Infiltration and Control of Banking Institutions

Criminal organizations obtain a controlling stake or covert influence within a legitimate bank, enabling them to override compliance and reporting mechanisms at will. By embedding their own personnel or subverting leadership, they can funnel illicit funds through the institution with minimal scrutiny, disable or falsify monitoring systems, and conceal suspicious transactions behind the legitimacy of a well-established financial entity. Authorities in multiple jurisdictions have reported attempts by organized crime to infiltrate smaller banks or non-bank financial institutions, with complicit directors or employees deliberately weakening internal controls to launder illicit proceeds. These embedded actors or corrupted executives can circumvent AML checks for new accounts and large transactions, exploit correspondent banking relationships for cross-border layering, and thwart oversight by manipulating internal procedures. Such infiltration often involves partial or full ownership of the bank or placement of loyal personnel in key decision-making roles, allowing criminals to mask beneficial ownership structures, expedite high-risk customer onboarding, and facilitate large-scale laundering through the institution’s channels. This control also makes it easier for criminal networks to integrate cryptocurrencies and other digital payment instruments, subsequently blending illegal funds with legitimate returns.

[
Code
T0099
]
[
Name
Infiltration and Control of Banking Institutions
]
[
Version
1.0
]
[
Parent Technique
]
[
Risk
Internal Risk
]
[
Created
2025-03-02
]
[
Modified
2025-05-08
]

Bank Control Manipulation

Tactics

By controlling or subverting the bank's leadership, criminals can bypass standard AML checks for account creation and transaction monitoring.

Risks

RS0005
|
Internal Risk
|

This technique involves infiltrating or corrupting leadership within an institution, enabling criminals to override AML processes, disable monitoring systems, and circumvent suspicious transaction reporting from within the governance structure. By embedding loyal personnel or acquiring a controlling stake, they exploit internal vulnerabilities to launder funds with minimal scrutiny.

Indicators

IND00134
|

Sudden and significant purchase of a controlling stake in a bank by an individual or entity lacking a traditional history in banking or financial services.

IND00135
|

Newly appointed board members or executives with documented connections to high-risk jurisdictions or industries known for money laundering.

IND00136
|

Frequent changes in senior management or board members shortly after the acquisition of a controlling interest in the bank.

IND00137
|

Newly appointed key personnel display insufficient banking experience or professional qualifications for their roles.

IND00391
|

Sudden changes that weaken the bank's compliance policies or procedures following new ownership or leadership changes.

IND00411
|

Increased volume of transactions involving high-risk jurisdictions or entities following the acquisition.

IND00412
|

Disproportionate growth in new accounts or customer base from high-risk sectors or regions post-acquisition.

IND00413
|

Rapid expansion of correspondent banking ties with institutions in high-risk areas soon after acquisition.

IND00427
|

Key personnel within the bank maintain affiliations with shell companies or entities with opaque ownership structures.

IND00437
|

Large, round-amount transactions initiated or approved by newly installed management without clear economic rationale.

IND00564
|

Sudden, unexplained surge in transaction volume or new account openings following a change in the bank's ownership or senior management.

IND00613
|

Unusual patterns of internal transfers or asset movements between branches or subsidiaries of the bank.

IND00697
|

Large capital infusions into the bank from undocumented or opaque funding sources.

IND00710
|

Key decision-making roles occupied by individuals with direct ties to criminal networks or PEPs.

IND00736
|

Inadequate or non-existent due diligence for newly introduced high-value customers or business partners following ownership changes.

IND02009
|

Material inconsistencies between officially reported bank financial statements and the actual volume of underlying transactions or customer activity.

IND02010
|

Marked decline or cessation of suspicious transaction report filings shortly after leadership changes.

IND02011
|

Unauthorized tampering with automated monitoring systems or disabling compliance software settings previously used to flag suspicious activity.

Data Sources

Includes information on individuals holding prominent public or political roles, their known associates, and relevant designations. This data source aids investigations by flagging newly appointed bank directors or executives who are PEPs or linked to criminal networks, which could potentially signal organized crime infiltration.

Contains official financial statements, tax returns, and related disclosures for institutions and businesses. This data assists in detecting infiltration by identifying inconsistencies between reported bank financials and actual transaction volumes, suggesting that criminal insiders may be manipulating records to conceal illicit activities.

Contains records of all financial movements, including timestamps, amounts, currencies, account details, and initiator information. This data supports AML detection by uncovering:

  • Large, round-amount transactions authorized by newly installed management without legitimate economic purposes.
  • Sudden spikes in transaction volumes or new account openings following ownership changes.
  • Unusual patterns of internal transfers or asset movements within the institution.

Such anomalies can highlight infiltration, where criminals exploit their control to conduct high-risk or suspicious activities.

Aggregates personal and entity information from government registries and public sources, including identity, corporate affiliations, and legal status. This data supports AML detection by identifying newly appointed bank executives or owners with suspicious backgrounds, high-risk associations, or ties to industries prone to money laundering, indicating potential criminal infiltration.

Stores and tracks version histories of internal policies, procedures, and compliance documentation. This data helps identify policy revisions that weaken AML controls following suspicious ownership or leadership changes, revealing potential infiltration by criminals seeking to disable or circumvent oversight.

Captures detailed traces of user activities, system configurations, and monitoring rule changes. This data helps uncover unauthorized tampering with AML software or the disabling of compliance alerts by insiders, a hallmark tactic when criminals infiltrate a financial institution to suppress detection.

Contains comprehensive details on employees, including positions, hire dates, qualifications, and role changes. This data helps detect infiltration by revealing rapid or repeated shifts in senior management or the appointment of unqualified personnel, both of which can signify that criminals are placing loyal individuals in key decision-making roles.

Encompasses verified customer profiles, beneficial ownership data, risk assessments, and AML compliance actions. This data helps detect infiltration when:

  • A bank experiences disproportionate growth in high-risk customers or sectors post-acquisition.
  • Large capital infusions occur from undocumented or opaque sources.
  • Enhanced due diligence is bypassed for high-value clients.
  • Suspicious transaction reporting declines abruptly after leadership changes.

These patterns may indicate that criminals in control are circumventing or disabling compliance safeguards.

Captures details of cross-border transactions, participating institutions, involved jurisdictions, and newly added correspondent banking relationships. This information helps detect infiltration by revealing sudden growth in high-risk cross-border activities or the rapid expansion of correspondent ties in jurisdictions known for lax AML enforcement, indicating criminals leveraging a controlled institution to layer illicit funds.

Provides official registration data on corporations, including beneficial ownership details, shareholding structures, and directorship changes. This data helps detect infiltration by revealing sudden or suspicious ownership changes within a bank, hidden alliances with shell entities, and layered ownership structures indicative of organized crime control.

Mitigations

Conduct comprehensive vetting of prospective owners or major shareholders acquiring controlling stakes in the institution by verifying sources of wealth, cross-checking backgrounds against criminal affiliations, and applying heightened scrutiny to high-risk jurisdictions. This measure identifies infiltration attempts before corrupt actors gain authority to override internal controls.

Enforce robust role-based access controls, multi-factor authentication, and activity logging for all users making changes to core compliance systems. Implement real-time monitoring to flag suspicious activities such as overrides, disabling compliance filters, or altering transaction thresholds—key tactics used by infiltrators seeking to launder funds undetected.

Implement strict governance frameworks mandating dual authorization for major transactions, segregated oversight of compliance changes, and board-level sign-off on critical AML policy revisions. Dividing authority in this manner makes it significantly more difficult for illicit actors to override safeguards once they infiltrate high-level positions.

Implement rigorous credential checks, criminal record reviews, and reference verifications for board members, executives, and staff in pivotal roles. Screen for ties to criminal networks or histories of financial misconduct. This deters infiltration by ensuring that compromised individuals cannot easily obtain control over compliance and reporting processes.

Require regular reviews of the bank’s AML controls by external audit firms or strictly independent internal teams. These reviews should examine transaction monitoring thresholds, suspicious transaction logs, and compliance overrides to detect any illicit tampering or manipulation by infiltrated leadership.

Establish confidential and secure whistleblower channels that allow staff to report irregular directives, corruption at leadership levels, or tampering with AML systems without fear of reprisal. By enabling such disclosures, institutions can uncover infiltration schemes and swiftly initiate investigations.

Instruments

  • By controlling the bank's leadership or compliance staff, criminals can open accounts under fictitious or shell entity names without adequate KYC.
  • Large amounts of illicit funds can be deposited and transferred with minimal oversight, enabling both layering and integration.
  • Internal monitoring systems can be manipulated or disabled to avoid suspicious transaction reports entirely.
  • Infiltrated banks can facilitate high-volume crypto-to-fiat transactions while suppressing or falsifying AML checks.
  • Corrupted insiders override controls, allowing illicit crypto earnings to be quietly integrated into the bank’s customer accounts.
  • This creates a seamless blending of illegal proceeds with legitimate funds, making it harder for external regulators to detect suspicious activity.
  • With direct influence over compliance, criminals authorize the issuance or acceptance of letters of credit without verifying the underlying trade documents.
  • This facilitates cross-border layering by masking illicit funds as legitimate international trade payments.
  • Corrupted managers can ignore trade discrepancies and fraudulent documentation, disguising criminal proceeds as normal commercial activity.
IN0025
|
|
  • Criminals with infiltration can issue official bank drafts supported by falsified information or without valid documentation.
  • These drafts carry the credibility of the infiltrated institution, making suspicious movements less likely to be challenged.
  • Large sums can be transferred under the appearance of legitimate corporate payments, complicating law enforcement scrutiny of the funds’ true origin.
  • Complicit bank leadership may accept large deposits from criminal sources and waive the typical due diligence.
  • Funds earn interest over time, making the proceeds appear legitimate when withdrawn.
  • Embedded or corrupted staff can ensure no red flags are triggered, enabling long-term layering under the guise of standard banking activity.

Service & Products

  • Criminals with covert control of a bank can rapidly approve or overlook compliance checks for new business accounts.
  • Compromised leadership enables high-risk customer onboarding and large illicit deposits, concealing beneficial ownership and source of funds under legitimate account services.
  • Infiltration at leadership or compliance levels allows criminals to bypass monitoring for cross-border transactions, enabling large-scale layering through correspondent channels.
  • Subverted or complicit managers can manipulate or disable AML checks, concealing suspicious activity from partner institutions and regulators.

Actors

Corrupted or coerced employees, ranging from frontline staff to senior executives, facilitate infiltration by:

  • Manipulating or disabling transaction monitoring and suspicious activity alerts.
  • Rapidly onboarding high-risk customers and ignoring red flags or large unexplained deposits.
  • Preventing or halting suspicious transaction reporting mandated by AML regulations.

Their complicity undermines institutional compliance, concealing criminal transactions and impeding oversight by regulators or outside auditors.

Organized crime groups orchestrate the infiltration of banks or non-bank financial institutions by:

  • Acquiring partial or full ownership stakes to gain control over governance and compliance.
  • Placing loyal personnel or subverting existing leadership, thereby disabling or falsifying AML controls.
  • Exploiting correspondent banking channels and large-volume transactions under minimal scrutiny.

Their control over the institution severely compromises compliance frameworks, ensuring illicit funds pass undetected and unreported.

Legitimate banks and non-bank financial entities are targeted and exploited through infiltration. Criminals:

  • Weaken or override internal governance and compliance mechanisms, bypassing due diligence.
  • Funnel illicit proceeds through standard account services and cross-border relationships.

Once compromised, the institution becomes a conduit for significant laundering operations, facing severe reputational, legal, and regulatory risks.

References

  1. EBA (European Banking Authority). (2021). Opinion of the European Banking Authority on the risks of money laundering and terrorist financing affecting the European Union's financial sector. European Banking Authority. https://eba.europa.eu

  2. Financial Action Task Force (FATF). (2018). Professional money laundering. FATF. https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Professional-Money-Laundering.pdf

  3. FATF (Financial Action Task Force). (1997, February). 1996-1997 report on money laundering typologies. FATF. https://www.fatf-gafi.org/en/publications.html

  4. FATF (Financial Action Task Force). (1998). 1997-1998 report on money laundering typologies. FATF . https://www.fatf-gafi.org/content/dam/fatf-gafi/annual-reports/1997%201998%20ENG.pdf