Payment Tokens

Criminals exploit payment-focused tokens to efficiently convert and conceal illicit proceeds, leveraging faster settlement, pseudonymity, and cross-border accessibility. They frequently conduct multiple smaller transfers—often referred to as smurfing—to keep amounts below detection thresholds and bypass compliance checks. Because these tokens can be obtained or exchanged through platforms lacking strong KYC requirements, adversaries evade identification and exploit jurisdictional gaps by operating in areas where regulatory obligations for digital payment token service providers remain patchy or inconsistently enforced. Once in token form, the illicit capital is often reconverted into fiat or swapped for other assets in smaller increments or staggered over time, further obfuscating its origin and complicating traceability efforts.

[
Code
T0067.001
]
[
Name
Payment Tokens
]
[
Version
1.0
]
[
Parent Technique
]
[
Tactics
]
[
Risk
Product Risk, Channel Risk, Jurisdictional Risk
]
[
Created
2025-02-15
]
[
Modified
2025-04-02
]

Tactics

ML.TA0007
|
|

Repeating conversions and transfers between payment tokens and other assets explicitly obscure the origin of illicit proceeds and distance them from their source. The structured use of smaller transaction amounts, known as smurfing, further complicates traceability by evading detection thresholds.

Risks

RS0002
|
Product Risk
|

The core vulnerability lies in the inherent features of payment tokens—pseudonymity, high liquidity, and rapid cross-border settlement—that allow criminals to conduct micro-structured transactions (smurfing) and obscure transaction trails. By exploiting tokens designed for fast, convenient payments, launderers bypass many traditional banking controls, fragmenting illicit proceeds into smaller increments and complicating traceability. This is the primary risk because the technique revolves fundamentally around the token’s built-in characteristics and ease of transfer outside regulated channels.

RS0003
|
Channel Risk
|

Criminals deliberately select unregulated or weakly regulated platforms, such as P2P exchanges, decentralized finance protocols, and virtual currency ATMs, which have lax or nonexistent KYC measures. By spreading illicit proceeds across multiple platforms and relying on minimal identification checks, they exploit channels inherently vulnerable to onboarding anonymous or pseudonymous users, thereby evading robust AML scrutiny.

RS0004
|
Jurisdictional Risk
|

Adversaries exploit inconsistent or patchy AML regulations across different regions, engaging in 'regulatory arbitrage' by choosing jurisdictions that impose minimal oversight on payment token transactions. This cross-border dimension amplifies anonymity, as law enforcement efforts face added complexity when tokens are rapidly moved into or out of areas with weak enforcement or incomplete regulatory frameworks.

Indicators

IND00222
|

High-frequency payment token transactions within short intervals below regulatory thresholds, consistent with structuring to evade detection.

IND00223
|

Transactions in large or repeated round-number amounts of payment tokens, deviating from typical usage patterns, consistent with standardized illicit transfers.

IND00224
|

Frequent creation or reassignment of digital wallet addresses by a single customer, indicating an attempt to circumvent standard due diligence procedures.

IND01570
|

Rapid consecutive payment token transfers among multiple digital wallets with minimal holding periods, consistent with layering to obscure the origin of funds.

IND01572
|

Rapid conversion of payment tokens into fiat or other digital assets through multiple intermediaries with lax KYC controls, signifying swift integration of illicit proceeds.

IND01573
|

Payment token transactions involving counterparties from high-risk or poorly regulated jurisdictions reflect an intent to exploit weaker AML controls.

IND01575
|

Use of decentralized exchanges, peer-to-peer platforms, or mixing services for payment token transactions to obscure transaction trails indicates layering or concealment strategies.

IND01577
|

Inconclusive or inconsistent source-of-funds information from customers transacting in payment tokens indicates an attempt to conceal the origin of funds.

IND01580
|

Unusual transaction timing, such as bursts of payment token transfers during off-peak hours, indicates an attempt to bypass standard monitoring.

IND01582
|

Circular flows of payment tokens among interrelated wallet addresses with minimal net change indicates layering to mimic legitimate transactions.

IND01589
|

Payment token transaction volumes significantly exceeding the customer's declared financial profile or business activity, without appropriate supporting documentation.

Data Sources

Provides consolidated information on high-risk or lightly regulated jurisdictions, helping to identify payment token transactions or counterparties associated with areas known for weaker AML/CFT compliance and detecting potential exploitation of regulatory gaps.

These records include transaction timestamps, amounts, user identifiers, device or platform usage logs, and cross-platform flow details from e-wallets, digital payment processors, and peer-to-peer platforms. This data is essential in tracing the layering of payment tokens across multiple online channels, identifying suspicious patterns such as smurfing, and detecting unverified or non-compliant users exploiting minimal KYC requirements.

Captures detailed transaction logs, wallet addresses, user identification records, and trading patterns from VASPs. This enables the detection of repeated small transactions, unusual address changes, and cross-exchange token flows indicative of potential layering or structuring.

Encompasses verified customer identities, beneficial ownership details, wallet addresses, transaction summaries, and risk assessments. This supports the detection of inconsistencies in source-of-funds declarations and helps identify frequent wallet address changes that may signal attempts to evade AML controls in payment token activities.

Includes on-chain transaction records, such as wallet addresses, timestamps, and transaction values, enabling the identification of high-frequency transfers, circular flows, and layering across multiple wallets. This is crucial for tracking payment token movements and detecting transactions structured to evade thresholds.

Contains timestamps, trade pairs, volumes, and counterparties for digital asset conversions, enabling the identification of rapid token-to-fiat or cross-asset swaps across multiple intermediaries with lax KYC controls. This indicates swift layering or integration of illicit proceeds.

Mitigations

Evaluate payment token flows, focusing on jurisdictions with known regulatory gaps or inconsistent enforcement. Assign higher risk ratings to customers trading with exchanges or wallets based in these regions to trigger enhanced monitoring and due diligence measures.

Conduct deeper investigations for high-risk payment token users or unusual transaction patterns by verifying ultimate beneficial owners, requiring robust documentation of funding sources, and corroborating any significant asset movements with external data. Pay particular attention to customers frequently shifting tokens between jurisdictions with lax regulations.

Gather and verify identifying information from clients initiating or receiving payment token transfers, ensuring they meet minimum KYC standards. Confirm that customers’ declared source of funds aligns with their profile to prevent anonymous or poorly verified access to high-risk digital asset platforms.

Implement targeted rules and analytics to detect repeated micro-transactions, smurfing patterns, and rapid cross-border transfers in payment tokens. Specifically, flag structured batches of small transfers that fall just below reporting thresholds, and assess velocity and frequency to identify potential layering or structuring unique to these tokens.

Assess and continuously monitor relationships with external exchanges or payment token platforms to ensure they impose robust AML controls and KYC requirements. Restrict or terminate partnerships with providers lacking adequate compliance, reducing exposure to networks where laundering via payment tokens is more likely.

Use specialized blockchain analysis tools to trace payment token flows across multiple wallets, identifying short holding periods, round-number transfers, or circular transactions that indicate layering or concealment. Link wallet addresses to known illicit activities by correlating on-chain data with external risk information.

Restrict or disable payment token services originating from or targeting jurisdictions with inconsistent AML regulations. Impose volume or frequency caps for payment token transactions when KYC processes are insufficient, and block customers who refuse to provide credible information on funding sources.

Periodically reassess customers who conduct payment token transactions by verifying if wallet addresses, transaction volumes, and jurisdictional exposure have evolved. Escalate for review if patterns indicate undisclosed beneficial owners, layering tactics, or other red flags specific to tokens.

Instruments

IN0023
|
|
  • Payment tokens are digital tokens primarily designed for transferring value quickly and across borders with minimal friction.
  • Criminals exploit their pseudonymous nature and fast settlement features to send multiple low-value transfers (smurfing) below surveillance thresholds, evading reporting triggers.
  • Platforms lacking robust KYC or operating in loosely regulated jurisdictions allow launderers to convert illicit funds into and out of these tokens in smaller increments over time, further distancing proceeds from their criminal origin.
IN0027
|
|
  • Criminals convert illicit money into stablecoins to avoid market volatility while benefiting from pseudonymous transfers.
  • They structure these exchanges in multiple smaller increments (smurfing) below reporting thresholds on weak-KYC platforms, evading detection and identity checks.
  • Stablecoins can then be rapidly moved across borders and later reconverted into fiat or other digital assets in staggered transactions, complicating traceability and laundering oversight.

Service & Products

  • Operate without centralized controls, enabling criminals to deposit, swap, or stake payment tokens with minimal customer identification.
  • Automated smart contracts facilitate rapid layering, concealing fund flows behind pseudonymous addresses and pooled liquidity.
  • Enable direct user-to-user token trades without a central intermediary, often with limited AML checks.
  • Support structuring by letting criminals break up transfers into smaller amounts to fly under reporting thresholds.
  • Offers near-instant exchange between various tokens, often without extensive KYC verification.
  • Criminals can quickly switch among different digital assets in small increments, obscuring their money flow.
  • Criminals can convert illicit fiat funds into payment tokens through repeated small transactions (smurfing), staying below detection thresholds.
  • Exploiting exchanges with lax KYC measures enables rapid cross-border transfers that obscure the origin of funds and complicate investigations.
  • Allows criminals to hop between different blockchain networks, dispersing illicit payment token flows.
  • Obscures transaction histories by splitting transactions across multiple chains, undermining traditional AML tracking methods.
  • Permits immediate exchange between cash and payment tokens, which can be exploited via multiple low-value transactions to avoid heightened scrutiny.
  • Some machines operate with minimal ID verification, aiding anonymity and cross-border cash movement.
  • Facilitate storage and rapid movement of payment tokens across multiple addresses, hampering traceability.
  • Criminals can frequently generate or reassign wallet addresses to hide beneficial ownership and origins of illicit proceeds.

Actors

Criminals use cryptocurrency exchanges to:

  • Convert illicit fiat into payment tokens under weak KYC controls.
  • Spread transactions across multiple accounts or make sub-threshold deposits, evading automated detection.
  • Swiftly integrate or layer illicit proceeds by exchanging tokens for other digital assets or reconverting into fiat incrementally.

Illicit operators knowingly exploit payment tokens to:

  • Conduct repeated low-value transfers (smurfing) below detection thresholds.
  • Operate in jurisdictions with lax regulatory requirements for token conversions.
  • Reconvert or swap illicit capital into fiat in smaller increments, complicating traceability.

Criminals exploit peer-to-peer exchange operators by:

  • Arranging direct token trades between individuals without robust central oversight.
  • Structuring repetitive small-value transactions to evade suspicious activity triggers.
  • Taking advantage of minimal customer identification requirements to obfuscate beneficial ownership.

Criminals exploit virtual currency ATM operators by:

  • Depositing or withdrawing small sums of cash and payment tokens without triggering enhanced due diligence.
  • Using ATMs with minimal ID verification to quickly convert between digital tokens and fiat currency.
  • Repeating transactions at multiple locations, fragmenting the transaction trail for financial institutions.

References

  1. MAS (Monetary Authority of Singapore). (2024). Money laundering risk assessment report Singapore 2024. MAS. https://www.mas.gov.sg/publications/monographs-or-information-paper/2024/money-laundering-national-risk-assessment

  2. CGMF (Interdepartmental coordinating group on combating money laundering and the financing of terrorism) Switzerland. (2024). National Risk Assessment (NRA): Risk of money laundering and the financing of terrorism through crypto assets. CGMF. Switzerland. https://www.newsd.admin.ch/newsd/message/attachments/86329.pdf