Compliance Hub

Beyond the Numbers: A Modern Guide to Detecting and Preventing Financial Fraud

Site Logo
Tookitaki
15 min
read

Financial fraud is escalating into a global crisis, costing businesses and consumers billions every year.

According to the Association of Certified Fraud Examiners (ACFE), businesses lose an estimated 5% of their annual revenue to fraud—translating into staggering global losses that impact profitability, investor trust, and long-term stability.

Even individuals aren’t safe. Recent data from the Federal Trade Commission (FTC) revealed that consumers reported nearly $8.8 billion in fraud losses in 2022, a sharp 30% increase from the previous year. From phishing scams to identity theft, fraud is surging at every level—affecting corporations, banks, and everyday people alike.

In this article, we’ll break down the fundamentals of financial fraud, examine its impact on organisations, explore key red flags to watch for, and highlight how advanced AML fraud detection strategies can help financial institutions stay ahead of these ever-evolving threats.

Understanding the Landscape of Financial Crime and the Role of AML Fraud Detection

The financial crime landscape is increasingly complex, driven by evolving technologies, global financial connectivity, and increasingly sophisticated criminal networks. For financial institutions, staying ahead of this rapidly changing environment is not just about compliance—it’s a matter of survival.

Fraudsters today leverage advanced tools and global networks to exploit vulnerabilities across digital channels. As a result, effective AML fraud detection strategies must adapt to a broader and more intricate threat landscape.

Key Challenges in Financial Crime Today:

  • Identity theft and account takeovers
  • Cyberattacks and large-scale data breaches
  • Terrorist financing and politically exposed transactions
  • Layered, cross-border money laundering schemes

Complicating matters further is the growing weight of global regulatory expectations. Financial institutions must not only meet anti-money laundering (AML) and counter-terrorism financing (CFT) obligations, but also evolve quickly to remain compliant with new rules, risk typologies, and jurisdictions.

The actors behind financial crime are often part of highly coordinated, well-funded networks. Detecting such activity goes beyond flagging individual transactions—it requires uncovering patterns, anomalies, and behaviours using advanced AML fraud detection systems powered by AI and machine learning.

At the same time, innovation in fintech, payments, and cross-border services is introducing new fraud vulnerabilities. Staying ahead of these emerging threats means financial institutions must embrace both technological agility and a deep understanding of criminal methodologies.

In the next section, we'll explore how technology is transforming the fight against financial crime—and how the next generation of AML fraud detection tools is reshaping compliance as we know it.

Financial Fraud

What Is Financial Fraud? Common Types You Need to Know

Financial fraud refers to deceptive activities carried out for unlawful financial gain—often resulting in significant losses for individuals, corporations, and financial institutions. These fraudulent acts range from small-scale identity theft to elaborate investment scams, all of which undermine trust in the financial system and call for robust AML fraud detection measures.

Here are some of the most common types of financial fraud today:

  • Identity Theft: Identity theft occurs when a fraudster steals someone’s personal information, such as their name, date of birth, Social Security number, or banking credentials, to impersonate them. Criminals may use this stolen identity to open fraudulent accounts, secure loans, or make unauthorised transactions.
  • Credit Card Fraud: This form of fraud involves the unauthorised use of someone’s credit card or card details to make purchases or withdraw money. It’s one of the most common types of financial fraud in the digital era, especially in card-not-present (CNP) environments like e-commerce platforms.
  • Ponzi Schemes: A Ponzi scheme is a fraudulent investment scam that promises high returns with little or no risk. Early investors may receive payouts—funded not by profits but by money from new investors. Eventually, the scheme collapses when new funds dry up, leaving later investors with heavy losses.

As fraud types grow in sophistication, financial institutions must evolve their detection strategies. A strong AML fraud detection system is built not only to catch known fraud types but also to adapt to new and emerging typologies through machine learning and expert-driven scenario modelling.

{{cta-first}}

Real-Life Examples of Financial Fraud

Enron Scandal (2001):

The Enron scandal is one of the most infamous examples of financial fraud in recent history. Enron, once considered a powerhouse in the energy sector, engaged in accounting practices that inflated the company's profits and hid its debts. Executives created off-the-books partnerships to conceal losses and boost stock prices artificially. When the truth came to light, Enron filed for bankruptcy in 2001, resulting in significant financial losses for investors and employees.

Bernie Madoff's Ponzi Scheme (2008):

Bernie Madoff orchestrated one of the largest Ponzi schemes in history. Operating for several decades, Madoff attracted investors with promises of consistent, high returns. However, instead of investing the funds, he used new investors' money to pay returns to earlier investors. This fraudulent scheme unravelled in 2008 during the global financial crisis when investors sought to withdraw their funds. Madoff admitted to the fraud, and the fallout led to substantial financial losses for thousands of investors. Madoff was convicted and sentenced to 150 years in prison.

How does it affect financial organisations?

Financial fraud has a profound and far-reaching impact on the organisations ensnared in its web. The repercussions extend beyond mere monetary losses, touching upon various aspects that can severely disrupt the stability and reputation of financial institutions.

1. Widespread Financial Loss:

The most immediate and tangible consequence of financial fraud for organisations is the financial hit they take. Whether it's through embezzlement, deceptive accounting practices, or other fraudulent activities, these illicit manoeuvres can result in substantial monetary losses. These losses can directly affect the bottom line, compromising the financial health and sustainability of the organisation.

2. Loss of Trust and Confidence in Their Services:

Financial institutions thrive on trust. When fraud is exposed, it erodes the trust and confidence that clients, investors, and the general public have in the institution. Customers may question the security of their accounts and investments, leading to a loss of faith in the institution's ability to safeguard their financial interests. Rebuilding this trust becomes a challenging and time-consuming process.

3. Government Investigations and Punitive Actions:

Financial fraud often triggers government investigations and regulatory scrutiny. Authorities step in to assess the extent of the wrongdoing and to ensure compliance with financial regulations. The fallout can include hefty fines, legal actions, and regulatory sanctions against the organisation and its key figures. These punitive measures not only carry financial consequences but also tarnish the institution's standing in the eyes of both clients and the broader financial community.

In some cases, the damage isn't just financial; it's reputational. Financial organisations rely heavily on their reputation for stability, reliability, and integrity. When fraud comes to light, it casts a dark shadow over these pillars, making it challenging to regain the trust of clients and stakeholders. The aftermath of financial fraud, therefore, involves a complex process of financial recovery, regulatory compliance, and rebuilding the shattered trust that is essential for the long-term success of any financial institution.

Red Flags of Financial Fraud

Identifying red flags is crucial for detecting and preventing fraud. Unusual transaction patterns, sudden changes in account activity, and discrepancies in financial records are key indicators. Awareness of these signs is essential for timely intervention.

1. Unusual Transaction Patterns:

From a business standpoint, unexpected spikes or drops in transaction volumes can be a red flag. For example, an unusual surge in transactions within a short time frame or irregularities in the size and frequency of transactions could signal potential fraudulent activity. This is particularly crucial for businesses that deal with a high volume of transactions, such as e-commerce platforms or financial institutions, as detecting anomalies in the transaction flow becomes essential.

2. Sudden Changes in Account Activity:

Businesses often maintain multiple accounts for various purposes, and sudden changes in the activity of these accounts can raise suspicions. For instance, if an account that typically sees a steady flow of transactions suddenly experiences a surge in withdrawals or transfers, it could be indicative of unauthorised or fraudulent activity. Timely monitoring of account activities becomes vital to identify and address such abrupt changes before they escalate into substantial financial losses.

3. Discrepancies in Financial Records:

Businesses rely on accurate financial records for decision-making and reporting. Discrepancies in these records, such as unexplained variances between reported and actual figures, can be a red flag. For instance, unexpected adjustments to financial statements or inconsistencies in accounting entries may suggest fraudulent attempts to manipulate financial data. Businesses must maintain robust internal controls and conduct regular audits to promptly detect and rectify any irregularities in their financial records.

Fraud Prevention Measures

Implementing robust prevention measures is vital for safeguarding against financial fraud. This includes strict authentication protocols, employee training programs, and the use of advanced security technologies to secure sensitive data.

1. Strict Authentication Protocols:

Establishing stringent authentication protocols is the first line of defence against unauthorised access and fraudulent activities. This involves implementing multi-factor authentication (MFA) mechanisms, such as combining passwords with biometric verification or token-based systems. By requiring multiple forms of verification, businesses add layers of security, making it more challenging for fraudsters to gain unauthorised access to sensitive accounts or systems.

2. Employee Training Programs:

Employees are often the frontline defence against fraud, and comprehensive training programs are instrumental in arming them with the knowledge and skills needed to identify and prevent fraudulent activities. Training should cover recognising phishing attempts, understanding social engineering tactics, and promoting a culture of security awareness. When employees are well-informed and vigilant, they become an invaluable asset in the organisation's efforts to combat fraud.

3. Use of Advanced Security Technologies:

Leveraging cutting-edge security technologies is imperative in the fight against financial fraud. This includes the implementation of artificial intelligence (AI) and machine learning (ML) algorithms that can analyse vast datasets in real-time, identifying patterns and anomalies indicative of fraudulent behaviour. Advanced encryption techniques ensure the secure transmission of sensitive data, protecting it from interception or unauthorised access.

4. Regular Security Audits and Assessments:

Conducting regular security audits and assessments is a proactive approach to identifying vulnerabilities and weaknesses in the organisation's systems and processes. This involves evaluating the effectiveness of existing security measures, conducting penetration testing, and staying abreast of the latest security threats. By regularly assessing the security landscape, businesses can adapt their fraud prevention strategies to address emerging risks.

5. Vendor and Third-Party Risk Management:

Businesses often collaborate with external vendors and third parties, and these partnerships can introduce additional risks. Implementing a robust vendor and third-party risk management program involves thoroughly vetting and monitoring the security practices of external entities. Clear contractual agreements should outline security expectations and establish accountability for maintaining a secure environment.

6. Data Encryption and Secure Storage Practices:

Protecting sensitive data is a cornerstone of fraud prevention. Implementing robust data encryption practices ensures that even if unauthorised access occurs, the stolen data remains unreadable. Secure storage practices involve limiting access to sensitive information on a need-to-know basis and employing secure, encrypted databases to safeguard against data breaches.

Fraud Detection Techniques

Financial institutions employ various detection techniques to identify and mitigate fraud risks. These may include artificial intelligence, machine learning algorithms, anomaly detection, and behaviour analysis. Continuous monitoring and real-time alerts are also essential components.

1. Artificial Intelligence (AI):

AI is a game-changer in fraud detection in finance, offering the ability to analyse vast datasets at speeds beyond human capability. Machine learning models within the AI framework can adapt and learn from patterns, enabling more accurate detection of anomalies and unusual behaviours. AI systems can identify complex relationships and trends that might go unnoticed through traditional methods.

2. Machine Learning Algorithms:

Machine learning algorithms help fraud detection by continuously learning and adapting to new patterns of fraudulent activity. These algorithms can analyse historical transaction data to identify deviations and anomalies, making them highly effective in recognising irregularities that might indicate potential fraud. As they learn from new data, their accuracy in detecting fraud improves over time.

3. Anomaly Detection:

Anomaly detection involves identifying patterns that deviate significantly from the norm. In the context of financial fraud detection, this means recognising transactions or activities that stand out as unusual. Whether it's an unexpected spike in transaction volume, an unusual geographic location for a transaction, or atypical purchasing behaviour, anomaly detection algorithms excel at flagging potential instances of fraud.

4. Behaviour Analysis:

Behavioural analysis focuses on studying the patterns of individual users or entities. By establishing a baseline of normal behaviour for each user, deviations from this baseline can be flagged as potentially fraudulent. Behavioural analysis considers factors such as transaction frequency, typical transaction amounts, and the time of day transactions occur. Any deviation from these established patterns can trigger alerts for further investigation.

5. Continuous Monitoring:

Fraud detection is most effective when it occurs in real-time. Continuous transaction monitoring involves the ongoing scrutiny of transactions and activities as they happen. Real-time analysis allows for immediate response to potential threats, preventing fraudulent transactions before they can cause significant harm. This proactive approach is vital in the dynamic and fast-paced world of financial transactions.

6. Real-Time Alerts:

Real-time alerts are an essential component of financial fraud detection systems. When suspicious activity is identified, automated alerts are generated, prompting immediate action. These alerts can be sent to designated personnel or trigger automated responses, such as blocking a transaction or temporarily suspending an account, to prevent further fraudulent activity.

 

The Role of Technology in Fraud Detection

Technology has revolutionised fraud detection, equipping institutions with sophisticated tools to detect and prevent fraudulent activities. Today, automated systems analyse vast datasets, spotting anomalies that may indicate fraud.

Modern fraud detection systems integrate several technologies. Each contributes to a comprehensive surveillance framework. These technologies include:

  • Artificial Intelligence (AI) and Machine Learning (ML)
  • Data analytics for real-time insights
  • Blockchain for secure transactions
  • Behavioural analytics for monitoring user actions
  • Biometrics for enhanced identity verification

By implementing these technologies, financial institutions can detect fraud more accurately. This minimises the chance of false positives and improves customer experience. Moreover, technology streamlines investigation processes, enabling quicker response times when fraud occurs.

Despite the many benefits, integrating new technology poses challenges. Legacy systems may struggle to adapt, requiring thoughtful planning and investment to upgrade infrastructures. Careful implementation is critical to overcome these hurdles and harness technology's full potential in fraud detection.

Importantly, fraud detection technology must evolve alongside emerging threats. Hackers continually develop new methods to exploit vulnerabilities. Hence, an institution's technological defenses must be equally dynamic, updating capabilities and methodologies to stay ahead.

Leveraging AI and Machine Learning

AI and machine learning have become cornerstones of modern fraud detection. These technologies enable dynamic analysis, adapting as new patterns of fraud emerge.

Machine learning algorithms excel in analysing large data volumes. They identify fraud indicators by learning patterns in transactions, improving over time without human intervention. This ability reduces time spent on manual reviews.

AI also enhances decision-making through predictive analytics. By anticipating potential fraud risks before they occur, institutions can act proactively. This foresight is crucial in a rapidly evolving fraud landscape.

Furthermore, AI can decrease false positives. By refining algorithms and focusing on high-risk transactions, institutions enhance operational efficiency. Fewer false alerts reduce both costs and customer inconvenience, bolstering trust and confidence in the system.

Utilising Data Analytics for Pattern Recognition

Data analytics is pivotal for recognising fraud patterns and trends. It involves examining vast transaction datasets to detect subtle anomalies that could indicate fraudulent activities.

Advanced analytics tools use statistical methods and models to spot deviations from normal behavior. This helps identify potential threats quickly. Speed is essential, given the fast pace of today's financial transactions.

With analytics, institutions gain a holistic view of transaction flows and user behavior. Insights from these analyses inform risk profiles and fraud prevention strategies. These insights are crucial in understanding shifting fraud typologies and adapting defense mechanisms accordingly.

Furthermore, data analytics supports cross-departmental integration. By sharing analytic results across departments, institutions foster an environment of informed decision-making. This collaborative approach strengthens the institution's ability to respond to and prevent fraud effectively.

Continual Monitoring and Detection Processes

Continuous monitoring is crucial in an effective fraud prevention and detection framework. It ensures financial institutions can respond quickly to fraudulent activities.

Fraud detection must occur in real-time for maximum effectiveness. As financial transactions surge in volume and speed, a dynamic approach becomes necessary. Institutions must identify potential threats immediately.

Implementing continual monitoring involves various components:

  • Advanced analytics for transaction assessments
  • Automated alerts to flag suspicious activity
  • Integration of internal controls to protect assets
  • Regular updates to detection algorithms
  • Cross-functional teams for coordinated responses

These components work together to maintain vigilance against fraud. They allow institutions to adapt to new threats, ensuring long-term security.

Moreover, continual monitoring is not static. It requires frequent updates to stay ahead of emerging fraud tactics. This adaptability is vital for sustaining a robust defence.

Critically, this approach helps institutions build a comprehensive risk profile. Continuous insights enable the identification of new patterns and trends in fraudulent behaviour.

Real-Time Transaction Monitoring

Real-time transaction monitoring is a cornerstone of modern fraud prevention. It involves scrutinising transactions as they occur, allowing immediate intervention when suspicious activity is detected.

The speed of today's financial transactions necessitates this approach. By monitoring in real-time, institutions can promptly freeze accounts or notify authorities, limiting potential damage from fraud.

Additionally, real-time monitoring supports enhanced customer trust. Customers expect institutions to protect their financial well-being. Quick fraud detection can prevent unauthorised access to their accounts.

Systems used in real-time monitoring analyse vast amounts of transaction data. They apply rule-based algorithms to spot deviations from expected behaviour. These algorithms are continuously updated to reflect the latest fraud schemes.

Reducing False Positives with Advanced Algorithms

False positives are a significant challenge in fraud detection. They occur when legitimate transactions are flagged as fraudulent, causing unnecessary disruptions.

Advanced algorithms play a vital role in reducing false positives. By employing machine learning models, these algorithms improve accuracy over time. They refine their ability to distinguish between legitimate and suspicious activities.

These algorithms incorporate various data points, such as transaction frequency and customer behaviour, to enhance their analysis. They prioritise high-risk transactions, minimising the incidence of false alerts.

Reducing false positives is crucial for operational efficiency. It reduces the workload on fraud investigation teams and improves customer satisfaction. Customers are less likely to face transaction delays due to incorrect fraud alerts.

Furthermore, advanced algorithms ensure fraud prevention efforts do not impede business operations. They allow institutions to maintain a balance between security and customer convenience.

{{cta-ebook}}

Best Practices for Financial Institutions to Combat Fraud

Adopting best practices is crucial for financial institutions aiming to combat fraud effectively. With diverse threats, a proactive strategy helps mitigate fraud risks and strengthen defences. Institutions must consistently evaluate and refine their approaches to fraud prevention.

A comprehensive approach involves several key practices:

  • Establishing a culture of fraud prevention across all levels
  • Conducting regular risk assessments and adjusting strategies accordingly
  • Implementing robust internal controls to detect and prevent fraud
  • Leveraging advanced technologies to enhance fraud detection capabilities
  • Fostering cross-departmental collaboration to ensure unified efforts

Each of these practices plays a significant role in identifying, detecting, and preventing fraudulent activities. For instance, a strong culture of ethics and integrity reinforces the importance of fraud prevention. Regular risk assessments help pinpoint vulnerabilities and inform strategic adjustments.

By leveraging cutting-edge technologies like AI and machine learning, financial institutions can improve their fraud detection and prevention capabilities. These technologies enable real-time monitoring and swift identification of suspicious activities.

Cross-departmental collaboration enhances the effectiveness of anti-fraud efforts. Departments must share insights and align their objectives, ensuring a coordinated response to emerging threats.

Ultimately, maintaining a proactive and adaptive approach is essential. Financial institutions should stay informed about the latest developments in fraud techniques and prevention strategies. Regular updates to policies and practices enhance the overall resilience of the institution against fraud.

Establishing a Culture of Fraud Prevention

Cultivating a culture of fraud prevention is a foundational step for financial institutions. This requires commitment from leadership and active participation across the organisation.

Leadership must exemplify ethical behaviour. When employees see top management upholding integrity, it reinforces the importance of ethical conduct. Leaders should set clear expectations and support open communication about fraud risks and prevention measures.

Institutions should prioritise transparency in their operations. Open discussions about fraud risks and the institution’s fraud prevention strategies encourage staff buy-in. This transparency fosters trust and empowers employees to be vigilant against potential fraud.

Finally, rewarding employees who identify and report fraud is crucial. Recognition of proactive behaviour builds a supportive environment. This encourages others to remain attentive and engaged in fraud prevention efforts, strengthening the institution's defences against fraud.

Employee Training and Cross-Departmental Collaboration

Robust employee training is essential for effective fraud prevention. Regular training sessions keep staff informed about emerging fraud tactics and evolving regulations.

Customised training programs ensure relevance to specific roles. Tailored content helps employees recognise fraud indicators pertinent to their responsibilities. This targeted approach enhances awareness and strengthens the institution’s overall defence strategy.

Moreover, fostering cross-departmental collaboration amplifies fraud prevention efforts. Different departments hold unique insights that contribute to a comprehensive understanding of fraud risks. Joint efforts ensure alignment in strategies and objectives.

Institutions should facilitate regular meetings between departments. These gatherings provide a platform for sharing best practices and discussing challenges. Collaboration maximises resources and expertise, enhancing the institution’s ability to combat fraud effectively.

Finally, promoting a team-oriented approach encourages responsibility and vigilance. When departments work together towards a common goal, the institution benefits from a unified and robust defence against fraudulent activities.

Conclusion: Powering Trust Through Smarter AML Fraud Detection

In an era of rising financial crime and digital complexity, trust is the foundation of every successful financial relationship. For banks, fintechs, and financial institutions, the ability to detect and prevent fraud in real time isn’t just a compliance requirement—it’s a customer promise.

Tookitaki’s FinCense empowers institutions with intelligent AML fraud detection capabilities, enabling real-time protection across more than 50 fraud scenarios, including account takeovers, money mule operations, and synthetic identity fraud. Built on our powerful Anti-Financial Crime (AFC) Ecosystem, FinCense leverages AI and machine learning to deliver 90 %+ detection accuracy—while seamlessly integrating with your existing systems.

With FinCense, your compliance teams can monitor billions of transactions, flag suspicious activity at speed, and reduce false positives—boosting operational efficiency and protecting customer trust.

When institutions adopt a forward-looking fraud detection strategy, they don’t just stop fraud—they build stronger, safer, and more trusted financial ecosystems.

 

Talk to an Expert

Ready to Streamline Your Anti-Financial Crime Compliance?

Our Thought Leadership Guides

Blogs
29 Apr 2026
6 min
read

Inside the Parañaque Scam Factory: What 48 Arrests Reveal About the Industrialisation of Online Fraud

On 20 April 2026, Philippine media reported that the National Bureau of Investigation had arrested 48 individuals after raiding an alleged online scamming hub in Parañaque City. The timing matters. This is not an old case being revisited. It is a fresh reminder that scam operations across Southeast Asia are still active, organised, and scaling fast.

When authorities entered the site, they did not just uncover another isolated scam. They walked into something far more structured — an operation that looked less like opportunistic fraud and more like a production line.

Dozens of individuals. Multiple devices. Coordinated activity. A setup that resembled a call centre more than a loose group of fraudsters.

For compliance teams, this is not just another headline. It is a signal. Modern scam networks are becoming more industrialised, and the financial trails they leave behind are becoming harder to detect with static, siloed controls.

Talk to an Expert

What Actually Happened in Parañaque

The raid exposed an online scamming hub operating at scale. Investigators found individuals actively engaged in defrauding victims, likely through a mix of social engineering tactics — investment scams, impersonation schemes, and possibly romance or job scams.

What stood out was not just the activity itself, but the structure:

  • Multiple operators working simultaneously
  • Dedicated systems and devices
  • Coordinated workflows
  • A controlled environment, almost like a call centre

This was not a loose group of fraudsters. It was organised, repeatable, and designed for volume.

That distinction matters.

Because once fraud becomes structured like this, it stops being unpredictable and starts becoming scalable.

The Shift from Scams to Scam Infrastructure

For years, fraud has often been viewed as a series of isolated incidents. A phishing email here. A social engineering case there.

That lens no longer holds.

What the Parañaque case reveals is something deeper: the rise of scam infrastructure.

These are not individuals improvising. These are networks designed with:

  • Recruitment pipelines
  • Scripted engagement models
  • Operational roles and hierarchies
  • Performance-driven execution

In many ways, these setups mirror legitimate businesses — except the product being “sold” is deception.

And like any efficient system, they optimise over time.

They test what works. They refine messaging. They reuse successful playbooks. They scale quickly.

For financial institutions, this changes the challenge entirely.

You are no longer detecting one-off fraud. You are up against systems that are constantly learning and adapting.

Why This Matters for Financial Institutions

At first glance, a physical raid in the Philippines may feel distant to a bank in Singapore or a fintech in Australia.

But the financial footprint of such operations is rarely local.

Scam proceeds move quickly — often across borders, across institutions, and across channels.

A typical flow might look like this:

  • Victim transfers funds via online banking or wallet
  • Funds are routed through mule accounts
  • Split into smaller transactions
  • Moved across jurisdictions
  • Layered further to obscure origin

By the time the money surfaces in a financial institution’s system, it often appears routine.

That is the real risk.

Not at the point of the scam, but at the point where illicit funds blend into legitimate financial flows.

The Hidden Complexity Behind “Simple” Scams

It is easy to dismiss scams as basic manipulation.

But cases like this show how layered they have become.

Behind a single victim interaction, there may be:

  • A recruitment network sourcing operators
  • A technical setup managing communication channels
  • A financial layer handling fund movement
  • A supervisory layer coordinating activity

Each layer introduces its own signals.

But those signals are rarely obvious in isolation.

A transaction might look normal.
A customer profile might appear clean.
A payment pattern may not trigger any threshold.

Yet, when viewed together, they form a pattern.

This is the daily reality for compliance teams — connecting weak, fragmented signals into something meaningful.

ChatGPT Image Apr 29, 2026, 12_19_03 PM

Where Traditional Detection Starts to Break Down

Most financial institutions still rely, at least in part, on rule-based monitoring.

And rules do have their place.

But against structured scam operations, they begin to show limitations:

  • Static thresholds struggle against evolving behaviour
  • Isolated alerts fail to capture network patterns
  • Manual tuning cannot keep pace with changing typologies

In the Parañaque case, individual transactions may not have appeared suspicious.

What made them risky was the context — the coordination, the repetition, the connections.

This is where traditional systems fall short.

They are built to detect anomalies, not ecosystems.

The Role of Mule Networks in Scaling Fraud

No large-scale scam operation works without one critical component: money mules.

These accounts absorb, move, and disguise illicit funds.

And they are becoming increasingly sophisticated.

Some are unwitting — recruited through job offers or incentives.
Others are complicit — knowingly participating in exchange for a share.

Either way, they create a buffer between fraudsters and the financial system.

In operations like the Parañaque hub, mule networks likely operate in parallel:

  • Receiving funds from multiple victims
  • Redistributing across accounts
  • Moving funds rapidly across borders

From a compliance perspective, mule activity often appears as:

  • High-velocity transactions
  • Rapid inflows and outflows
  • Accounts with little genuine economic activity

But again, these signals are rarely conclusive on their own.

The Cross-Border Reality

Modern fraud rarely stays within one jurisdiction.

A scam initiated in one country can impact victims in another, with funds routed through multiple regions.

This creates three persistent challenges:

  1. Fragmented visibility
    No single institution sees the full transaction chain
  2. Jurisdictional differences
    Regulatory expectations and data access vary
  3. Delayed intervention
    By the time alerts are triggered, funds have already moved

The Parañaque case reinforces a simple truth: financial crime is global, even when it appears local.

What Compliance Teams Should Be Looking For

Rather than focusing on isolated red flags, institutions need to identify patterns of behaviour.

Indicators aligned with operations like this include:

  • Clusters of accounts exhibiting similar transaction flows
  • Repeated low-to-mid value transfers across multiple beneficiaries
  • Rapid movement of funds with minimal retention
  • Shared identifiers such as devices, IPs, or contact details
  • Activity inconsistent with stated customer profiles

Individually, these may not trigger concern.

Collectively, they signal coordination.

Moving from Detection to Understanding

There is a broader shift underway in financial crime prevention.

From generating alerts…
To understanding behaviour.

It is no longer enough to flag transactions.

Teams need to ask:

  • Why is this activity happening?
  • How is it connected to other behaviour?
  • What broader typology does it resemble?

This shift is not easy.

Because understanding requires context — and context requires intelligence beyond internal data.

The Role of Collaborative Intelligence

Cases like the Parañaque scam hub highlight a structural gap.

No single institution has full visibility.

Fraud patterns are distributed across:

  • Banks
  • Fintech platforms
  • Payment processors
  • Geographies

Which means detection cannot rely on isolated systems.

Collaborative intelligence becomes critical.

By sharing typologies, behavioural patterns, and risk signals without exposing sensitive data institutions can:

This is where community-driven intelligence models are gaining traction.

Where Technology Needs to Evolve

To keep pace with structured fraud operations, detection systems need to evolve in three ways:

1. From rules to adaptive intelligence
Systems must continuously learn from emerging patterns

2. From transactions to networks
Detection must capture relationships, not just events

3. From alerts to actionable insights
Outputs must support faster, clearer investigation decisions

This is not about replacing existing systems overnight.

It is about enhancing them to reflect how fraud actually operates today.

The Cost of Getting This Wrong

The impact of missing these signals goes beyond financial loss.

There are broader consequences:

  • Increased regulatory scrutiny
  • Reputational damage
  • Erosion of customer trust

In fast-growing digital markets, trust is not easily rebuilt once lost.

And fraud, left unchecked, directly undermines it.

A More Grounded Way Forward

The Parañaque case is not an anomaly. It is part of a pattern.

Fraud is becoming:

  • More organised
  • More scalable
  • More adaptive

And increasingly embedded within legitimate financial systems.

Responding to this requires a shift:

From reactive to proactive
From siloed to collaborative
From static to adaptive

For compliance teams, this is not about chasing every new scam.

It is about building the capability to recognise patterns — even as they evolve.

Conclusion: Beyond the Raid

The arrest of 48 individuals is a meaningful enforcement action.

But it is not the end of the story.

Operations like these rarely disappear. They adapt, relocate, and re-emerge.

For financial institutions, the real question is not whether such scams exist.

It is whether their systems can detect the financial signals these operations inevitably leave behind.

Because while enforcement can shut down a physical hub, the financial trails continue to move.

And that is where the real battle is being fought.

Inside the Parañaque Scam Factory: What 48 Arrests Reveal About the Industrialisation of Online Fraud
Blogs
29 Apr 2026
6 min
read

AML Compliance in Malaysia: A Complete Guide to BNM Requirements and AMLATFPUAA

Picture a compliance officer at a Malaysian licensed bank three weeks out from a BNM AML/CFT examination. She has read AMLATFPUAA. She knows the Act was amended in 2014 and again in 2020. What she needs now is not another legislative summary. She needs to know what BNM's examiners will actually open on their laptops when they arrive — which files, which logs, which policy documents — and where programmes at institutions like hers most commonly fall short.

That is what this guide covers.

The legislative history of AMLATFPUAA and its impact on Malaysia's financial sector is covered in our [overview of AMLA and its impact on the Malaysian financial landscape](/compliance-hub/understanding-amla-impact-on-malaysia-financial-landscape). This article focuses on the operational layer: the ongoing compliance obligations that BNM-supervised institutions must meet, the specific thresholds and timelines that govern reporting, and the recurring examination gaps that BNM has identified in practice.

Talk to an Expert

The Regulatory Framework in Brief

Two instruments govern AML/CFT compliance for BNM-supervised institutions in Malaysia.

AMLATFPUAA 2001 is the primary legislation. The 2014 amendment expanded the list of predicate offences and brought Designated Non-Financial Businesses and Professions (DNFBPs) into the compliance perimeter. The 2020 amendment strengthened beneficial ownership requirements and raised maximum penalties to MYR 3 million per offence, or 5 years imprisonment, or both. For financial institutions, the penalties can run per transaction or per day of non-compliance — which changes the risk calculus considerably.

BNM's AML/CFT and TF Policy Document (2023) is where the day-to-day compliance standards sit. The Policy Document translates AMLATFPUAA's obligations into specific programme requirements: who must be screened, how, at what intervals, and with what documentation. BNM's Financial Intelligence and Enforcement Department (FIED) is the enforcement arm that reviews STR filings and leads enforcement action.

When a BNM examiner cites a deficiency, the reference is almost always to the Policy Document, not to the Act itself. Knowing the Act is necessary; knowing the Policy Document is what keeps a programme compliant.

Who Must Comply: Reporting Institutions Under AMLATFPUAA

AMLATFPUAA defines "Reporting Institutions" across three categories, each carrying distinct obligations.

Category 1 covers licensed banks, Islamic banks, and development financial institutions. These institutions carry the fullest set of AML/CFT obligations under the Policy Document, including mandatory enterprise-wide risk assessments and comprehensive transaction monitoring programmes.

Category 2 covers money service businesses (MSBs), remittance operators, and e-money issuers. The obligations are materially equivalent to Category 1 for CDD and reporting, but the Policy Document recognises that the risk typologies differ — particularly for remittance operators processing high-frequency, lower-value cross-border transfers.

Category 3 covers DNFBPs: lawyers, accountants, and real estate agents, brought in under the 2014 amendment. DNFBP obligations are threshold-triggered — they apply when a transaction reaches a defined cash value or when the DNFBP is facilitating a category of activity specified in the Act.

The DNFBP category matters for banks because banks deal with these professionals as customers. When a law firm holds a client account at your institution, BNM expects you to recognise that relationship as carrying elevated risk — and to apply the CDD standards appropriate to it.

Customer Due Diligence: Three Tiers, Different Standards

BNM's AML/CFT Policy Document sets three CDD tiers. Which tier applies depends on the risk profile of the customer and the nature of the business relationship — not on an institution's convenience.

Standard CDD

Standard CDD applies to all new customers unless simplified CDD conditions are met. It requires identification and verification of the customer, documentation of the purpose and intended nature of the business relationship, and a customer risk assessment at onboarding. Verification must be based on independent and reliable sources — a customer self-certifying their identity is not sufficient.

For individual customers, verification typically involves government-issued identification. For corporate customers, it extends to directors, authorised signatories, and ultimate beneficial owners (UBOs).

Simplified CDD

Simplified CDD is available for customers assessed as low-risk: listed companies on a regulated exchange, government entities, and FIs supervised by BNM or an equivalent foreign regulator. Under simplified CDD, identification is still required but the depth of verification can be reduced, and ongoing monitoring can operate at lower intensity.

The Policy Document is explicit that simplified CDD is a risk-based determination — not a category exemption. An institution cannot apply simplified CDD to a listed company without first concluding that the specific company and the specific transaction type present low money laundering risk.

Enhanced Due Diligence

Enhanced Due Diligence (EDD) is mandatory for four customer categories:

  • Politically Exposed Persons (PEPs) — domestic and foreign
  • Customers from FATF-identified jurisdictions with strategic AML/CFT deficiencies
  • Corporate customers with complex or non-transparent ownership structures
  • Customers engaged in cash-intensive businesses

EDD requirements under the Policy Document are specific. For PEPs, the institution must verify source of funds and source of wealth — not just identify the customer's occupation. Senior management approval is required before establishing or continuing a relationship with a PEP. The approval must be documented, with a named approver. Periodic review of PEP relationships is mandatory at least every 2 years.

For all EDD customers, monitoring intensity must be increased. What "increased" means in practice is calibrated monitoring rules, not a generic note in the file that the customer is high-risk.

Beneficial ownership threshold: BNM sets the threshold for identifying UBOs at 25% ownership or control — consistent with the FATF standard. Institutions must trace ownership to natural persons. Nominee structures, trusts, and multi-layer corporate arrangements are not a legitimate stopping point. If your CDD file shows a holding company as the UBO rather than the individuals who own it, the file is incomplete.

For institutions operating digital onboarding channels, the BNM eKYC Policy Document sets out the technical requirements that must be met for remote CDD to carry the same assurance as face-to-face verification. The specifics for digital banks and e-money issuers are covered in our eKYC Malaysia guide.

Ongoing Monitoring Requirements

Onboarding CDD is not a one-time event. BNM's Policy Document requires institutions to monitor the business relationship throughout its duration — which means monitoring transactions for consistency with the customer's risk profile, stated purpose, and expected transaction patterns.

When Re-KYC Is Required

The Policy Document specifies triggers that require re-assessment of a customer's KYC data:

  • A material change in the customer's circumstances (change in business activity, change in ownership structure, change in country of domicile)
  • A change in the customer's risk rating — either triggered by a system alert or a periodic review
  • Reactivation of a dormant account (inactive for 12 months or more)
  • Scheduled periodic review for high-risk customers — at minimum every 2 years

The 12-month dormancy trigger and the 2-year PEP review cycle are not recommendations. They are requirements. BNM examiners check whether these cycles are documented and whether the reviews are substantive — not whether a checkbox was ticked.

Transaction Monitoring Calibration

BNM's examination findings have repeatedly cited one gap above others: institutions running transaction monitoring with default threshold settings that have not been calibrated to the institution's own customer risk profile.

Default thresholds — those that come with a monitoring system out of the box — are designed to be functional across a broad range of institutions. They are not designed to reflect the specific risk profile of your customer book. A licensed bank whose retail clients are primarily salaried employees in Klang Valley has a different expected transaction pattern than an MSB processing remittances to Southeast Asian labour markets. Their monitoring should look different.

BNM expects institutions to document why their thresholds are set where they are, when they were last reviewed, and who approved the current calibration. If the answer is "these are the system defaults," that is a finding waiting to be written.

To understand what an effective transaction monitoring programme should look like — and what to evaluate when selecting or upgrading a system — see our Transaction Monitoring Software Buyer's Guide and What Is Transaction Monitoring.

ChatGPT Image Apr 29, 2026, 11_14_44 AM

Reporting Obligations: Timelines and Thresholds

BNM-supervised institutions have two primary reporting obligations to FIED. Both have defined timelines that examination teams check.

Cash Threshold Reports (CTRs)

Any cash transaction — or series of related cash transactions — of MYR 25,000 or above must be reported to FIED via the goAML system (Malaysia adopted the UNODC goAML platform in 2020). The filing deadline is 3 business days from the date of the transaction.

CTR filing is largely mechanical for institutions with core banking systems capable of automated flagging. Where BNM has found gaps is in the manual detection of structured transactions — multiple sub-MYR 25,000 cash deposits by the same customer within a short period, designed to stay below the CTR threshold. Structuring is a predicate offence under AMLATFPUAA. Failing to detect it is a monitoring failure, not just a reporting failure.

Suspicious Transaction Reports (STRs)

An STR must be filed when a staff member or system alert produces grounds to suspect that a transaction involves the proceeds of a scheduled offence or is connected to terrorist financing. The deadline is 3 working days from the point at which suspicion is formed — not from when the transaction occurred.

That distinction matters. If a transaction alerts in your monitoring system on Monday and a compliance analyst forms a reasonable suspicion on Wednesday, the STR clock started on Wednesday, not Monday.

BNM examination findings have identified a specific quality gap in STR filings: reports submitted without an adequate documented basis for suspicion. An STR that records "transaction appeared unusual" without specifying what pattern triggered the suspicion, what investigation was conducted, and why the analyst concluded suspicion was warranted, does not meet the standard. The goAML system requires structured data fields to be completed — but the narrative quality of what goes into those fields is what BNM examiners assess.

The internal pathway matters too. Institutions must have a documented process for staff to escalate concerns to the MLRO via an Internal Suspicious Transaction Report (ISTR). Frontline staff who identify red flags and have no clear escalation route — or who fear that escalating will reflect poorly on them — are a systemic gap. BNM expects staff training to address this directly.

AML/CFT Programme Governance

A compliant AML/CFT programme is not a set of policies in a folder. BNM's Policy Document specifies the governance structure that must be in place.

Board-approved compliance programme. The institution's AML/CFT programme must be documented, formally approved by the Board of Directors, and reviewed at minimum annually. A programme that exists only in the compliance officer's head — or that was last updated before the 2020 AMLATFPUAA amendments — is non-compliant.

Designated Compliance Officer (DCO). The DCO must sit at senior management level and must have direct access to the Board or Board Audit Committee when escalation is required. BNM examiners specifically check whether the DCO has the seniority and independence to escalate concerns without internal obstruction. An institution where the MLRO reports upward through the business line whose clients they are monitoring has a structural governance problem.

Independent AML/CFT audit. The audit function — whether internal or conducted by a qualified external party — must assess the AML/CFT programme at least once per year. The scope must cover policy adequacy, operational effectiveness, and staff training outcomes. An audit that confirms the policies exist but does not test whether they work is not what BNM requires.

Staff training. Training must be documented, with records of attendance and assessment results. BNM examiners have cited institutions where training records were incomplete or where training had not been updated to reflect regulatory changes — including the goAML transition and the 2020 AMLATFPUAA amendments.

Common BNM Examination Gaps

Based on publicly available BNM guidance and supervisory feedback, five gaps recur across examinations of Malaysian institutions.

Outdated customer risk assessments. Customers onboarded years ago under different risk criteria and never re-assessed — even when their transaction patterns have materially changed.

Incomplete beneficial ownership documentation for corporate customers. Files that identify a corporate structure but stop at the holding company level, without tracing to the natural persons who ultimately control it.

STRs filed without documented analytical basis. The filing exists, but the rationale is absent. This satisfies neither the spirit nor the operational requirement of the obligation.

Default monitoring thresholds. System thresholds not calibrated to the institution's specific customer risk profile — and no documentation that the calibration question was ever asked.

Inadequate scrutiny of DNFBPs as customers. Banks treating law firm client accounts or real estate agent trust accounts the same as ordinary business accounts, without recognising the elevated risk profile those relationships carry under AMLATFPUAA.

Malaysia's FATF Context: Why Examination Intensity Has Increased

Malaysia's FATF Mutual Evaluation in 2023 assessed both technical compliance and effectiveness — two different standards. Technical compliance measures whether the laws and regulations are in place. Effectiveness measures whether they work.

Malaysia's technical compliance ratings were largely Compliant or Largely Compliant. Its effectiveness ratings were lower — particularly for the transparency of corporate beneficial ownership, where the evaluation found that beneficial ownership information was not always available to competent authorities in a timely way.

For BNM-supervised institutions, the practical effect is this: BNM is under pressure to demonstrate that AML controls are operationally effective, not just formally present. Examination intensity has increased since 2023. The scrutiny on beneficial ownership documentation, on monitoring calibration, and on STR quality is not coincidental. These are the areas the FATF evaluation identified as weakest, and they are the areas BNM examiners are examining most carefully.

Preparing for What Examiners Actually Review

The compliance officer three weeks out from her BNM examination should be checking seven things:

  1. Are customer risk assessments current — specifically for dormant accounts and for customers whose transaction patterns have changed?
  2. Do all corporate customer files trace beneficial ownership to natural persons at the 25% threshold?
  3. Are monitoring thresholds documented with a calibration rationale — and reviewed within the last 12 months?
  4. Do STR files contain a structured basis for suspicion, not just a transaction reference?
  5. Is the DCO's seniority and Board access documented?
  6. Was the AML/CFT audit conducted in the past year, and did its scope include operational testing?
  7. Are staff training records complete and current for all frontline and compliance staff?

These are not abstract compliance questions. They are the specific items that BNM examinations have produced findings on. Getting them right before the examination is considerably easier than explaining gaps during it.

If you want to see how Tookitaki's platform supports CDD, transaction monitoring calibration, and STR quality management for BNM-supervised institutions, book a demo. Or download our Malaysia AML compliance checklist for a full pre-examination review framework tailored to AMLATFPUAA and the BNM AML/CFT Policy Document. For institutions evaluating or upgrading their monitoring systems, the Transaction Monitoring Software Buyer's Guide covers what to look for and what to ask vendors about calibration and alert management. If you're new to the foundations of KYC and CDD, our What Is KYC guide provides the conceptual grounding the Policy Document assumes you have.

AML Compliance in Malaysia: A Complete Guide to BNM Requirements and AMLATFPUAA
Blogs
29 Apr 2026
6 min
read

Payment Services Act Singapore: AML Obligations for Licensed Payment Institutions

The MAS approval letter arrives. The Major Payment Institution licence is granted. The founders celebrate. The press release goes out.

Then the compliance team sits down.

The PSA licence covers seven categories of payment service activity, and the AML/CFT obligations attached to each are substantive. Unlike MAS Notice 626 for banks, which has years of published guidance, examination findings, and industry interpretation built around it, the PSA AML framework is less documented. The notices exist. The obligations are real. But the compliance team at a newly licensed MPI often has to build from scratch, without the institutional knowledge that banks have accumulated since 2002.

This guide covers what the Payment Services Act requires from licensed payment institutions in Singapore, specifically on AML/CFT. It is written for compliance officers, MLROs, and legal teams at standard payment institutions (SPIs) and major payment institutions (MPIs) who know what the PSA is but need to understand their specific obligations in detail.

Talk to an Expert

The PSA Framework: Scope and Licence Tiers

The Payment Services Act 2019 (PSA) came into force on 28 January 2020 and was substantially amended by the Payment Services (Amendment) Act 2021 (PS(A)A 2021), which extended regulatory coverage to previously unregulated services and introduced stricter obligations for digital payment token providers.

The PSA regulates seven categories of payment service:

  1. Account issuance services
  2. Domestic money transfer services
  3. Cross-border money transfer services
  4. Merchant acquisition services
  5. E-money issuance services
  6. Digital payment token (DPT) services
  7. Money-changing services

A firm does not need to offer all seven to be licensed. Many MPIs hold licences for two or three categories — a cross-border remittance operator with an e-money issuance component is common. Each service category the firm is licensed for carries AML/CFT obligations independently.

Two Licence Tiers, Different AML Exposure

The PSA creates two licence tiers that determine the depth of AML obligations.

Standard Payment Institutions (SPIs) are subject to monthly transaction thresholds: SGD 3 million per month across all regulated services, or SGD 1.5 million per month for any single regulated service. At these volumes, SPIs can apply simplified CDD in some circumstances and face lighter ongoing monitoring requirements.

Major Payment Institutions (MPIs) exceed those thresholds. MPIs face the full suite of AML/CFT obligations under MAS Notice PSN01 (or PSN02 for DPT services). MAS expects MPI-level controls to be equivalent in standard to those at licensed banks — the fact that a firm is a payment institution rather than a bank does not reduce the expectation.

One important clarification on scope: the PSA exempts certain intra-group transfers and specific corporate treasury services from its regulated activities. Whether a firm's particular activity falls within an exemption requires analysis of the specific transaction flows — MAS has not published a comprehensive list, and several firms have sought clarification through the licensing process itself.

MAS Notice PSN01: The Core AML Obligations

MAS Notice PSN01 — "Prevention of Money Laundering and Countering the Financing of Terrorism — Holders of a Standard Payment Institution Licence or a Major Payment Institution Licence (Non-DPT Services)" — was issued under section 103 of the PSA and took effect when the Act commenced in January 2020.

PSN01 applies to payment institutions providing any of the seven regulated services except DPT services (which fall under PSN02, covered below). Its structure mirrors MAS Notice 626 for banks, adapted for the payment context.

The four core obligation areas under PSN01 are:

1. Customer Due Diligence (CDD)

Payment institutions must identify and verify customers, understand the nature and purpose of the business relationship, and conduct ongoing monitoring. The CDD threshold for occasional transactions is SGD 1,500 — lower than the SGD 5,000 threshold that applies to banks under Notice 626. This difference reflects the higher anonymity risk in payment services, where customer relationships are typically shorter and account history shallower than in traditional banking.

Enhanced due diligence (EDD) is required for:

  • Any transaction above SGD 5,000
  • Cross-border transfers to or from jurisdictions on the FATF grey or black list
  • Customers who present higher-risk indicators under the institution's risk assessment

Simplified CDD is available only for SPI-tier products with capped e-money balances — the maximum cap for simplified CDD to apply is SGD 5,000 in stored value.

2. Ongoing Monitoring

PSN01 requires payment institutions to monitor transactions for unusual or suspicious patterns. The monitoring standard is explicitly equivalent to that imposed on banks under Notice 626. There is no licence-tier carve-out for MPIs: a major payment institution must run monitoring that meets bank-grade expectations.

In practice, this is where many payment institutions fall short. [Transaction monitoring in the MAS context](/compliance-hub/transaction-monitoring-singapore-mas-requirements) requires calibrated alert logic, documented investigation workflows, and audit trails that MAS can review. Payment institutions often have none of these at the point of licence grant — they have the licence, but not the infrastructure.

3. Suspicious Transaction Reporting (STR)

STR obligations do not come from the PSA itself — they come from the Corruption, Drug Trafficking and Other Serious Crimes (Confiscation of Benefits) Act (CDSA). Section 39 of the CDSA requires any person who knows or has reasonable grounds to suspect that property represents proceeds of drug trafficking or other serious crimes to file a report with the Suspicious Transaction Reporting Office (STRO).

The practical timeline is one business day from the point at which suspicion forms. That formation date matters: MAS examination findings have treated cases where the suspicion formation date was left blank or set to the date of filing (rather than the date of the underlying discovery) as incomplete reports — even where the filing itself was technically made within the window.

4. Record-Keeping

CDD documents and transaction records must be retained for five years from the date the transaction was conducted or the business relationship ended. MAS can request records going back up to five years in the course of an examination.

One PSN01 Obligation Per Service

PSN01 contains a provision that compliance teams at multi-service payment institutions sometimes miss: a firm licensed to provide both cross-border money transfer services and e-money issuance services must comply with PSN01 separately for each service. CDD performed for a customer under the cross-border transfer service does not automatically satisfy CDD requirements for the same customer's e-money transactions. The records, processes, and monitoring must address each licensed service independently.

MAS Notice PSN02: DPT Service Providers

MAS Notice PSN02 — "Prevention of Money Laundering and Countering the Financing of Terrorism — Holders of a Standard Payment Institution Licence or Major Payment Institution Licence Carrying on Digital Payment Token Service" — applies to firms licensed to offer DPT services: crypto exchanges, digital asset custodians, and related providers.

PSN02 carries higher-risk obligations than PSN01, reflecting MAS's view that DPT services present specific money laundering and terrorism financing risks not present in traditional payment services.

The additional obligations under PSN02 include:

Travel Rule compliance: PSN02 implements FATF Recommendation 16 for virtual assets. Licensed DPT service providers must collect, verify, and transmit originator and beneficiary information for DPT transfers above SGD 1,500. For transfers to or from unhosted wallets (wallets not held at a licensed provider), enhanced procedures apply. MAS has not mandated a specific technical standard for travel rule compliance, but expects firms to use an approved solution with documented coverage for the counterparty jurisdictions they transact with.

Blockchain-specific monitoring: Alert logic for DPT transactions must address blockchain-native risk indicators — rapid multi-hop transfers across wallets, use of mixing or tumbling services, high-velocity micro-transactions consistent with layering, and activity consistent with known illicit addresses. Standard bank transaction monitoring typologies do not map cleanly to on-chain behaviour, and PSN02 examiners expect DPT-specific rule sets.

Heightened examination intensity post-2022: Following the collapse of FTX in November 2022 and MAS's subsequent review of licensed DPT providers, MAS substantially increased the frequency and depth of PSN02 examinations. Several DPT licence holders received remediation requirements in 2023 and 2024. STR filing quality and travel rule implementation were the two most commonly cited deficiencies.

ChatGPT Image Apr 29, 2026, 10_38_38 AM

CDD Under the PSA: What the Thresholds Mean in Practice

The SGD 1,500 occasional transaction threshold in PSN01 is one of the more misunderstood elements of the PSA framework.

Under Notice 626, banks do not need to apply full CDD to occasional transactions below SGD 5,000. Payment institutions under PSN01 must apply CDD at SGD 1,500. That is not a minor administrative difference. In a remittance business processing hundreds of transactions daily, a significant proportion of transactions will fall between SGD 1,500 and SGD 5,000. Each of those requires customer identification and verification under PSN01 — which requires a technology and process infrastructure that can handle that volume.

In examination, MAS specifically checks whether SGD 1,500 thresholds are being applied in practice — not just whether the institution's CDD policy says they should be. The gap between policy and operational execution is a recurring finding.

For KYC processes at licensed payment institutions, the relevant question is not just whether the institution can identify a customer, but whether the identification is being triggered at the correct transaction threshold, documented correctly, and linked to the transaction monitoring record.

Transaction Monitoring: Where Payment Institutions Fall Short

MAS's 2024 supervisory expectations document specifically noted that transaction monitoring at payment institutions is "less mature" than at banks. This is both a diagnostic and a warning — MAS has signalled that payment institution TM controls are now an examination priority.

Three factors make transaction monitoring operationally harder for payment institutions than for banks:

Shorter customer history: Banks accumulate years of transaction history per customer before alerts are calibrated. Many payment institution customers have been active for months. Baseline behaviour is harder to establish, which means both that unusual patterns are harder to identify and that alert false positive rates tend to be higher.

Faster transaction cycles: Payment transactions settle in minutes or seconds. A structuring pattern that would take weeks to manifest in a bank account can appear and disappear in a payment institution in 48 hours. Monitoring rules must be configured to detect compressed timescales.

Higher cross-border exposure: Cross-border money transfer services, by definition, move funds across jurisdictions — often to markets with weaker AML frameworks. Alert rules for cross-border transfers need jurisdiction-specific calibration, not a single global threshold.

The full MAS transaction monitoring framework covers how these factors should be addressed in a Singapore-compliant monitoring programme.

What MAS Examines at PSA-Licensed Firms

Based on published MAS supervisory findings and the 2024 expectations document, PSA examinations focus on five areas:

CDD threshold application: Are SGD 1,500 triggers actually running in production? Examiners test this by pulling a sample of transactions in the SGD 1,500–5,000 range and checking whether CDD was conducted and documented.

Travel rule compliance for cross-border transfers: For MPI-licensed firms providing cross-border money transfer services, examiners check whether FATF Recommendation 16 originator/beneficiary information is being collected, verified, and transmitted — and whether the institution has procedures for counterparties who cannot receive travel rule data.

STR filing quality: MAS does not measure STR performance primarily by volume. Examiners look at the narrative content of individual STR filings — specifically whether the filing documents the basis for suspicion, the investigation steps taken, and the transaction evidence reviewed. Filings that state "suspicious activity detected" without specifying what made the activity suspicious are treated as incomplete, regardless of whether they were filed on time.

Alert calibration for payment-specific typologies: Generic bank-derived alert rules applied without adaptation are a common finding. Examiners look for rules that address mule account patterns in remittance flows (rapid inbound/outbound cycling with no retention), sub-threshold structuring designed to avoid PSN01 CDD triggers, and rapid account turnover in payment accounts.

PS(A)A 2021 compliance: The 2021 amendment extended PSA coverage to previously unregulated services and increased MAS supervisory powers, including the ability to impose restrictions on MPI licence holders mid-licence. Firms that were operating before the amendment took effect and were brought within scope had a transition period — but that period has elapsed. Any firm that believes its legacy service structure still falls outside the PSA framework should obtain current legal advice.

The 2021 Amendment: What Changed

The Payment Services (Amendment) Act 2021 made three changes relevant to AML compliance:

First, it extended the PSA's regulated activity definitions to capture services previously argued to be outside scope — in particular, certain token-based payment services and digital representation of fiat currency.

Second, it introduced new obligations for DPT service providers, bringing Singapore into alignment with FATF's revised Recommendation 15 on virtual assets. This is the legislative foundation for PSN02 and its enhanced requirements.

Third, it expanded MAS's supervisory toolkit. Under the amended Act, MAS can impose conditions on MPI licences that restrict specific product lines or transaction types while an investigation or remediation is ongoing. This is a more targeted instrument than suspension, and MAS has used it in at least two disclosed cases since 2022.

Building Compliance Infrastructure That Meets PSA Expectations

A PSA licence is not a compliance programme. The licence grants permission to operate; the AML/CFT framework is built after that.

For newly licensed MPIs and SPIs, the gap between what MAS requires and what most firms have at licence grant is significant. PSN01 requires calibrated transaction monitoring, documented CDD at SGD 1,500 thresholds, investigation workflows that leave auditable records, and STR filings with substantive narrative content. These are not features that come pre-configured — they require technology, process design, and trained personnel.

If you are building or evaluating a transaction monitoring programme for a Singapore-licensed payment institution, the Transaction Monitoring Software Buyer's Guide covers what to look for in a system designed for payment services risk — including alert calibration for remittance typologies, travel rule integration, and MAS-examination-ready documentation.

For compliance teams at payment institutions assessing whether their current controls meet MAS's 2024 supervisory expectations, Tookitaki works with licensed payment institutions in Singapore to implement AML/CFT programmes built for PSN01 and PSN02 requirements. Book a demo to see how FinCense addresses payment-specific transaction monitoring and STR documentation.

Payment Services Act Singapore: AML Obligations for Licensed Payment Institutions