Money mules create a real-time AML problem: Here’s how to address it

by Alyssa Iyer, head of product - AML - Lynx Tech

Share this post

To address the money mule problem, organisations must combine elements of fraud prevention, cyber threat intelligence, and anti-money laundering capabilities.

Is AML a real-time problem?

The answer seems to be “no” at first glance. Most money laundering typologies, such as transaction layering, rapid and high-frequency fund movements, and unusual counterparty relationships, require historical transaction data to identify suspicious patterns. It takes AML teams weeks (if not months) of diligent analysis to escalate these activities to law enforcement.

Money mules: A real-time AML problem demanding a real-time solution

However, money mule typologies present an opportunity to incorporate technology from fraud prevention, cyber threat intelligence, and AML to stop, investigate, and escalate illicit activity in real time.

Given the significant overlap between fraud and muling—both involving rapid, low-denomination fund movements through fraudulently onboarded or compromised accounts—fraud prevention tools can be applied to detect mule behaviour instantly. Additionally, unusual device, session, and account activity, often present in muling schemes, can be flagged by cyber threat intelligence tools to support immediate detection.

Yet, money mules aren’t just a fraud or cyber problem. They’re an essential part of the money laundering chain, placing and layering illicit funds through real-time payment systems. Under traditional AML programs, these small, rapid transactions often go unnoticed until enough activity accumulates to trigger a red flag, which is too late to stop the money laundering network. By then, the funds had been laundered through multiple accounts, making recovery difficult. This has significant impacts: in the UK alone, mules launder over £10 billion annually, with over 39,000 accounts demonstrating muling behaviour identified in 2022.

Mule detection: The convergence of fraud prevention, cyber threat intelligence, and AML

To dismantle mule networks faster, AML, fraud, and cyber teams must collaborate by sharing tools, data, and intelligence.

Fraud Prevention solutions have honed AI-based capabilities, including supervised machine learning (ML), which can be applied to mules to detect illicit transactions in real time. In addition, cyber threat intelligence tools enable real-time detection of accounts, credentials, and devices, providing supporting evidence to halt mule transfers in real-time, even without historical transaction patterns. Combined, these capabilities allow AML teams to act faster, stopping mule transactions in real time and using network analytics to uncover broader connections.

Here’s an example of this convergence:

  • A small incoming transfer is scored as high risk by the fraud prevention system.
  • Cyber threat tools detect unusual IP, device, and session activity.
  • The transaction is halted in real time, and the account is flagged.
  • AML systems identify a pattern of low-value incoming and outgoing transfers tied to multiple institutions.
  • Network analytics identify connections to other mule accounts.
  • Additional outgoing transfers are stopped, and a Suspicious Activity Report (SAR) is filed within the regulatory deadline.

Challenges in real-time AML

Alyssa Iyer, head of product – AML – Lynx Tech

Real-time AML is easier said than done, given the current tooling and structure of most AML operations. Without automation, AI models, and integrated fraud and cyber threat signals, false positives can overwhelm AML teams. Institutions also need a way to quickly connect related transactions and accounts, ideally using graph analytics to map networks based on shared characteristics such as IP addresses, devices, or locations. Lastly, with a 30-day deadline for SAR filings once suspicious activity is detected, case management workflows and data collection need to be as streamlined and automated as possible.

Take action to address money mules

AML leaders should investigate whether their institution has a money mule problem and, if so, must prepare their operations for real-time AML:

  1. Perform a threat assessment of your portfolio: Investigate money mule typologies and patterns within your products, services, transactions, and accounts to determine your money mule risk exposure.
  2. Prepare your data for supervised MLAdvanced fraud prevention solutions use supervised ML to detect financial crimes accurately and provide critical signals for real-time AML. Accurately label transaction data as either fraud or genuine to prepare it for use in supervised models.
  3. Empower analysts and promote explainability with actionable context: Supplement real-time alerts with easily digestible intelligence to ensure explainability and help analysts make decisions. This includes cyber threat intelligence details and graph analytics that link alerting transactions to other customers flagged as exhibiting mule characteristics.
  4. Ensure your AML operations are ready for real-time alerts: Update AML processes and procedures by automating aspects of data collection and investigations, ensuring that analysts can quickly handle real-time alerts and submit suspicious activity reports (SARs) within regulatory timelines.

Conclusion

Money mules are a growing real-time AML problem that won’t be solved with siloed efforts. By merging the strengths of fraud prevention, cyber threat intelligence, and AML, institutions can detect, disrupt, and dismantle mule networks before laundered funds disappear.

Logo_FullColour
Article by Lynx

More To Explore

Membership

Merchant Community Membership

Are you a member of The Payments Association?

Member benefits include free tickets, discounts to more tickets, elevated brand visibility and more. Sign in to book tickets and find out more.

Welcome

Log in to access complimentary passes or discounts and access exclusive content as part of your membership. An auto-login link will be sent directly to your email.

Having trouble signing?

We use an auto-login link to ensure optimum security for your members hub. Simply enter your professional work e-mail address into the input area and you’ll receive a link to directly access your account.

First things first

Have you set up your Member account yet? If not, click here to do so.

Still not receiving your auto-login link?

Instead of using passwords, we e-mail you a link to log in to the site. This allows us to automatically verify you and apply member benefits based on your e-mail domain name.

Please click the button below which relates to the issue you’re having.

I didn't receive an e-mail

Tip: Check your spam

Sometimes our e-mails end up in spam. Make sure to check your spam folder for e-mails from The Payments Association

Tip: Check “other” tabs

Most modern e-mail clients now separate e-mails into different tabs. For example, Outlook has an “Other” tab, and Gmail has tabs for different types of e-mails, such as promotional.

Tip: Click the link within 60 minutes

For security reasons the link will expire after 60 minutes. Try submitting the login form again and wait a few seconds for the e-mail to arrive.

Tip: Only click once

The link will only work one time – once it’s been clicked, the link won’t log you in again. Instead, you’ll need to go back to the login screen and generate a new link.

Tip: Delete old login e-mails

Make sure you’re clicking the link on the most recent e-mail that’s been sent to you. We recommend deleting the e-mail once you’ve clicked the link.

Tip: Check your security policies

Some security systems will automatically click on links in e-mails to check for phishing, malware, viruses and other malicious threats. If these have been clicked, it won’t work when you try to click on the link.

Need to change your e-mail address?

For security reasons, e-mail address changes can only be complete by your Member Engagement Manager. Please contact the team directly for further help.

Still got a question?