Make no mistake – fraudsters are creative. While their work is deceitful and illicit, if not always outright illegal, they take advantage of gaps in systems and processes to perpetrate financial crimes that are rarely – if ever – victimless.
The financial services industry often concentrates on the initial part of a scam, typically leaving the aftermath and outcomes overlooked. The crucial aspect often neglected is where the ill-gotten gains from scams or fraud end up. To capitalize on this lack of transparency, fraudsters are turning to the use of money mules, a type of fraud that the U.S. Department of Justice defines as:
Money mules are people who, at someone else’s direction, receive and move money obtained from victims of fraud. Some money mules know that they have been recruited to assist in criminal activity. Knowingly moving money for illegal activities can lead to serious consequences — including criminal charges. Other money mules, however, move money in someone else’s direction, not knowing that their activity benefits fraudsters. These individuals, even if they don’t realize it, enable fraudsters to harm others.
In money mule scams, “mules” play a pivotal role in all of this, acting as the linchpin in the fraudulent process by facilitating the transfer of stolen funds to criminals. Whether utilizing their own bank accounts or opening new ones solely for the purposes of fraud, money mules aid criminals in evading typical identity verification checks, making it challenging to trace funds acquired from scams or account takeover attacks (ATO).
Once the funds are in the possession of fraudsters, they work to find ways to transfer those funds to mules. That begins a series of various activities, such as transferring, withdrawing, or using the money to purchase high-value items for later resale. A staggering revelation from recent research underscores the severity of the issue – almost two-thirds of individuals in the U.S. and U.K. have encountered attempts to recruit them as money mules. This alarming trend is fueled by a confluence of factors, including inflation and the rising cost of living. Opportunistic recruitment methods on social media and gaming networks, coupled with increasingly sophisticated scam tactics, contribute to the escalating prevalence of the money mule attack approach.
As fraudsters continually evolve their strategies for scams and fraudulent activities, banks can no longer concentrate solely on preventing funds from leaving their customers' accounts. It is imperative for them to be equally vigilant regarding the funds entering customers' accounts, particularly those associated with money mules. Essentially, banks must proactively monitor both outbound and inbound transactions to thwart criminals from capitalizing on illicit activities. The diligent monitoring of incoming payments becomes pivotal in unveiling money mules, ensuring customer trust, preventing financial crimes and safeguarding revenues.
Financial institutions such as banks and credit unions may currently lack comprehensive strategies to eradicate money mule activity within their operations. By adopting a robust identity verification approach, however, they can implement a disciplined strategy capable of identifying and thwarting money mule scams. This proactive approach not only detects such fraudulent activities but also serves as a deterrent, sending a clear message to fraudsters that their tactics will be ineffective within the institution.
Although it is a relatively new phenomenon, money mules have become integral components of sophisticated financial crimes. They act as intermediaries between criminals and their ill-gotten gains and play a pivotal role in facilitating the movement of stolen funds, serving as conduits for the transfer of money obtained through fraudulent activities. The term "money mule" refers to individuals who, often unwittingly, allow their bank accounts to be used for the illicit transfer of funds.
After the funds infiltrate the financial system, money mules take on the role of "layering" or systematically moving funds across various accounts to obscure the true origin of criminal proceeds. While there is still a legitimate paper trail, adding complexity and layers of steps make it all harder to detect and track. The process involves transferring funds through a series of accounts, creating multiple layers that serve as a protective barrier between the fraudsters and the ultimate destination of the funds. The intention is to insulate both individuals and their organizations by adding complexity to the money trail.
The layering technique extends beyond individuals; it may involve the creation of shell or front companies to present the funds as legitimate. This step aims to give the illicit funds a semblance of authenticity, allowing them to exit the financial system with a new narrative or a rebranded source. By introducing multiple layers and utilizing individuals or fictitious entities, criminals create a level of obfuscation that hinders investigators and financial institutions from following the money trail accurately.
The FBI classifies money mules into three categories based on their intentions and degree of involvement:
The process unfolds in a rather straightforward series of processes, usually following these steps:
1. The criminal illicitly acquires funds through various methods, such as phishing, e-commerce fraud, or illegal sales.
2. The criminal recruits a money mule, whether witting or unwitting.
3. The criminal transfers the ill-gotten funds to the money mule's account.
4. The money mule engages in money laundering using diverse techniques, including:
a. Breaking down the money into multiple sums and distributing it across various accounts before transferring.
b. Directly transferring the money to a third-party account.
c. Converting the funds into cryptocurrencies, such as BTC or ETH, before forwarding it.
5. The laundered money ultimately reaches the criminal.
The system seems simple enough, and one that would appear, on the surface, to be easy to detect. But what makes the whole endeavor so hard to shut down is that mules are operating in so many ways, through a wide variety of channels, and are being recruited (again, this recruitment is done to both willing participants and innocent bystanders). Let’s look at how mules are pulled into action.
The path to becoming a money mule often begins with the art of persuasion, where criminals leverage various tactics, preying on human emotions like desperation, trust, or even love. These tactics include:
While online scams are a persistent threat to all consumers, there is a concerning lack of awareness about the insidious threat of money mules. What makes this particularly complicated is the ubiquity of bank account participation, which creates a broad and diverse range of potential victims. In the U.K., it is estimated that more than 99% of citizens have bank accounts, which means, that to criminals, there are more than 67 million potential victims or partners.
Thankfully, there have been recent successful efforts to stop money mule activity. Of special note is the European Money Mule Action (EMMA) 2022, a law enforcement effort with collaboration from 25 European countries, backed by Europol, Interpol, and others, that was intended to crack down on money mules. The effort identified almost 10,000 money mules across Europe and resulted in the prevention of almost €32M (almost $35M USD) in ill-gotten gains.
Yet, even with efforts like these, investigators in the U.K., Europe, and the U.S. have observed several significant shifts in the landscape of international money laundering and money mule activity in particular. Across the EU, migrants from Ukraine, looking for safe passage out of their war-torn homeland, have become increasingly vulnerable targets for criminals seeking unwitting accomplices in illicit activities. Exploiting the migrants' vulnerability and economic distress, criminals coerce them into unknowingly participating in money laundering schemes, often by compelling them to open bank accounts.
A surge in bank impersonation crimes has also been noted, particularly affecting the elderly population. Perpetrators frequently go as far as visiting victims in person to acquire copies of identity documents and signatures.
Adding to the concerns is the emerging trend of utilizing artificial intelligence for fraudulent purposes. Criminals are now leveraging AI to create fake identities, allowing them to circumvent Know Your Customer (KYC) security features during the online account creation process. This sophisticated approach poses a significant challenge to traditional security measures.
Among the most effective solutions for combatting money mule fraud is applying an identity verification solution that gives fraud teams at banks and financial institutions the ability to accurately identify legitimate users. With that information, verified individuals can be granted access to business products and services. Those who are flagged because there are identity qualification discrepancies (due to being fake, stolen, or synthetic identities) can be denied access. This gives fraud teams the ability to prevent money mule activity before it can start, which protects their users and their own company systems.
These solutions also leverage what can be termed as "scam signals" to effectively identify potential scams during online sessions. These signals are a combination of advanced technologies and algorithms designed to detect suspicious activities, irregularities, and patterns that may indicate fraudulent behavior, particularly in the context of scams involving money mules.
First off, it’s critical to understand the different layers of how identities are used in these processes. Identity verification is the confirmation process that establishes that an individual is genuinely who they claim to be. Typically conducted during the initial stages of onboarding a new customer, this process involves evaluating evidence of personal data from the customer, such as a digital copy of a government-issued ID and a phone number.
Prove has been regularly praised for our unique approach to identity verification. We employ a phone-centric methodology that has demonstrated itself as a more convenient and expeditious means of authenticating digital identity. This approach guarantees optimal efficiency while maintaining a seamless user experience.
Our Prove Identity® digital identity verification solution relies on billions of signals from authoritative sources pulled in near real-time, making it a powerful – and essential – proxy for digital identity and trust. If you think about how many people have mobile phones, how long they have had them, and how often they use them, you can see why these attributes and related telephony signals can be highly correlated with identity and trustworthiness. Instead of scanning IDs and uploading them to the company’s system, Prove establishes trust across the customer journey.
We also provide digital identity authentication, which is the ongoing validation of a previously verified client (done after identity verification), which ensures that the person accessing the account is indeed the rightful owner. Authentication procedures are commonly implemented whenever an individual interacts with the company's system.
Various authentication methods include:
By employing robust and comprehensive digital identity verification solutions, banks, credit unions, and other financial institutions can fortify their defenses against money mule activities. These solutions, encompassing real-time monitoring, behavioral analysis, and advanced authentication methods, empower fraud teams to identify – accurately and definitively – fraudsters and thwart money mule operations.
Join over 1,000 businesses that rely on Prove across multiple industries, including banking, FinTech, healthcare, insurance, and e-commerce. Contact us today.
Trusted by 1,000+ leading companies to reduce fraud and improve consumer experiences. Contact us today to learn how you can frictionlessly secure your digital consumer journey — from onboarding to ongoing transactions.
Tap the button below to read our latest white-paper on the subject as industry leaders.
Contact us to learn how leading companies are using Prove Pre-Fill to modernize the account creation process by shaving off clicks and keystrokes that kill conversion.
Get in touch to find out how we can help you identify your customers at every stage of their journey and offer them seamless and secure experiences.
Let our expert team guide you through our identity verification and authentication solutions. Select a date and time that works for you.
Find out how we can help you deliver seamless and secure customer experiences that comply with PSD2/SCA. Select a date and time that works for you.
Download Aite-Novarica Group’s full report about Prove Pre-Fill, including a product overview, customer results, and how the product works.
Download the guide now to learn how you can improve security, cut down on fraud, and create the best possible customer experience.