Compliance Hub

Mastering Fraud Prevention for Financial Institutions

Site Logo
Tookitaki
08 Oct 2024
9 min
read

In the rapidly evolving world of financial technology, fraud prevention systems have become a critical tool. They are the frontline defense for financial institutions against fraudulent transactions.

These systems not only protect the financial health of businesses but also safeguard their reputation. They play a pivotal role in maintaining the trust of customers, which is crucial for a positive user experience.

Fraud prevention systems employ sophisticated technology that detects fraud. They monitor and analyze transactions, identifying patterns that may indicate fraudulent activity.

Artificial intelligence and machine learning are increasingly being used in these systems. These technologies enhance the ability to identify fraud patterns, even as fraud tactics continue to evolve.

However, keeping up with these evolving tactics is a significant challenge. Fraudsters are constantly developing new techniques to bypass security measures, necessitating continuous updates and improvements in fraud detection solutions.

Another challenge is striking the right balance between preventing fraud and reducing false positives. Too many false positives can lead to customer friction, undermining the user experience.

This article aims to provide comprehensive insights into the latest trends and technologies in fraud prevention systems. It will help financial crime investigators and other professionals in the fintech industry enhance their investigative techniques and strategies.

Stay tuned as we delve deeper into the intricacies of fraud prevention systems, their benefits, and the challenges they address.

Understanding Fraud Prevention Systems

Fraud prevention systems are a combination of processes and technologies designed to protect financial institutions from fraudulent activities. They are an integral part of risk management strategies, helping to identify and prevent fraudulent transactions.

These systems work by monitoring and analyzing transactions in real-time. They use advanced algorithms to detect anomalies and patterns that may indicate fraudulent behavior.

Artificial intelligence and machine learning are increasingly being incorporated into these systems. These technologies enhance the system's ability to learn from past transactions, improving its accuracy in detecting fraud.

{{cta-first}}

The Importance of Fraud Prevention in Financial Institutions

Fraud prevention systems play a crucial role in safeguarding the financial health and reputation of institutions. Fraudulent transactions can lead to significant financial losses and damage the trust of customers.

Moreover, these systems help maintain a positive user experience. By detecting and preventing fraud, they ensure that customers can conduct their transactions securely and with confidence.

In addition, fraud prevention systems also help financial institutions comply with regulatory requirements. They provide the necessary tools and data to demonstrate that adequate measures are in place to prevent fraud.

Types of Fraud Targeting Financial Institutions

Financial institutions face a variety of fraud types. Understanding these is crucial for developing effective fraud prevention strategies.

  • Identity Theft: This involves fraudsters using stolen personal information to impersonate a legitimate customer.
  • Phishing: In this type of fraud, fraudsters trick customers into revealing their personal information or login credentials.
  • Card Fraud: This involves unauthorized use of a customer's credit or debit card information.
  • Account Takeover: This occurs when a fraudster gains control of a customer's account and makes unauthorized transactions.

Each of these fraud types presents unique challenges for detection and prevention. Therefore, a robust fraud prevention system needs to be versatile and adaptable, capable of responding to a wide range of fraud tactics.

Technological Advancements in Fraud Detection Solutions

The field of fraud detection has seen significant advancements in recent years. These advancements have been driven by the need to keep up with evolving fraud tactics and techniques.

A key development is using artificial intelligence (AI) and machine learning (ML) to detect fraud. These technologies have greatly enhanced the ability of these systems to identify fraud patterns and predict future fraud risks.

Another important advancement is the use of real-time transaction monitoring. This allows for immediate detection of fraudulent transactions, enabling swift action to prevent financial loss.

Moreover, the integration of these technologies with existing financial infrastructure has become more seamless. This has made it easier for financial institutions to adopt these advanced fraud detection solutions without disrupting their business operations.

However, despite these advancements, the challenge of fraud detection remains complex. Fraudsters continue to devise new tactics, requiring continuous updates and improvements in fraud detection solutions.

The Role of Artificial Intelligence and Machine Learning

Artificial intelligence and machine learning play a crucial role in modern fraud detection solutions. They enhance the system's ability to learn from past transactions and improve its accuracy in detecting fraud.

AI and ML algorithms can analyze vast amounts of data to identify patterns and anomalies that may indicate fraudulent activity. They can also adapt to new fraud tactics, making the system more resilient to evolving fraud threats.

Moreover, AI and ML can help reduce false positives. This is crucial for maintaining customer trust and enhancing the user experience, as false positives can lead to unnecessary customer friction.

Real-Time Transaction Monitoring and Anomaly Detection

Real-time transaction monitoring is another key component of advanced fraud detection solutions. It allows for immediate detection of potentially fraudulent transactions, enabling swift action to prevent financial loss.

This is achieved through the use of advanced analytics and anomaly detection systems. These systems can identify deviations from normal transaction patterns, which may indicate fraud.

Moreover, real-time monitoring also enables financial institutions to respond quickly to fraud incidents. This can help minimize the financial impact of fraud and maintain customer trust.

Balancing Fraud Prevention with User Experience

Fraud prevention is not just about detecting and preventing fraudulent transactions. It's also about maintaining a positive user experience.

A robust fraud prevention system should be able to distinguish between legitimate and fraudulent transactions accurately. This is crucial to avoid false positives, which can lead to unnecessary customer friction.

At the same time, the system should be user-friendly. It should be easy for investigators to use and understand, enabling them to carry out their tasks efficiently.

Moreover, the system should be able to adapt to changing customer behavior and preferences. This is important to ensure that the system remains effective in detecting fraud while also meeting the evolving needs of customers.

Reducing False Positives to Enhance Customer Trust

Reducing false positives is a key challenge in fraud prevention. False positives can lead to unnecessary customer friction and can erode customer trust.

A robust fraud prevention system should be able to accurately distinguish between legitimate and fraudulent transactions. This requires the use of advanced analytics and machine learning algorithms that can learn from past transactions and improve their accuracy over time.

Moreover, continuous monitoring and feedback are crucial to refine the system and reduce false positives. This can help enhance customer trust and improve the overall user experience.

Integrating Fraud Prevention Seamlessly into Business Operations

Integrating a fraud prevention system into existing business operations can be a complex task. However, it is crucial for the effectiveness of the system.

The system should be able to work seamlessly with existing financial infrastructure. This includes payment gateways, customer databases, and other systems that handle financial transactions.

Moreover, the system should be scalable and flexible. It should be able to adapt to changing business needs and handle increasing volumes of transactions. This is crucial to ensure that the system remains effective in detecting and preventing fraud as the business grows.

Evolving Fraud Tactics and the Response of Fraud Prevention Systems

The strategies used for fraud are perpetually changing. Fraudsters are becoming more sophisticated, using advanced technologies and techniques to commit fraud.

This presents a significant challenge for financial institutions. They must keep up with these evolving tactics to effectively detect and prevent fraud.

A robust fraud prevention system should be able to adapt to these changes. It should be able to learn from past fraud incidents and update its algorithms to detect new fraud patterns.

{{cta-ebook}}

Adapting to Emerging Fraud Risks and Patterns

Emerging fraud risks and patterns pose a significant challenge for financial institutions. These can include new types of fraud, such as synthetic identity fraud, or new techniques used by fraudsters, such as deepfakes.

A robust fraud prevention system should be able to adapt to these emerging risks. This requires continuous learning and improvement, as well as collaboration with other financial institutions and law enforcement agencies to share intelligence about new fraud patterns.

Moreover, the system should be able to use predictive analytics to anticipate future fraud trends. This can help financial institutions stay one step ahead of fraudsters and protect their customers and assets.

The Challenge of Social Engineering and Account Takeover

Social engineering and account takeover are two common tactics used by fraudsters. Social engineering involves manipulating individuals into revealing confidential information, while account takeover involves gaining unauthorized access to a customer's account.

These tactics pose a significant challenge for financial institutions. They require a multi-layered approach to fraud prevention, involving not only technology but also customer education and awareness.

A robust fraud prevention system should be able to detect signs of social engineering and account takeover. This can include monitoring for unusual account activity, such as multiple failed login attempts, or analyzing customer behavior to detect anomalies that may indicate fraud.

Risk Management and Regulatory Compliance in Fraud Prevention

Risk management plays a crucial role in fraud prevention. It involves identifying, assessing, and managing fraud risks to minimize their impact on the financial institution.

A robust fraud prevention system should be integrated with the institution's risk management framework. This allows for a holistic view of risks and enables more effective fraud detection and prevention.

Regulatory compliance is another key aspect of fraud prevention. Financial institutions must comply with various regulations related to fraud detection and prevention, such as the Bank Secrecy Act (BSA) and the Anti-Money Laundering (AML) rules.

Non-compliance can result in hefty fines and penalties, not to mention damage to the institution's reputation. Therefore, a fraud prevention system should also help institutions achieve and maintain compliance with these regulations.

The Role of Risk Assessments and Compliance in Shaping Anti-Fraud Measures

Risk assessments are a key component of risk management. They involve identifying and evaluating the potential fraud risks faced by the institution.

The results of these assessments can then be used to shape the institution's anti-fraud measures. For instance, if the assessment identifies a high risk of card fraud, the institution might implement additional card security measures.

Compliance requirements can also shape anti fraud measures. For instance, the BSA requires financial institutions to have a customer identification program (CIP) in place. This can involve verifying customer identities and checking them against lists of known or suspected terrorists.

Data Protection and Privacy Considerations

Data protection and privacy are crucial considerations in fraud prevention. Financial institutions handle a large amount of sensitive customer data, which must be protected from unauthorized access and misuse.

A robust fraud prevention system should include strong data protection measures, such as encryption and secure access controls. It should also comply with data protection regulations, such as the General Data Protection Regulation (GDPR) in the European Union.

However, there is a delicate balance to be struck. While thorough fraud detection requires access to a certain amount of customer data, this must not infringe on customers' privacy rights. Therefore, financial institutions must ensure that their fraud prevention efforts are both effective and respectful of privacy.

The Future of Fraud Prevention Systems

The future of fraud prevention systems looks bright. New technology is helping create better and faster solutions. The use of big data, artificial intelligence, and machine learning is expected to keep growing. This will improve how these systems detect and prevent fraud.

Emerging technologies such as blockchain and biometrics are also expected to play a significant role in fraud prevention. Blockchain offers a safe and clear way to track transactions. Biometrics provides a more secure way to identify customers.

However, the future of fraud prevention is not just about technology. It also involves a shift in mindset, from a reactive approach to a proactive one. This means not just responding to fraud incidents, but anticipating them and taking steps to prevent them from happening in the first place.

Moreover, as fraud tactics continue to evolve, so too must fraud prevention systems. This requires continuous learning and adaptation, as well as collaboration between financial institutions, technology providers, and law enforcement agencies.

Innovations on the Horizon: Predictive Analytics and Biometrics

Predictive analytics is one of the most promising innovations in fraud prevention. It involves using data, statistical algorithms, and machine learning techniques to identify the likelihood of future outcomes. In the context of fraud prevention, this can mean predicting the likelihood of a transaction being fraudulent based on historical data and patterns.

Biometrics is another innovation that holds great potential for fraud prevention. Biometric authentication methods, such as fingerprint scanning, facial recognition, and voice recognition, can provide a higher level of security than traditional password-based methods. They can also improve the user experience by making authentication quicker and easier.

However, these innovations also bring new challenges. For instance, predictive analytics requires access to large amounts of high-quality data, while biometric authentication raises privacy concerns. Therefore, financial institutions must carefully consider these factors when implementing these technologies.

The Importance of Continuous Learning and Adaptation

Continuous learning and adaptation are crucial for effective fraud prevention. As fraud tactics evolve, so too must fraud prevention systems. This requires staying updated on the latest trends and technologies, as well as learning from past fraud incidents.

Continuous learning can involve various activities, such as attending industry conferences, participating in training programs, and reading industry publications. It can also involve learning from other financial institutions, technology providers, and law enforcement agencies.

Adaptation, on the other hand, involves making changes to the fraud prevention system based on what has been learned. This can involve updating the system's algorithms, implementing new technologies, or changing the institution's fraud prevention policies and procedures. The goal is to ensure that the system remains effective in the face of evolving fraud threats.

Conclusion: Strengthening Your Fraud Prevention Strategy

In conclusion, strengthening your fraud prevention strategy involves a combination of technology, processes, and people. It requires using advanced fraud detection solutions, like those from Tookitaki. We need to take a proactive approach and encourage a culture of continuous learning and adaptation.

Remember, the goal is not just to detect and respond to fraud incidents, but to prevent them from happening in the first place. Stay updated on the latest trends and technologies. Learn from past incidents. This will help you improve your fraud prevention strategy. It will also protect your financial institution from the increasing threat of fraud. This will help protect your financial institution from the growing threat of fraud.

Talk to an Expert

Ready to Streamline Your Anti-Financial Crime Compliance?

Our Thought Leadership Guides

Blogs
29 Apr 2026
6 min
read

Inside the Parañaque Scam Factory: What 48 Arrests Reveal About the Industrialisation of Online Fraud

On 20 April 2026, Philippine media reported that the National Bureau of Investigation had arrested 48 individuals after raiding an alleged online scamming hub in Parañaque City. The timing matters. This is not an old case being revisited. It is a fresh reminder that scam operations across Southeast Asia are still active, organised, and scaling fast.

When authorities entered the site, they did not just uncover another isolated scam. They walked into something far more structured — an operation that looked less like opportunistic fraud and more like a production line.

Dozens of individuals. Multiple devices. Coordinated activity. A setup that resembled a call centre more than a loose group of fraudsters.

For compliance teams, this is not just another headline. It is a signal. Modern scam networks are becoming more industrialised, and the financial trails they leave behind are becoming harder to detect with static, siloed controls.

Talk to an Expert

What Actually Happened in Parañaque

The raid exposed an online scamming hub operating at scale. Investigators found individuals actively engaged in defrauding victims, likely through a mix of social engineering tactics — investment scams, impersonation schemes, and possibly romance or job scams.

What stood out was not just the activity itself, but the structure:

  • Multiple operators working simultaneously
  • Dedicated systems and devices
  • Coordinated workflows
  • A controlled environment, almost like a call centre

This was not a loose group of fraudsters. It was organised, repeatable, and designed for volume.

That distinction matters.

Because once fraud becomes structured like this, it stops being unpredictable and starts becoming scalable.

The Shift from Scams to Scam Infrastructure

For years, fraud has often been viewed as a series of isolated incidents. A phishing email here. A social engineering case there.

That lens no longer holds.

What the Parañaque case reveals is something deeper: the rise of scam infrastructure.

These are not individuals improvising. These are networks designed with:

  • Recruitment pipelines
  • Scripted engagement models
  • Operational roles and hierarchies
  • Performance-driven execution

In many ways, these setups mirror legitimate businesses — except the product being “sold” is deception.

And like any efficient system, they optimise over time.

They test what works. They refine messaging. They reuse successful playbooks. They scale quickly.

For financial institutions, this changes the challenge entirely.

You are no longer detecting one-off fraud. You are up against systems that are constantly learning and adapting.

Why This Matters for Financial Institutions

At first glance, a physical raid in the Philippines may feel distant to a bank in Singapore or a fintech in Australia.

But the financial footprint of such operations is rarely local.

Scam proceeds move quickly — often across borders, across institutions, and across channels.

A typical flow might look like this:

  • Victim transfers funds via online banking or wallet
  • Funds are routed through mule accounts
  • Split into smaller transactions
  • Moved across jurisdictions
  • Layered further to obscure origin

By the time the money surfaces in a financial institution’s system, it often appears routine.

That is the real risk.

Not at the point of the scam, but at the point where illicit funds blend into legitimate financial flows.

The Hidden Complexity Behind “Simple” Scams

It is easy to dismiss scams as basic manipulation.

But cases like this show how layered they have become.

Behind a single victim interaction, there may be:

  • A recruitment network sourcing operators
  • A technical setup managing communication channels
  • A financial layer handling fund movement
  • A supervisory layer coordinating activity

Each layer introduces its own signals.

But those signals are rarely obvious in isolation.

A transaction might look normal.
A customer profile might appear clean.
A payment pattern may not trigger any threshold.

Yet, when viewed together, they form a pattern.

This is the daily reality for compliance teams — connecting weak, fragmented signals into something meaningful.

ChatGPT Image Apr 29, 2026, 12_19_03 PM

Where Traditional Detection Starts to Break Down

Most financial institutions still rely, at least in part, on rule-based monitoring.

And rules do have their place.

But against structured scam operations, they begin to show limitations:

  • Static thresholds struggle against evolving behaviour
  • Isolated alerts fail to capture network patterns
  • Manual tuning cannot keep pace with changing typologies

In the Parañaque case, individual transactions may not have appeared suspicious.

What made them risky was the context — the coordination, the repetition, the connections.

This is where traditional systems fall short.

They are built to detect anomalies, not ecosystems.

The Role of Mule Networks in Scaling Fraud

No large-scale scam operation works without one critical component: money mules.

These accounts absorb, move, and disguise illicit funds.

And they are becoming increasingly sophisticated.

Some are unwitting — recruited through job offers or incentives.
Others are complicit — knowingly participating in exchange for a share.

Either way, they create a buffer between fraudsters and the financial system.

In operations like the Parañaque hub, mule networks likely operate in parallel:

  • Receiving funds from multiple victims
  • Redistributing across accounts
  • Moving funds rapidly across borders

From a compliance perspective, mule activity often appears as:

  • High-velocity transactions
  • Rapid inflows and outflows
  • Accounts with little genuine economic activity

But again, these signals are rarely conclusive on their own.

The Cross-Border Reality

Modern fraud rarely stays within one jurisdiction.

A scam initiated in one country can impact victims in another, with funds routed through multiple regions.

This creates three persistent challenges:

  1. Fragmented visibility
    No single institution sees the full transaction chain
  2. Jurisdictional differences
    Regulatory expectations and data access vary
  3. Delayed intervention
    By the time alerts are triggered, funds have already moved

The Parañaque case reinforces a simple truth: financial crime is global, even when it appears local.

What Compliance Teams Should Be Looking For

Rather than focusing on isolated red flags, institutions need to identify patterns of behaviour.

Indicators aligned with operations like this include:

  • Clusters of accounts exhibiting similar transaction flows
  • Repeated low-to-mid value transfers across multiple beneficiaries
  • Rapid movement of funds with minimal retention
  • Shared identifiers such as devices, IPs, or contact details
  • Activity inconsistent with stated customer profiles

Individually, these may not trigger concern.

Collectively, they signal coordination.

Moving from Detection to Understanding

There is a broader shift underway in financial crime prevention.

From generating alerts…
To understanding behaviour.

It is no longer enough to flag transactions.

Teams need to ask:

  • Why is this activity happening?
  • How is it connected to other behaviour?
  • What broader typology does it resemble?

This shift is not easy.

Because understanding requires context — and context requires intelligence beyond internal data.

The Role of Collaborative Intelligence

Cases like the Parañaque scam hub highlight a structural gap.

No single institution has full visibility.

Fraud patterns are distributed across:

  • Banks
  • Fintech platforms
  • Payment processors
  • Geographies

Which means detection cannot rely on isolated systems.

Collaborative intelligence becomes critical.

By sharing typologies, behavioural patterns, and risk signals without exposing sensitive data institutions can:

This is where community-driven intelligence models are gaining traction.

Where Technology Needs to Evolve

To keep pace with structured fraud operations, detection systems need to evolve in three ways:

1. From rules to adaptive intelligence
Systems must continuously learn from emerging patterns

2. From transactions to networks
Detection must capture relationships, not just events

3. From alerts to actionable insights
Outputs must support faster, clearer investigation decisions

This is not about replacing existing systems overnight.

It is about enhancing them to reflect how fraud actually operates today.

The Cost of Getting This Wrong

The impact of missing these signals goes beyond financial loss.

There are broader consequences:

  • Increased regulatory scrutiny
  • Reputational damage
  • Erosion of customer trust

In fast-growing digital markets, trust is not easily rebuilt once lost.

And fraud, left unchecked, directly undermines it.

A More Grounded Way Forward

The Parañaque case is not an anomaly. It is part of a pattern.

Fraud is becoming:

  • More organised
  • More scalable
  • More adaptive

And increasingly embedded within legitimate financial systems.

Responding to this requires a shift:

From reactive to proactive
From siloed to collaborative
From static to adaptive

For compliance teams, this is not about chasing every new scam.

It is about building the capability to recognise patterns — even as they evolve.

Conclusion: Beyond the Raid

The arrest of 48 individuals is a meaningful enforcement action.

But it is not the end of the story.

Operations like these rarely disappear. They adapt, relocate, and re-emerge.

For financial institutions, the real question is not whether such scams exist.

It is whether their systems can detect the financial signals these operations inevitably leave behind.

Because while enforcement can shut down a physical hub, the financial trails continue to move.

And that is where the real battle is being fought.

Inside the Parañaque Scam Factory: What 48 Arrests Reveal About the Industrialisation of Online Fraud
Blogs
29 Apr 2026
6 min
read

AML Compliance in Malaysia: A Complete Guide to BNM Requirements and AMLATFPUAA

Picture a compliance officer at a Malaysian licensed bank three weeks out from a BNM AML/CFT examination. She has read AMLATFPUAA. She knows the Act was amended in 2014 and again in 2020. What she needs now is not another legislative summary. She needs to know what BNM's examiners will actually open on their laptops when they arrive — which files, which logs, which policy documents — and where programmes at institutions like hers most commonly fall short.

That is what this guide covers.

The legislative history of AMLATFPUAA and its impact on Malaysia's financial sector is covered in our [overview of AMLA and its impact on the Malaysian financial landscape](/compliance-hub/understanding-amla-impact-on-malaysia-financial-landscape). This article focuses on the operational layer: the ongoing compliance obligations that BNM-supervised institutions must meet, the specific thresholds and timelines that govern reporting, and the recurring examination gaps that BNM has identified in practice.

Talk to an Expert

The Regulatory Framework in Brief

Two instruments govern AML/CFT compliance for BNM-supervised institutions in Malaysia.

AMLATFPUAA 2001 is the primary legislation. The 2014 amendment expanded the list of predicate offences and brought Designated Non-Financial Businesses and Professions (DNFBPs) into the compliance perimeter. The 2020 amendment strengthened beneficial ownership requirements and raised maximum penalties to MYR 3 million per offence, or 5 years imprisonment, or both. For financial institutions, the penalties can run per transaction or per day of non-compliance — which changes the risk calculus considerably.

BNM's AML/CFT and TF Policy Document (2023) is where the day-to-day compliance standards sit. The Policy Document translates AMLATFPUAA's obligations into specific programme requirements: who must be screened, how, at what intervals, and with what documentation. BNM's Financial Intelligence and Enforcement Department (FIED) is the enforcement arm that reviews STR filings and leads enforcement action.

When a BNM examiner cites a deficiency, the reference is almost always to the Policy Document, not to the Act itself. Knowing the Act is necessary; knowing the Policy Document is what keeps a programme compliant.

Who Must Comply: Reporting Institutions Under AMLATFPUAA

AMLATFPUAA defines "Reporting Institutions" across three categories, each carrying distinct obligations.

Category 1 covers licensed banks, Islamic banks, and development financial institutions. These institutions carry the fullest set of AML/CFT obligations under the Policy Document, including mandatory enterprise-wide risk assessments and comprehensive transaction monitoring programmes.

Category 2 covers money service businesses (MSBs), remittance operators, and e-money issuers. The obligations are materially equivalent to Category 1 for CDD and reporting, but the Policy Document recognises that the risk typologies differ — particularly for remittance operators processing high-frequency, lower-value cross-border transfers.

Category 3 covers DNFBPs: lawyers, accountants, and real estate agents, brought in under the 2014 amendment. DNFBP obligations are threshold-triggered — they apply when a transaction reaches a defined cash value or when the DNFBP is facilitating a category of activity specified in the Act.

The DNFBP category matters for banks because banks deal with these professionals as customers. When a law firm holds a client account at your institution, BNM expects you to recognise that relationship as carrying elevated risk — and to apply the CDD standards appropriate to it.

Customer Due Diligence: Three Tiers, Different Standards

BNM's AML/CFT Policy Document sets three CDD tiers. Which tier applies depends on the risk profile of the customer and the nature of the business relationship — not on an institution's convenience.

Standard CDD

Standard CDD applies to all new customers unless simplified CDD conditions are met. It requires identification and verification of the customer, documentation of the purpose and intended nature of the business relationship, and a customer risk assessment at onboarding. Verification must be based on independent and reliable sources — a customer self-certifying their identity is not sufficient.

For individual customers, verification typically involves government-issued identification. For corporate customers, it extends to directors, authorised signatories, and ultimate beneficial owners (UBOs).

Simplified CDD

Simplified CDD is available for customers assessed as low-risk: listed companies on a regulated exchange, government entities, and FIs supervised by BNM or an equivalent foreign regulator. Under simplified CDD, identification is still required but the depth of verification can be reduced, and ongoing monitoring can operate at lower intensity.

The Policy Document is explicit that simplified CDD is a risk-based determination — not a category exemption. An institution cannot apply simplified CDD to a listed company without first concluding that the specific company and the specific transaction type present low money laundering risk.

Enhanced Due Diligence

Enhanced Due Diligence (EDD) is mandatory for four customer categories:

  • Politically Exposed Persons (PEPs) — domestic and foreign
  • Customers from FATF-identified jurisdictions with strategic AML/CFT deficiencies
  • Corporate customers with complex or non-transparent ownership structures
  • Customers engaged in cash-intensive businesses

EDD requirements under the Policy Document are specific. For PEPs, the institution must verify source of funds and source of wealth — not just identify the customer's occupation. Senior management approval is required before establishing or continuing a relationship with a PEP. The approval must be documented, with a named approver. Periodic review of PEP relationships is mandatory at least every 2 years.

For all EDD customers, monitoring intensity must be increased. What "increased" means in practice is calibrated monitoring rules, not a generic note in the file that the customer is high-risk.

Beneficial ownership threshold: BNM sets the threshold for identifying UBOs at 25% ownership or control — consistent with the FATF standard. Institutions must trace ownership to natural persons. Nominee structures, trusts, and multi-layer corporate arrangements are not a legitimate stopping point. If your CDD file shows a holding company as the UBO rather than the individuals who own it, the file is incomplete.

For institutions operating digital onboarding channels, the BNM eKYC Policy Document sets out the technical requirements that must be met for remote CDD to carry the same assurance as face-to-face verification. The specifics for digital banks and e-money issuers are covered in our eKYC Malaysia guide.

Ongoing Monitoring Requirements

Onboarding CDD is not a one-time event. BNM's Policy Document requires institutions to monitor the business relationship throughout its duration — which means monitoring transactions for consistency with the customer's risk profile, stated purpose, and expected transaction patterns.

When Re-KYC Is Required

The Policy Document specifies triggers that require re-assessment of a customer's KYC data:

  • A material change in the customer's circumstances (change in business activity, change in ownership structure, change in country of domicile)
  • A change in the customer's risk rating — either triggered by a system alert or a periodic review
  • Reactivation of a dormant account (inactive for 12 months or more)
  • Scheduled periodic review for high-risk customers — at minimum every 2 years

The 12-month dormancy trigger and the 2-year PEP review cycle are not recommendations. They are requirements. BNM examiners check whether these cycles are documented and whether the reviews are substantive — not whether a checkbox was ticked.

Transaction Monitoring Calibration

BNM's examination findings have repeatedly cited one gap above others: institutions running transaction monitoring with default threshold settings that have not been calibrated to the institution's own customer risk profile.

Default thresholds — those that come with a monitoring system out of the box — are designed to be functional across a broad range of institutions. They are not designed to reflect the specific risk profile of your customer book. A licensed bank whose retail clients are primarily salaried employees in Klang Valley has a different expected transaction pattern than an MSB processing remittances to Southeast Asian labour markets. Their monitoring should look different.

BNM expects institutions to document why their thresholds are set where they are, when they were last reviewed, and who approved the current calibration. If the answer is "these are the system defaults," that is a finding waiting to be written.

To understand what an effective transaction monitoring programme should look like — and what to evaluate when selecting or upgrading a system — see our Transaction Monitoring Software Buyer's Guide and What Is Transaction Monitoring.

ChatGPT Image Apr 29, 2026, 11_14_44 AM

Reporting Obligations: Timelines and Thresholds

BNM-supervised institutions have two primary reporting obligations to FIED. Both have defined timelines that examination teams check.

Cash Threshold Reports (CTRs)

Any cash transaction — or series of related cash transactions — of MYR 25,000 or above must be reported to FIED via the goAML system (Malaysia adopted the UNODC goAML platform in 2020). The filing deadline is 3 business days from the date of the transaction.

CTR filing is largely mechanical for institutions with core banking systems capable of automated flagging. Where BNM has found gaps is in the manual detection of structured transactions — multiple sub-MYR 25,000 cash deposits by the same customer within a short period, designed to stay below the CTR threshold. Structuring is a predicate offence under AMLATFPUAA. Failing to detect it is a monitoring failure, not just a reporting failure.

Suspicious Transaction Reports (STRs)

An STR must be filed when a staff member or system alert produces grounds to suspect that a transaction involves the proceeds of a scheduled offence or is connected to terrorist financing. The deadline is 3 working days from the point at which suspicion is formed — not from when the transaction occurred.

That distinction matters. If a transaction alerts in your monitoring system on Monday and a compliance analyst forms a reasonable suspicion on Wednesday, the STR clock started on Wednesday, not Monday.

BNM examination findings have identified a specific quality gap in STR filings: reports submitted without an adequate documented basis for suspicion. An STR that records "transaction appeared unusual" without specifying what pattern triggered the suspicion, what investigation was conducted, and why the analyst concluded suspicion was warranted, does not meet the standard. The goAML system requires structured data fields to be completed — but the narrative quality of what goes into those fields is what BNM examiners assess.

The internal pathway matters too. Institutions must have a documented process for staff to escalate concerns to the MLRO via an Internal Suspicious Transaction Report (ISTR). Frontline staff who identify red flags and have no clear escalation route — or who fear that escalating will reflect poorly on them — are a systemic gap. BNM expects staff training to address this directly.

AML/CFT Programme Governance

A compliant AML/CFT programme is not a set of policies in a folder. BNM's Policy Document specifies the governance structure that must be in place.

Board-approved compliance programme. The institution's AML/CFT programme must be documented, formally approved by the Board of Directors, and reviewed at minimum annually. A programme that exists only in the compliance officer's head — or that was last updated before the 2020 AMLATFPUAA amendments — is non-compliant.

Designated Compliance Officer (DCO). The DCO must sit at senior management level and must have direct access to the Board or Board Audit Committee when escalation is required. BNM examiners specifically check whether the DCO has the seniority and independence to escalate concerns without internal obstruction. An institution where the MLRO reports upward through the business line whose clients they are monitoring has a structural governance problem.

Independent AML/CFT audit. The audit function — whether internal or conducted by a qualified external party — must assess the AML/CFT programme at least once per year. The scope must cover policy adequacy, operational effectiveness, and staff training outcomes. An audit that confirms the policies exist but does not test whether they work is not what BNM requires.

Staff training. Training must be documented, with records of attendance and assessment results. BNM examiners have cited institutions where training records were incomplete or where training had not been updated to reflect regulatory changes — including the goAML transition and the 2020 AMLATFPUAA amendments.

Common BNM Examination Gaps

Based on publicly available BNM guidance and supervisory feedback, five gaps recur across examinations of Malaysian institutions.

Outdated customer risk assessments. Customers onboarded years ago under different risk criteria and never re-assessed — even when their transaction patterns have materially changed.

Incomplete beneficial ownership documentation for corporate customers. Files that identify a corporate structure but stop at the holding company level, without tracing to the natural persons who ultimately control it.

STRs filed without documented analytical basis. The filing exists, but the rationale is absent. This satisfies neither the spirit nor the operational requirement of the obligation.

Default monitoring thresholds. System thresholds not calibrated to the institution's specific customer risk profile — and no documentation that the calibration question was ever asked.

Inadequate scrutiny of DNFBPs as customers. Banks treating law firm client accounts or real estate agent trust accounts the same as ordinary business accounts, without recognising the elevated risk profile those relationships carry under AMLATFPUAA.

Malaysia's FATF Context: Why Examination Intensity Has Increased

Malaysia's FATF Mutual Evaluation in 2023 assessed both technical compliance and effectiveness — two different standards. Technical compliance measures whether the laws and regulations are in place. Effectiveness measures whether they work.

Malaysia's technical compliance ratings were largely Compliant or Largely Compliant. Its effectiveness ratings were lower — particularly for the transparency of corporate beneficial ownership, where the evaluation found that beneficial ownership information was not always available to competent authorities in a timely way.

For BNM-supervised institutions, the practical effect is this: BNM is under pressure to demonstrate that AML controls are operationally effective, not just formally present. Examination intensity has increased since 2023. The scrutiny on beneficial ownership documentation, on monitoring calibration, and on STR quality is not coincidental. These are the areas the FATF evaluation identified as weakest, and they are the areas BNM examiners are examining most carefully.

Preparing for What Examiners Actually Review

The compliance officer three weeks out from her BNM examination should be checking seven things:

  1. Are customer risk assessments current — specifically for dormant accounts and for customers whose transaction patterns have changed?
  2. Do all corporate customer files trace beneficial ownership to natural persons at the 25% threshold?
  3. Are monitoring thresholds documented with a calibration rationale — and reviewed within the last 12 months?
  4. Do STR files contain a structured basis for suspicion, not just a transaction reference?
  5. Is the DCO's seniority and Board access documented?
  6. Was the AML/CFT audit conducted in the past year, and did its scope include operational testing?
  7. Are staff training records complete and current for all frontline and compliance staff?

These are not abstract compliance questions. They are the specific items that BNM examinations have produced findings on. Getting them right before the examination is considerably easier than explaining gaps during it.

If you want to see how Tookitaki's platform supports CDD, transaction monitoring calibration, and STR quality management for BNM-supervised institutions, book a demo. Or download our Malaysia AML compliance checklist for a full pre-examination review framework tailored to AMLATFPUAA and the BNM AML/CFT Policy Document. For institutions evaluating or upgrading their monitoring systems, the Transaction Monitoring Software Buyer's Guide covers what to look for and what to ask vendors about calibration and alert management. If you're new to the foundations of KYC and CDD, our What Is KYC guide provides the conceptual grounding the Policy Document assumes you have.

AML Compliance in Malaysia: A Complete Guide to BNM Requirements and AMLATFPUAA
Blogs
29 Apr 2026
6 min
read

Payment Services Act Singapore: AML Obligations for Licensed Payment Institutions

The MAS approval letter arrives. The Major Payment Institution licence is granted. The founders celebrate. The press release goes out.

Then the compliance team sits down.

The PSA licence covers seven categories of payment service activity, and the AML/CFT obligations attached to each are substantive. Unlike MAS Notice 626 for banks, which has years of published guidance, examination findings, and industry interpretation built around it, the PSA AML framework is less documented. The notices exist. The obligations are real. But the compliance team at a newly licensed MPI often has to build from scratch, without the institutional knowledge that banks have accumulated since 2002.

This guide covers what the Payment Services Act requires from licensed payment institutions in Singapore, specifically on AML/CFT. It is written for compliance officers, MLROs, and legal teams at standard payment institutions (SPIs) and major payment institutions (MPIs) who know what the PSA is but need to understand their specific obligations in detail.

Talk to an Expert

The PSA Framework: Scope and Licence Tiers

The Payment Services Act 2019 (PSA) came into force on 28 January 2020 and was substantially amended by the Payment Services (Amendment) Act 2021 (PS(A)A 2021), which extended regulatory coverage to previously unregulated services and introduced stricter obligations for digital payment token providers.

The PSA regulates seven categories of payment service:

  1. Account issuance services
  2. Domestic money transfer services
  3. Cross-border money transfer services
  4. Merchant acquisition services
  5. E-money issuance services
  6. Digital payment token (DPT) services
  7. Money-changing services

A firm does not need to offer all seven to be licensed. Many MPIs hold licences for two or three categories — a cross-border remittance operator with an e-money issuance component is common. Each service category the firm is licensed for carries AML/CFT obligations independently.

Two Licence Tiers, Different AML Exposure

The PSA creates two licence tiers that determine the depth of AML obligations.

Standard Payment Institutions (SPIs) are subject to monthly transaction thresholds: SGD 3 million per month across all regulated services, or SGD 1.5 million per month for any single regulated service. At these volumes, SPIs can apply simplified CDD in some circumstances and face lighter ongoing monitoring requirements.

Major Payment Institutions (MPIs) exceed those thresholds. MPIs face the full suite of AML/CFT obligations under MAS Notice PSN01 (or PSN02 for DPT services). MAS expects MPI-level controls to be equivalent in standard to those at licensed banks — the fact that a firm is a payment institution rather than a bank does not reduce the expectation.

One important clarification on scope: the PSA exempts certain intra-group transfers and specific corporate treasury services from its regulated activities. Whether a firm's particular activity falls within an exemption requires analysis of the specific transaction flows — MAS has not published a comprehensive list, and several firms have sought clarification through the licensing process itself.

MAS Notice PSN01: The Core AML Obligations

MAS Notice PSN01 — "Prevention of Money Laundering and Countering the Financing of Terrorism — Holders of a Standard Payment Institution Licence or a Major Payment Institution Licence (Non-DPT Services)" — was issued under section 103 of the PSA and took effect when the Act commenced in January 2020.

PSN01 applies to payment institutions providing any of the seven regulated services except DPT services (which fall under PSN02, covered below). Its structure mirrors MAS Notice 626 for banks, adapted for the payment context.

The four core obligation areas under PSN01 are:

1. Customer Due Diligence (CDD)

Payment institutions must identify and verify customers, understand the nature and purpose of the business relationship, and conduct ongoing monitoring. The CDD threshold for occasional transactions is SGD 1,500 — lower than the SGD 5,000 threshold that applies to banks under Notice 626. This difference reflects the higher anonymity risk in payment services, where customer relationships are typically shorter and account history shallower than in traditional banking.

Enhanced due diligence (EDD) is required for:

  • Any transaction above SGD 5,000
  • Cross-border transfers to or from jurisdictions on the FATF grey or black list
  • Customers who present higher-risk indicators under the institution's risk assessment

Simplified CDD is available only for SPI-tier products with capped e-money balances — the maximum cap for simplified CDD to apply is SGD 5,000 in stored value.

2. Ongoing Monitoring

PSN01 requires payment institutions to monitor transactions for unusual or suspicious patterns. The monitoring standard is explicitly equivalent to that imposed on banks under Notice 626. There is no licence-tier carve-out for MPIs: a major payment institution must run monitoring that meets bank-grade expectations.

In practice, this is where many payment institutions fall short. [Transaction monitoring in the MAS context](/compliance-hub/transaction-monitoring-singapore-mas-requirements) requires calibrated alert logic, documented investigation workflows, and audit trails that MAS can review. Payment institutions often have none of these at the point of licence grant — they have the licence, but not the infrastructure.

3. Suspicious Transaction Reporting (STR)

STR obligations do not come from the PSA itself — they come from the Corruption, Drug Trafficking and Other Serious Crimes (Confiscation of Benefits) Act (CDSA). Section 39 of the CDSA requires any person who knows or has reasonable grounds to suspect that property represents proceeds of drug trafficking or other serious crimes to file a report with the Suspicious Transaction Reporting Office (STRO).

The practical timeline is one business day from the point at which suspicion forms. That formation date matters: MAS examination findings have treated cases where the suspicion formation date was left blank or set to the date of filing (rather than the date of the underlying discovery) as incomplete reports — even where the filing itself was technically made within the window.

4. Record-Keeping

CDD documents and transaction records must be retained for five years from the date the transaction was conducted or the business relationship ended. MAS can request records going back up to five years in the course of an examination.

One PSN01 Obligation Per Service

PSN01 contains a provision that compliance teams at multi-service payment institutions sometimes miss: a firm licensed to provide both cross-border money transfer services and e-money issuance services must comply with PSN01 separately for each service. CDD performed for a customer under the cross-border transfer service does not automatically satisfy CDD requirements for the same customer's e-money transactions. The records, processes, and monitoring must address each licensed service independently.

MAS Notice PSN02: DPT Service Providers

MAS Notice PSN02 — "Prevention of Money Laundering and Countering the Financing of Terrorism — Holders of a Standard Payment Institution Licence or Major Payment Institution Licence Carrying on Digital Payment Token Service" — applies to firms licensed to offer DPT services: crypto exchanges, digital asset custodians, and related providers.

PSN02 carries higher-risk obligations than PSN01, reflecting MAS's view that DPT services present specific money laundering and terrorism financing risks not present in traditional payment services.

The additional obligations under PSN02 include:

Travel Rule compliance: PSN02 implements FATF Recommendation 16 for virtual assets. Licensed DPT service providers must collect, verify, and transmit originator and beneficiary information for DPT transfers above SGD 1,500. For transfers to or from unhosted wallets (wallets not held at a licensed provider), enhanced procedures apply. MAS has not mandated a specific technical standard for travel rule compliance, but expects firms to use an approved solution with documented coverage for the counterparty jurisdictions they transact with.

Blockchain-specific monitoring: Alert logic for DPT transactions must address blockchain-native risk indicators — rapid multi-hop transfers across wallets, use of mixing or tumbling services, high-velocity micro-transactions consistent with layering, and activity consistent with known illicit addresses. Standard bank transaction monitoring typologies do not map cleanly to on-chain behaviour, and PSN02 examiners expect DPT-specific rule sets.

Heightened examination intensity post-2022: Following the collapse of FTX in November 2022 and MAS's subsequent review of licensed DPT providers, MAS substantially increased the frequency and depth of PSN02 examinations. Several DPT licence holders received remediation requirements in 2023 and 2024. STR filing quality and travel rule implementation were the two most commonly cited deficiencies.

ChatGPT Image Apr 29, 2026, 10_38_38 AM

CDD Under the PSA: What the Thresholds Mean in Practice

The SGD 1,500 occasional transaction threshold in PSN01 is one of the more misunderstood elements of the PSA framework.

Under Notice 626, banks do not need to apply full CDD to occasional transactions below SGD 5,000. Payment institutions under PSN01 must apply CDD at SGD 1,500. That is not a minor administrative difference. In a remittance business processing hundreds of transactions daily, a significant proportion of transactions will fall between SGD 1,500 and SGD 5,000. Each of those requires customer identification and verification under PSN01 — which requires a technology and process infrastructure that can handle that volume.

In examination, MAS specifically checks whether SGD 1,500 thresholds are being applied in practice — not just whether the institution's CDD policy says they should be. The gap between policy and operational execution is a recurring finding.

For KYC processes at licensed payment institutions, the relevant question is not just whether the institution can identify a customer, but whether the identification is being triggered at the correct transaction threshold, documented correctly, and linked to the transaction monitoring record.

Transaction Monitoring: Where Payment Institutions Fall Short

MAS's 2024 supervisory expectations document specifically noted that transaction monitoring at payment institutions is "less mature" than at banks. This is both a diagnostic and a warning — MAS has signalled that payment institution TM controls are now an examination priority.

Three factors make transaction monitoring operationally harder for payment institutions than for banks:

Shorter customer history: Banks accumulate years of transaction history per customer before alerts are calibrated. Many payment institution customers have been active for months. Baseline behaviour is harder to establish, which means both that unusual patterns are harder to identify and that alert false positive rates tend to be higher.

Faster transaction cycles: Payment transactions settle in minutes or seconds. A structuring pattern that would take weeks to manifest in a bank account can appear and disappear in a payment institution in 48 hours. Monitoring rules must be configured to detect compressed timescales.

Higher cross-border exposure: Cross-border money transfer services, by definition, move funds across jurisdictions — often to markets with weaker AML frameworks. Alert rules for cross-border transfers need jurisdiction-specific calibration, not a single global threshold.

The full MAS transaction monitoring framework covers how these factors should be addressed in a Singapore-compliant monitoring programme.

What MAS Examines at PSA-Licensed Firms

Based on published MAS supervisory findings and the 2024 expectations document, PSA examinations focus on five areas:

CDD threshold application: Are SGD 1,500 triggers actually running in production? Examiners test this by pulling a sample of transactions in the SGD 1,500–5,000 range and checking whether CDD was conducted and documented.

Travel rule compliance for cross-border transfers: For MPI-licensed firms providing cross-border money transfer services, examiners check whether FATF Recommendation 16 originator/beneficiary information is being collected, verified, and transmitted — and whether the institution has procedures for counterparties who cannot receive travel rule data.

STR filing quality: MAS does not measure STR performance primarily by volume. Examiners look at the narrative content of individual STR filings — specifically whether the filing documents the basis for suspicion, the investigation steps taken, and the transaction evidence reviewed. Filings that state "suspicious activity detected" without specifying what made the activity suspicious are treated as incomplete, regardless of whether they were filed on time.

Alert calibration for payment-specific typologies: Generic bank-derived alert rules applied without adaptation are a common finding. Examiners look for rules that address mule account patterns in remittance flows (rapid inbound/outbound cycling with no retention), sub-threshold structuring designed to avoid PSN01 CDD triggers, and rapid account turnover in payment accounts.

PS(A)A 2021 compliance: The 2021 amendment extended PSA coverage to previously unregulated services and increased MAS supervisory powers, including the ability to impose restrictions on MPI licence holders mid-licence. Firms that were operating before the amendment took effect and were brought within scope had a transition period — but that period has elapsed. Any firm that believes its legacy service structure still falls outside the PSA framework should obtain current legal advice.

The 2021 Amendment: What Changed

The Payment Services (Amendment) Act 2021 made three changes relevant to AML compliance:

First, it extended the PSA's regulated activity definitions to capture services previously argued to be outside scope — in particular, certain token-based payment services and digital representation of fiat currency.

Second, it introduced new obligations for DPT service providers, bringing Singapore into alignment with FATF's revised Recommendation 15 on virtual assets. This is the legislative foundation for PSN02 and its enhanced requirements.

Third, it expanded MAS's supervisory toolkit. Under the amended Act, MAS can impose conditions on MPI licences that restrict specific product lines or transaction types while an investigation or remediation is ongoing. This is a more targeted instrument than suspension, and MAS has used it in at least two disclosed cases since 2022.

Building Compliance Infrastructure That Meets PSA Expectations

A PSA licence is not a compliance programme. The licence grants permission to operate; the AML/CFT framework is built after that.

For newly licensed MPIs and SPIs, the gap between what MAS requires and what most firms have at licence grant is significant. PSN01 requires calibrated transaction monitoring, documented CDD at SGD 1,500 thresholds, investigation workflows that leave auditable records, and STR filings with substantive narrative content. These are not features that come pre-configured — they require technology, process design, and trained personnel.

If you are building or evaluating a transaction monitoring programme for a Singapore-licensed payment institution, the Transaction Monitoring Software Buyer's Guide covers what to look for in a system designed for payment services risk — including alert calibration for remittance typologies, travel rule integration, and MAS-examination-ready documentation.

For compliance teams at payment institutions assessing whether their current controls meet MAS's 2024 supervisory expectations, Tookitaki works with licensed payment institutions in Singapore to implement AML/CFT programmes built for PSN01 and PSN02 requirements. Book a demo to see how FinCense addresses payment-specific transaction monitoring and STR documentation.

Payment Services Act Singapore: AML Obligations for Licensed Payment Institutions