurisdictions linked to illicit account activity, aiding in identifying unauthorized dealings and heightened AML risk associated with mule transactions.
  • Aggregates public and official records about individuals and entities, including identity details, addresses, and registration data.
  • Assists in verifying submitted personal information and spotting inconsistencies or duplicates across multiple account applications.
  • Includes IP addresses, device identifiers, timestamps, and user session records tied to account logins.
  • Helps detect multiple supposedly different accounts operated from the same endpoint or device, indicating potential mule networks or account takeovers.
  • Performs authenticity checks on official identification documents, detecting forgeries or tampering.
  • Facilitates comprehensive comparisons of submitted ID documents across multiple accounts, identifying repeated use of manipulated credentials.
  • Contains verified personal details, identity documents, and beneficial ownership information.
  • Enables detection of repeated or overlapping data points (e.g., addresses, phone numbers) across accounts, alerts on frequent or unexplained changes to customer profiles, and supports verification of authenticity for new account applications.
  • Provides detailed registers of trades and transactions, including timestamps, volumes, frequencies, and counterparties.
  • Identifies large or rapid transactions across newly opened accounts, tracks the consolidation of funds from multiple sources, and flags behavior inconsistent with legitimate trading patterns.
  • Details cross-border payments, including sending and receiving institutions, countries involved, transaction amounts, and frequency.
  • Helps identify unusual or frequent overseas transfers associated with mule accounts, particularly those lacking legitimate business or personal rationale.

Mitigations

Apply deeper checks for high-risk or suspicious accounts using forensic document verification and third-party data sources to detect tampered IDs. Focus additional scrutiny on customers who repeatedly modify KYC details, originate from sanctioned jurisdictions, or appear linked through shared personal data. By intensifying background checks, this measure hinders fraudulent entry into regulated exchanges and disrupts mule-driven layering.

Systematically verify identity documents and customer details during onboarding by cross-referencing addresses, phone numbers, and other identifiers across accounts to detect duplicates or forgeries. Confirm beneficial ownership to prevent criminals from repeatedly opening accounts using falsified credentials or proxy individuals. This approach addresses the vulnerability of mule accounts created with fraudulent or overlapping information.

Continuously analyze inflows and outflows to identify hallmark mule patterns, such as funds converging into a single account from numerous newly opened accounts or suspicious cross-border transactions lacking reasonable business rationale. By flagging repeated transfers or layered activity indicative of money mule operations, institutions can intervene before illicit funds become further obscured.

Conduct automated, real-time checks against sanctions databases and watchlists for new account registrations and cross-border transactions. Closely examine activity routed through high-risk or sanctioned jurisdictions, linking it to suspicious account openings or repeated personal data overlaps. Blocking or thoroughly vetting these connections interrupts illicit layering flows through mule accounts.

Implement multi-factor authentication, device fingerprinting, and IP block checks to identify overlapping digital footprints among supposedly different account holders. Automatically flag repeated logins or account creations from the same device or location, triggering further investigative checks. This helps uncover criminals controlling multiple mule accounts behind falsified identities.

Provide specialized guidance to frontline and compliance teams on detecting forged documents, spotting repetitive personal data usage, and recognizing trade activity anomalies related to mule networks. By teaching staff to identify red flags (e.g., identical phone numbers across multiple accounts, tampered IDs), institutions enhance the detection of illicit layering schemes at regulated exchanges.

Cross-check customer information (e.g., addresses, phone numbers, identity documents) against public records, social media profiles, and external databases to detect fabrications or inconsistencies. Specifically, flag the repeated use of overlapping personal details across multiple newly opened accounts. By exposing fraudulent IDs or contradictory data, institutions can prevent the formation of mule account networks.

Restrict or freeze functionalities for accounts exhibiting multiple red flags, such as rapid KYC detail changes, inconsistent personal information, or high-volume fund movements. Limit transaction capabilities, enforce secondary approvals, or terminate high-risk features until deeper verification is completed. This approach curbs criminals' ability to launder funds under multiple mule accounts.

Instruments

Criminals or their mules open bank accounts using falsified or incomplete documentation and then link these accounts to regulated exchange profiles. By transferring illicit funds into or out of these bank accounts under multiple account holders, they embed illicit proceeds within normal banking flows, creating layers of transactions that obscure the true source and beneficiary.

IN0019
|
|

Fraudulent or mule-operated brokerage accounts at regulated securities platforms execute numerous small trades in stocks, bonds, or other market instruments. By cycling illicit funds through these transactions, criminals blend them with legitimate investment flows. This repeated buying and selling across multiple accounts reduces transparency and conceals the original illicit capital beneath normal market activity.

Illicit cash or fiat funds enter the exchange through wire transfers or physical deposits attributed to mule-controlled accounts. Once inside, these funds are commingled with legitimate transactions, effectively masking their illegal origin. Repeated deposits, trades, and withdrawals in fiat form make it more challenging for authorities to detect the layering activity.

Mule accounts funded with illicit capital purchase Bitcoin, Ethereum, or other public ledger cryptocurrencies. By rapidly trading or transferring these assets among multiple mule accounts at the regulated exchange, criminals obfuscate ownership and create a complex transaction history. This layering reduces transparency, as the exchange’s internal account records mask the ultimate beneficiary behind falsified KYC data.

Service & Products

  • Fraudulently established brokerage accounts (directly by criminals or via money mules) allow illicit proceeds to be channeled into seemingly legitimate securities trades.
  • High volumes of small transactions blend criminal funds into normal trading records, diluting red flags.
  • Complex layering across multiple customer accounts and instruments obscures beneficial ownership and complicates detection.
  • Criminals or their money mules open exchange accounts using falsified or stolen identification to bypass KYC checks.
  • They deposit illicit funds and engage in frequent trades or crypto-to-fiat conversions, embedding illegal proceeds within legitimate trading records.
  • Rapid cross-border transfers and multiple account rotations create layering complexity, making it difficult to trace the original source of funds.
  • Criminals exploit forex brokers by submitting forged or mule-based account applications, passing superficial KYC reviews.
  • They execute currency trades and frequent cross-border transactions, layering illicit proceeds among normal market flows.
  • The appearance of routine forex activity masks suspicious transactions, hindering efforts to identify the true origin of funds.

Actors

Illicit operators orchestrate mule-based schemes at regulated exchanges by:

  • Creating or supplying falsified KYC documentation to establish accounts under fictitious or stolen identities.
  • Directly managing certain accounts themselves or coordinating others to avoid detection.
  • Moving illicit proceeds through multiple transactions across various mule accounts, reducing transparency and obscuring beneficial ownership.
AT0076
|
|

Money mules enable layering by:

  • Opening accounts at regulated exchanges—whether knowingly or under false pretenses—on behalf of illicit operators.
  • Receiving and forwarding funds to external accounts, complicating the transaction trail.
  • Providing personal or business account credentials that shield the true origin and beneficiary of the funds from financial institution scrutiny.

References

  1. GIABA (Inter-Governmental Action Group Against Money Laundering in West Africa). (2020). Money laundering and terrorist financing through the informal and illegal currency exchange service providers in West Africa. GIABA. http://www.giaba.org

  2. Carlisle, D. (2024). Preventing financial crime in cryptoassets: Identifying evolving criminal behavior. Elliptic.https://www.elliptic.co/hubfs/Elliptic%20Typologies%20Report%202024.pdf