Criminals invent phony liabilities in a company’s books, recording fraudulent ‘payables’ as if owed to purported suppliers or creditors, thereby disguising illicit outflows as ordinary business expenses. By falsifying invoices or contractual obligations, they embed layers of deception into corporate records, obscuring the origin and destination of laundered proceeds. Often, bogus delivery notes and invoices are used not only to justify these fabricated payables but also to secure financing from financial institutions. In some schemes, nonexistent obligations involve no goods or services delivered, while others rely on ghost vendors that exist only on paper. Repeated line items or overpayments to sham creditors can further signal duplicate or false invoices. These manipulations exploit routine payables processes and hamper detection, enabling complex layering under the guise of legitimate expenses.
Fictitious Creditors
Fake Creditors
Tactics
By fabricating nonexistent liabilities and associated paperwork, criminals introduce additional transactional steps that mask the flow of illicit funds as ordinary payables. This deliberate complexity obscures the link between the funds' origin and final recipients, exemplifying a layering strategy to evade straightforward detection.
Risks
Criminals exploit vulnerabilities in a business customer's accounting profile by inventing phony financial obligations and forging invoices or delivery notes. These fictitious liabilities mask suspicious outflows as legitimate payables, distorting the customer's transactional behavior and obscuring the origin of illicit funds. This is the primary risk because it relies on the false representation of the customer’s financial position to undermine AML monitoring efforts.
The technique exploits vulnerabilities in financing products such as invoice or supply chain financing. Criminals submit forged invoices or claim nonexistent payables to secure funds, embedding illicit proceeds under the guise of legitimate business credit. By misusing these financial instruments, they further layer and conceal illicit flows.
Indicators
Frequent outflows recorded as payables to newly formed or unknown vendors lacking any legitimate business operations or verifiable contact details.
Company representatives provide incomplete or inconsistent documentation when asked to substantiate listed liabilities to purported creditors.
Invoices show repeated or identical line items across separate vendors, indicating possible duplication of fictitious expenses.
Alleged creditor entities in the company's records share the same registration address or contact details as company insiders.
Corporate payables for products or services unrelated to the entity’s stated line of business or operational scope.
Multiple 'creditor' entities with overlapping beneficial ownership appear in the company’s payables ledger without legitimate explanation.
Use of inflated or duplicated invoices as collateral to secure financing or credit lines, despite no genuine underlying transactions or delivered goods.
Data Sources
Provides official financial statements, accounting records, and tax filings that can confirm or refute the legitimacy of reported liabilities. Facilitates cross-checking payables entries with declared expenses and verifying the authenticity of vendors or creditors. Supports identifying fabricated or inflated liabilities that do not match the entity’s operational or financial profile.
Enables scrutiny of the authenticity, amounts, line items, and parties listed on invoices or contracts. Helps identify repeated or duplicated invoices across different alleged creditors and verifies if services or goods align with the entity’s actual business activities.
Documents the timing, amounts, and recipients of outgoing payments, enabling investigators to detect suspicious patterns of payables to newly formed or unverified creditors. Reveals potential layering of multiple outflows orchestrated to fictitious or shell entities under the guise of legitimate expenditures.
Contains records of the entity’s stated line of business, operational scope, revenue sources, and expense categories. This allows for a comparison between claimed activities and the nature of recorded payables to detect incongruent or fabricated liabilities.
Comprehensively details the underlying collateral, supporting documentation, and obligations used to secure financing. This is useful in uncovering inflated or duplicated invoices used as collateral to disguise nonexistent transactions and launder funds under the pretense of legitimate credit arrangements.
Provides official data on corporate registration, ownership structures, and beneficial owners, enabling verification of vendor legitimacy. It is essential to confirm if purported creditors are legitimate businesses or share suspicious overlaps with company insiders.
Mitigations
Apply additional verification whenever a customer’s payable obligations appear excessive, repetitive, or mismatched to its line of business. Require detailed supporting documents (e.g., contracts, delivery notes) for each claimed creditor, and cross-check vendor legitimacy via independent data sources. This specialized scrutiny helps uncover invented liabilities and ghost vendors.
Implement specific monitoring rules to detect unusual payable patterns, such as repeated invoice numbers across different vendors, excessive outflows to newly formed vendors, or payables inconsistent with the customer’s normal business profile. Investigations must verify whether the claimed liabilities and suppliers actually reflect legitimate transactions, thereby exposing fictitious creditor schemes.
Educate frontline and compliance teams on detecting signals of fabricated payables, such as identical invoice line items for multiple vendors, unverifiable creditor details, or repetition of the same supporting documents. Provide clear escalation triggers and standard checklists for scrutinizing questionable invoices and suspicious creditor profiles.
Conduct periodic examinations of client invoices, payment records, and creditor details to identify inflated or duplicated liabilities. Auditors compare invoice data against known business practices and market rates, recommending control enhancements to detect and prevent the creation of fraudulent payables.
Cross-check purported creditors using publicly available data: confirm registered operating addresses, phone numbers, and any regulatory listings. Investigate discrepancies such as nonexistent business premises or vendor details overlapping with company insiders. This validation process helps expose false or non-operational creditors.
Where invoices reference shipments or deliveries, verify supporting transport documents, bills of lading, or customs records against the stated goods or services. Check that counterparties exist and operate in the indicated trade sector to help detect sham invoices or nonexistent goods associated with fictitious payables.
Instruments
- Companies issue checks to false creditors, recording them as normal payables in internal bookkeeping.
- The physical or electronic checks appear as legitimate business payments, helping criminals mask outflows of illicit funds.
- This method leverages the routine nature of check payments, making it harder for auditors or financial institutions to detect the deceptive transactions.
- Illicit outflows are disguised as routine payables by transferring funds from a legitimate business account to accounts held by fictitious creditors.
- Because vendor payments typically flow through ordinary business accounts, these transfers blend seamlessly with genuine expenses, reducing suspicion.
- Once deposited, criminals can further layer or withdraw the proceeds from the sham vendor’s account, continuing the laundering process.
- Fictitious creditors may present forged shipping documents or bogus invoices for non-existent goods when applying for trade finance.
- These misleading trade documents enable criminals to secure funding or guarantees, integrating illicit proceeds under the cover of customary import/export transactions.
- By embedding counterfeit details among genuine trade documentation, offenders create additional layers that obscure the flow of illegal funds within standard financial processes.
- Criminals fabricate vendor invoices to justify payables that do not actually exist, classifying them as legitimate liabilities in the company’s books.
- From the sham vendor’s perspective, these invoices represent ‘Accounts Receivable.’ Banks or factoring services may finance these claims, embedding illicit funds under the guise of normal business credit.
- This manipulation allows perpetrators to funnel money out of the company while appearing to satisfy ordinary obligations disclosed in corporate records.
Service & Products
- Fraudulent payables are generated and managed within automated invoicing systems, concealing them among genuine transactions.
- Bogus invoices are systematically tracked and approved, normalizing suspicious outflows and hampering detection.
- Criminals can funnel illicit funds through ordinary business accounts by issuing checks or electronic payments to sham creditors, masking these as routine payables.
- Repeated outflows to ghost vendors appear as standard supplier expenses, reducing detection likelihood within normal expense monitoring processes.
- Fraudulent liabilities can be introduced into supply chain financing agreements, allowing criminals to receive funding for non-existent goods or services.
- These fictitious obligations help launder proceeds by blending them into legitimate operational financing, obscuring the true nature of transactions.
- Criminals submit forged invoices to obtain financing for work never performed or goods never delivered.
- Illicit funds are transformed into legitimate receivables, allowing criminals to access cash while hiding the true source of the money.
- Complicit or negligent accounting services can be exploited to record non-existent creditors and generate fraudulent invoices.
- These manipulations embed illegal outflows into official financial records, making them appear as normal business expenses.
Actors
Accountants, whether complicit or negligent, facilitate the scheme by:
- Recording or overlooking fabricated liabilities and payables in a company’s official ledgers.
- Accepting or producing invoices for goods or services that were never delivered.
Financial institutions rely heavily on accounting records for due diligence; manipulated financial statements can therefore appear legitimate, undercutting monitoring and detection efforts.
Business entities can knowingly or unknowingly facilitate fictitious creditor schemes by:
- Entering non-existent payables in their accounting records.
- Generating or approving fraudulent invoices categorized as ordinary expenses.
These deceptive liabilities appear legitimate to financial institutions, obscuring illicit outflows as routine supplier payments and thereby complicating transaction monitoring.
Shell or front companies, often established intentionally for illicit purposes, act as ghost vendors or sham creditors by:
- Providing fraudulent invoices or delivery notes for non-existent goods or services.
- Serving as artificial recipients for payments categorized as routine payables.
Their involvement complicates due diligence for financial institutions, as verifying these paper-only entities is difficult, masking illicit flows under normal supplier transactions.
Financial institutions are unwittingly exploited when:
- Providing financing (e.g., supply chain or invoice financing) based on forged invoices or fake payables.
- Processing payments to sham creditors that appear to be standard supplier or vendor disbursements.
This involvement undermines effective risk management and transaction monitoring, as the usual indicators of legitimate business activity are falsified.
References
APG (Asia/Pacific Group on Money Laundering). (2016). APG Yearly Typologies Report 2016: Methods and Trends of Money Laundering and Terrorism Financing. APG Secretariat. https://apgml.org/documents/default.aspx
EAG (Eurasian Group on Combating Money Laundering and Financing of Terrorism). (2024). Criteria for identifying suspicious money recovery lawsuits for the purpose of money laundering. EAG.https://eurasiangroup.org/files/uploads/files/Public_typology_reports/Criteria_for_identifying_suspicious_money_recovery_lawsuits_eng.pdf
ESAAMLG (Eastern and Southern Africa Anti-Money Laundering Group). (2019, September). Procurement corruption in the public sector and associated money laundering in the ESAAMLG region. ESAAMLG. https://www.esaamlg.org/reports/Report_procurement.pdf
Spann, D. D. (2014). Fraud Analytics: Strategies and Methods for Detection and Prevention. John Wiley & Sons, Inc