Mobile Payment Systems

Criminals exploit mobile payment platforms by opening accounts—often under fabricated or stolen identities—and layering illicit proceeds via numerous small, often anonymous or cross-border transactions. Non-bank operators offering these services across various jurisdictions may lack uniform AML/CFT controls, allowing rapid and opaque fund movement. In many cases, mobile payment services that enable P2P transfers can be classified as money or value transfer services (MVTS), requiring special licensing or registration if they issue or manage a means of payment. By routing funds through digital wallets and app-based transfers, launderers obscure the origin of money and circumvent traditional scrutiny tied to bank-based wire transfers. Repeated low-value transactions create fragmented trails that strain oversight efforts, especially when mobile payment operators have weak or inconsistent KYC protocols, further complicating investigation and detection.

[
Code
T0134.002
]
[
Name
Mobile Payment Systems
]
[
Version
1.0
]
[
Tactics
]
[
Risk
Customer Risk, Channel Risk, Jurisdictional Risk
]
[
Created
2025-02-11
]
[
Modified
2025-04-02
]

E-Wallet

Mobile Wallet

Mobile Money Services

Tactics

ML.TA0007
|
|

Criminals use frequent, low-value mobile payments—often across borders—to fragment transaction trails, deliberately obscuring any linkage to the original illicit source of funds.

Risks

RS0001
|
Customer Risk
|

Use of stolen or fabricated identities directly undermines KYC procedures. Criminals open numerous mobile payment accounts under false credentials, concealing beneficial ownership and creating challenges for investigators trying to link transactions back to illicit sources.

RS0003
|
Channel Risk
|

Criminals exploit mobile payment platforms' remote or app-based onboarding, which involves minimal in-person checks, to layer illicit funds. By spreading transactions across various non-bank or peer-to-peer channels, they circumvent traditional wire-transfer scrutiny and exploit weak KYC protocols, enabling the rapid cross-border movement of proceeds.

RS0004
|
Jurisdictional Risk
|

Criminals deliberately exploit the inconsistent or weaker AML/CFT rules of multiple jurisdictions for non-bank mobile payment operators. By routing funds through countries with lax controls, they reduce the likelihood of detection and take advantage of regulatory arbitrage to fragment transaction trails.

Indicators

IND00001
|

Cross-border mobile payment transactions where the destination and origin countries do not align with the customer's declared residency or business location.

IND00002
|

Frequent use of third-party mobile payment accounts in transactions, with unclear or unverifiable beneficial ownership.

IND00003
|

A sudden surge or spike in mobile payment activity that deviates significantly from the customer’s established transaction history or usual behavior.

IND00008
|

Highly structured transactions executed through mobile payment platforms, with amounts deliberately kept just below regulatory reporting thresholds.

IND00009
|

Discrepancies between the geographic location data (e.g., IP addresses or mobile geolocation) of mobile transactions and the registered address provided during account setup.

IND00018
|

Multiple mobile wallet registrations from the same device or related device identifiers, indicating layered account usage.

IND00019
|

Frequent switching of funds across various mobile payment services, from person-to-person transfers to online purchases, making it difficult to trace the original source of funds.

IND00182
|

Frequent small-value transactions completed via mobile payment platforms in short intervals, consistent with layering patterns.

IND00183
|

Frequent rapid transfers across multiple mobile payment accounts, with minimal holding periods and no stated business rationale.

IND00184
|

Mobile payment accounts registered with inconsistent or falsified identification details that contradict official KYC records.

Data Sources

Includes IP addresses, device identifiers, and geolocation data for mobile payment platforms. This data allows for the detection of device or geographic anomalies, such as multiple wallet registrations from the same device or IP address mismatches. It supports the investigation of layered account usage, cross-border activities, and rapid fund transfers.

Captures transaction details from mobile wallets and P2P payment platforms, including timestamps, amounts, user IDs, and transaction types. This data enables the detection of unusual volume spikes, structured transaction patterns, and frequent switching among different mobile payment services for layering.

Contains official licensing and registration information for money service businesses, including mobile payment and remittance service providers. By verifying regulatory compliance status, investigators can identify unregistered or illegally operating mobile payment entities that may facilitate illicit fund movements and layering activities.

Contains verified identity and beneficial ownership data for mobile payment account holders, ensuring the authenticity of provided credentials and detecting falsified or stolen identities that facilitate illicit layering or cross-border transfers.

Provides cross-border origin and destination data for mobile transactions. This data identifies unusual or high-risk jurisdictions and detects discrepancies between declared residency or business location and actual transaction flows, supporting the identification of layering and structuring patterns in mobile payments.

Mitigations

Identify and classify jurisdictions with lax AML regulations where mobile payments are frequently routed. Apply stricter transaction controls and enhanced checks for cross-border flows from or to those areas, mitigating layering risk tied to high-risk geographies.

Require deeper verification for mobile payment users who exhibit high-risk indicators, such as multiple device registrations or unusually high cross-border transaction volumes. Confirm the authenticity of identity documentation and the source of funds to mitigate the risk posed by fabricated or stolen IDs used in layering schemes.

Implement rigorous remote identity verification for mobile payment account openings, including real-time device validation, live photo or video checks, and proof of phone number ownership. Confirm the legitimacy of each customer's identity credentials to close common entry points for layering.

Implement real-time or periodic monitoring of mobile payment transactions to detect patterns of frequent, low-value cross-border transfers lacking legitimate business justification. Flag anomalies such as multiple transactions from the same device ID for different accounts or repeated transactions just below regulatory thresholds to identify layering attempts early.

Require non-bank or partner mobile payment providers operating cross-border to implement standardized KYC and AML protocols. Regularly review their compliance processes, transaction thresholds, and suspicious activity reporting to block opportunities for layering through loosely regulated operators.

Enforce multi-factor authentication and additional security checks for high-risk mobile payment functions. Continuously monitor account access frequency, device changes, and IP address anomalies that may indicate hijacked or fabricated identities used in layering schemes.

Provide specialized training for frontline and investigative teams to spot patterns unique to mobile payment layering, such as multiple low-value cross-border transactions at abnormal frequencies. Emphasize the identification of stolen or falsified identities, device mismatches, and repeated use of the same device for different accounts.

Maintain precise logs capturing device identifiers, IP addresses, geolocation data, and transaction details for each mobile payment. Retain this information under secure conditions to help investigators trace fragmented layering sequences and identify associated accounts or patterns.

  • Educate mobile payment users on the risks of granting third parties access to their accounts or devices.
  • Clarify legal obligations around reporting suspicious activity.
  • Encourage secure handling of login credentials.
  • Promote active monitoring of account activity to reduce misuse by launderers.

Assign higher risk ratings to customers who rely heavily on P2P mobile transfers, exhibit inconsistent geolocation records, or carry out frequent cross-border transactions. Tailor more stringent transaction alert rules and investigative procedures when these layering vulnerabilities are present.

Use external databases and open-source intelligence to validate mobile payment customer details, such as verifying contact numbers or addresses that appear in public records or social media. Investigate discrepancies or incomplete information that may mask stolen identities or layering setups.

Establish secure channels to share emerging typologies, device fingerprint data, and cross-border money flow indicators with other mobile payment operators, financial institutions, and regulators. Coordinate on blocking high-risk accounts or devices flagged for suspicious layering activity.

Limit or temporarily block high-risk features, such as cross-border transfers, for newly onboarded or unverified mobile payment users until robust KYC is completed. Impose volume or time-based transaction caps to disrupt rapid layering cycles and prompt further review of questionable activity.

Continuously reassess mobile payment customer risk profiles by monitoring transaction volumes, device usage patterns, and known aliases. Investigate unexpected surges in small-amount transfers or sudden spikes in cross-border activity to detect emerging layering behavior.

Instruments

  • Criminals register mobile payment accounts functioning as stored-value wallets under false or stolen identities, bypassing stricter KYC controls.
  • These wallets allow the rapid loading and transferring of illicit funds in small increments across jurisdictions, making it harder for authorities to trace the money’s origin.
  • By executing numerous transactions below reporting thresholds, launderers exploit fragmented transaction trails and inconsistent AML requirements among non-bank mobile payment operators.
  • The ease of remote, app-based onboarding facilitates layering by quickly moving funds between multiple accounts and jurisdictions without triggering traditional banking scrutiny.

Service & Products

  • Criminals exploit P2P features by rotating funds among multiple accounts or third-party wallets, making transaction patterns difficult to trace.
  • Minimal KYC requirements or loopholes allow frequent micro-transactions that evade immediate detection.
  • Criminals use falsified or stolen identities to open mobile payment accounts, moving illicit funds through numerous low-value transactions.
  • Rapid cross-border transfers and inconsistent AML protocols enable layering that obscures the origin of proceeds.
  • Illicit proceeds are funneled through multiple digital wallets, fragmenting transaction trails and complicating oversight.
  • Weak or inconsistent customer verification in some wallet services allows criminals to obscure the true origin and ownership of funds.
  • Criminals utilize non-bank remittance or money transfer operators with lax oversight to move dirty funds through mobile channels.
  • Frequent cross-border micro-remittances bypass stricter bank-level controls, aiding layering efforts.

Actors

Peer-to-peer platform operators enable direct user-to-user transfers, which criminals exploit by rotating funds among multiple wallets or accounts. Limited KYC requirements on some platforms allow frequent, small-scale transactions that remain below reporting thresholds, obscuring the flow of illicit funds. This hampers financial institutions' ability to track and piece together the full transaction history during investigations.

Illicit operators open mobile payment accounts under fabricated or stolen identities, conducting frequent, small-value transfers that fragment the transaction chain. By layering funds across multiple digital wallets or P2P services, they obscure the illicit origin of the money. This practice complicates customer due diligence and transaction monitoring for financial institutions, as the fragmented transactions are harder to link back to a single criminal source.

Document forgers produce or supply falsified identification records that enable criminals to pass KYC checks for mobile payment account setup. By providing fraudulent documentation, they undermine verification processes and allow illicit operators to open multiple accounts under false identities, complicating financial institutions' efforts to validate customer information.

Mobile money operators offer app-based payment services and often function as non-bank financial entities. Criminals exploit these platforms' rapid onboarding and inconsistent AML controls across different jurisdictions to conduct repeated micro-transactions that obscure the money trail. These fragmented and cross-border transfers challenge financial institutions by making it more difficult to detect suspicious transaction patterns and verify user identities.

References

  1. Financial Action Task Force (FATF). (2010, July). Global money laundering & terrorist financing threat assessment. FATF. https://www.fatf-gafi.org/en/publications/Methodsandtrends/Globalmoneylaunderingterroristfinancingthreatassessment.html

  2. FATF (Financial Action Task Force). (2013, June). Guidance for a risk-based approach prepaid cards, mobile payments and internet-based payment services. FATF. https://www.fatf-gafi.org/en/publications/Fatfrecommendations/Rba-npps-2013.html

  3. Tropina, T. (2014). Fighting money laundering in the age of online banking, virtual currencies and internet gambling. Max-Planck Institute for Foreign and International Criminal Law. ERA Forum 15(1):69-84. DOI:10.1007/s12027-014-0335-2