Virtual Asset Red Flag Indicators of Money Laundering and Terrorist Financing
Virtual assets can transfer value around the world faster and cheaper than traditional financial institutions. But the pseudo-anonymity associated with them also attracts criminals seeking to take advantage of these same benefits when laundering their funds.
On September 14, 2020, the Financial Action Task Force (FATFThe Financial Action Task Force (FATF) is a global money lau... More) released a report on Virtual Assets Red Flag Indicators to assist reporting entities, such as financial institutions (FIs), designated non-financial businesses and professions (DNFBPs), and VASPs detect whether virtual assets are being used for criminalA Criminal is an individual or group who has been convicted ... More activity. The FATF Report lists the virtual asset-related red flags for money laundering and terrorist financing in the following categories:
- Red Flag Indicators Related to Transactions
- Size and frequency of transactions
- Red Flag Indicators Related to Transaction Patterns
- Transactions concerning new users
- Transactions concerning all users
- Red Flag Indicators Related to Anonymity
- Red Flag Indicators about Senders or Recipients
- Irregularities observed during account creation
- Irregularities observed during CDD process
- Profile of potential money mule or scam victims
- Other unusual behavior
- Red Flag Indicators in the Source of Funds or Wealth
- Red Flag Indicators Related to Geographical Risks
Virtual assets can transfer value around the world faster and cheaper than traditional financial institutions. But the pseudo-anonymity associated with them also attracts criminals seeking to take advantage of these same benefits when laundering their funds.
On September 14, 2020, the Financial Action Task Force (FATF) released a report on Virtual Assets Red Flag Indicators to assist reporting entities, such as financial institutions (FIs), designated non-financial businesses and professions (DNFBPs), and VASPs detect whether virtual assets are being used for criminal activity. The FATF Report lists the virtual asset-related red flags for money laundering and terrorist financing in the following categories:
Red Flag Indicators Related to Transactions
While Virtual Assets (VAs) are still not widely used by the public, their use has caught-on among criminals. The use of VAs for Money-Laundering purposes first emerged over a decade ago, but VAs are becoming increasingly mainstream for criminal activity more broadly. This set of indicators demonstrates how red flags traditionally associated with involving more conventional means of payment remain relevant to detecting potential illicit activity related to VAs.
Size and frequency of transactions
Structuring VA transactions in small amounts, or in amounts under record-keeping or reporting thresholds (similar to structuring cash transactions)
Solution: CipherTrace Sentry APIs return data that can be used to write rules to alert on transactions meeting specified conditions.
Solution: CipherTrace Inspector can be used to analyze an addressIn a cryptocurrency context, an address is a cryptographic k... More that may be part of a series of transactions that are easily identifiable as a pattern of structuring (also referred to as “peel chaining” in crypto) when viewed in graph explorer.
Making multiple high-value transactions:
- in short succession (like within 24 hours)
- in a staggered and regular pattern, with no further transactions recorded during a long period afterwards, which is particularly common in ransomware-related cases
- to a newly created or previously inactive account
Solution: CipherTrace Sentry APIs return data that can be used to write rules to alert on transactions recurring with the same deposit address and can be sorted by value.
Solution: CipherTrace Inspector can be used to easily review an address for transactional history, including periods of dormancy or a newly created address.
Transferring VAs immediately to multiple VASPs, especially to VASPs registered or operated in another jurisdiction where:
- there is no relation to where the customer lives or conducts business
- there is non-existent or weak AML/CFT regulation
Solution: CipherTrace Sentry APIs return data that can be used to write rules to alert on transactions that transfer crypto (VAs) immediately to multiple VASPs.
Solution: CipherTrace Armada VASP Risk Monitor can be used by compliance analysts to understand the operational (KYC) and transactional (AML) risk associated with VASPs. VASPs with higher KYC risk can often be found operating in jurisdictions with weak or non-existent AML/CFT regulation. Armada also includes information on a VASP’s domiciledPlace considered by law as the center of corporate affairs. ... More jurisdiction.
Depositing VAs at an exchange and then often immediately:
- Withdrawing the VAs without additional exchange activity to other VAs, which is an unnecessary step and incurs transaction fees
- Converting the VAs to multiple types of VAs, again incurring additional transaction fees, but without logical business explanation (e.g., portfolio diversification)
- Withdrawing the VAs from a VASP immediately to a private walletA wallet is a device (a hardware device, a program, or servi... More. This effectively turns the exchange/VASP into an ML mixer.
Solution: CipherTrace Sentry APIs return data that can be used to write rules to alert on transactions that withdraw crypto (VAs) immediately without additional exchange activity, or immediately withdrawing to a wallet with no discernable attributionAttribution is the process of attributing otherwise unhelpfu... More which could be a private wallet.
Solution: Converting VAs to multiple types of VAs should be addressed by a VASP’s internal controls and/or core operating system. This cannot be done by an external system.
Accepting funds suspected as stolen or fraudulent:
- Depositing funds from VA addresses that have been identified as holding stolen funds, or VA addresses linked to the holders of stolen funds.
Solution: CipherTrace Sentry APIs return high risk scores for incoming transactions from addresses identified holding stolen funds.
Solution: CipherTrace Armada VASP Risk Monitor can be used by compliance analysts to understand the operational (KYC) and transactional (AML) risk associated with VASPs that may be used more frequently to facilitate the transfer of stolen VAs because of weaker AML/CFT practices.
Red Flag Indicators Related to Transaction Patterns
Similar to the above section, the red flags below illustrate how the misuse of VAs for ML/TF purposes could be identified through irregular, unusual, or uncommon patterns of transactions.
Transactions concerning new users
Conducting a large initial deposit to open a new relationship with a VASP, while the amount funded is inconsistent with the customer profile.
Solution: The institution’s CDD and KYC controls should be used to identify funding inconsistent with the customer profile or expected behavior.
Solution: CipherTrace Inspector can be used for a deeper analysis of the source of the VAs used for funding to determine if the funds are consistent with the customer profile.
Conducting a large initial deposit to open a new relationship with a VASP and funding the entire deposit the first day it is opened, and that the customer starts to trade the total amount or a large portion of the amount on that same day or the day after, or if the customer withdraws the whole amount the day after. As most VAs have a transactional limit for deposits, laundering in large amounts could also be done through over-the-counter trading.
Solution: The institution’s CDD and KYC controls should be used to identify funding inconsistent with the customer profile or expected behavior.
Solution: CipherTrace Sentry APIs return data that can be used to write rules to alert on large initial deposits followed by trading or withdrawal of the same, or nearly the same, amount.
Solution: CipherTrace Inspector can be used for a deeper analysis of the source of the VAs used for funding to determine if the funds are consistent with the customer profile.
A new user attempts to trade the entire balance of VAs or withdraws the VAs and attempts to send the entire balance off the platform.
Solution: The institution’s core operating system should be able to flag a new user’s attempt to trade or transfer an entire balance.
Transactions concerning all users
Transactions involving the use of multiple VAs, or multiple accounts, with no logical business explanation.
Solution: The institution’s CDD and KYC controls should be used to identify funding inconsistent with the customer profile.
Solution: CipherTrace Inspector can be used for a deeper analysis of the source of the VAs used for funding to determine if the funds are consistent with the customer profile.
Making frequent transfers in a certain period of time (e.g., a day, a week, a month, etc.) to the same VA account:
- by more than one person
- from the same IP address by one or more persons
- concerning large amounts
Solution: The institution’s core operating system can identify the timing and frequency of transactions, account logins from differing IP addresses, and alert to large amounts.
Solution: CipherTrace Inspector can be used for a deeper analysis of suspect VA addresses.
Incoming transactions from many unrelated wallets in relatively small amounts (accumulation of funds) with subsequent transfer to another wallet or full exchange for fiat currency. Such transactions by a number of related accumulating accounts may initially use VAs instead of fiat currency.
Solution: CipherTrace Sentry APIs return data that can be used to write rules to alert on a high number of deposits in a single address (accumulation).
Solution: CipherTrace Inspector allows for visualization of consolidating transactions (accumulation) through funnel accounts.
Solution: The institution’s core operating system can identify a full exchange for fiat currency.
Conducting VA-fiat currency exchange at a potential loss (e.g., when the value of VA is fluctuating, or regardless of abnormally high commission fees as compared to industry standards, and especially when the transactions have no logical business explanation).
Solution: The institution’s core operating system can identify cash-outs with potential losses.
Solution: CipherTrace Sentry APIs can be used to alert on a transaction for an address.
Converting a large amount of fiat currency into VAs, or a large amount of one type of VA into other types of VAs, with no logical business explanation.
Solution: CipherTrace Sentry APIs can be used to alert on a transaction for an address.
Solution: The compliance team’s core operating system can provide details on large transactions without a logical business explanation.
Red Flag Indicators Related to Anonymity
This set of indicators draws from the inherent characteristics and vulnerabilities associated with the underlying technology of VAs. The various technological features below increase anonymity and add hurdles to the detection of criminal activity by Law Enforcement Agencies (LEAs).
These factors make VAs attractive to criminals looking to disguise or store their funds. Nevertheless, the mere presence or these features in an activity does not automatically suggest an illicit transaction. For example, the use of a hardware or paper wallet may be legitimate as a way to secure VAs against thefts. Again, the presence of these indicators should be considered in the context of other characteristics about the customer and relationship, or a logical business explanation.
Solution: CipherTrace Sentry API information can be used to identify all centralized exchanges.Solution: CipherTrace Armada should be used to identify VASPs that support the use of AEC/privacy coins, which could be considered an indicator of risk.
Solution: The institution’s core operating system should be able to provide a cross section of the client’s portfolio.
Solution: CipherTrace Sentry API information can be used to identify transactions coming from or going to P2P exchanges like LocalBitcoins, Paxful, and others.
Solution: CipherTrace Armada Virtual Asset Entity Feed (VAEF) data should be ingested by the bank’s AML platform to identify VASP activity in the bank’s network.
Solution: CipherTrace Armada P2P Exchanger data can be used to identify potentially illicit peer-to-peer activity using the bank’s network.
Solution: The institution’s (VASP’s) core operating system should be able to identify fiat transfers coming to and from various identified accounts.
Solution: CipherTrace Sentry API information can be used to identify transactions coming from or going to P2P exchanges like LocalBitcoins, Paxful, and others.
Solution: CipherTrace Armada VASP Risk Monitor can be used by compliance analysts to better understand operational and transactional risk associated with exchanges used for cash out. High operational and/or transactional risk may be an indicator of high-risk exchange frequently used by bad actors to facilitate money laundering.
Solution: CipherTrace Inspector can be used to provide additional insight into the source of VAs for the customer.
Solution: CipherTrace Sentry APIs identify transactions to or from mixing/tumbling services, as well as P2P platforms.
Solution: CipherTrace Inspector can be used to provide additional insight into the source or destination of VAs for the customer.
Solution: CipherTrace Sentry APIs identify transactions to or from mixing/tumbling services, as well as addresses associated with darknet marketplaces and vendors.
Solution: CipherTrace Inspector can be used to provide additional insight into the source or destination of VAs passing thru mixing/tumbling services.
Solution: CipherTrace Sentry APIs identify transactions to or from high-risk sources, including dark markets, mixers/tumblers, ransomware, etc. If exposure is indirect, the intermediary address will be identified as high-risk.
Solution: CipherTrace Inspector can be used to provide additional insight into the source or destination of VAs passing thru subject address or wallet, including information on indirect exposure 2+ hops away.
Solution: This use-case requires direct access to the hardware or paper wallets.
Solution: CipherTrace Inspector can be used to trace hardware or paper wallet addresses that are used for transporting VAs across borders. This lookup can provide additional insight into the transactional history of the subject addresses.
Solution: The institution’s core operating system can identify suspicious login activity.
Solution: The institution’s core operating system can identify suspicious login activity.
Solution: The institution’s core operating system can identify suspicious login activity.
Solution: CipherTrace Inspector can be checked for IP address activity across multiple BTC addresses.
Solution: VASP support of anonymity-enhanced Virtual Asset (AEC), also known as privacy coins, increases the risk for money laundering and terrorist financing activity. A VASP may wish to consider not supporting privacy coins.
Solution: CipherTrace Armada VASP Risk Monitor identifies VASPs that support privacy coins and provides additional risk intelligence that can be used to help profile customer activity.
Solution: CipherTrace Sentry API identifies the VASP sending or receiving funds.
Solution: CipherTrace Armada VASP Risk Monitor identifies VASPs that demonstrate weak or non-existent KYC processes. Nearly 1,000 VASPs have been operationally (KYC) risk-rated (Red, Yellow, Green) and are periodically re-evaluated.
Using VA ATMs/Kiosks:
- despite the higher transaction fees and including those commonly used by mules or scam victims; or
- in high-risk locations where increased criminal activities occur (a single use of an ATMA Bitcoin ATM (Automated Teller Machine) is a business who o... More/kiosk is not enough in and of itself to constitute a red flag but would if it was coupled with the machine being in a high-risk area or was used for repeated small transactions or other factors).
Solution: CipherTrace Sentry APIs identify ATM operators.
Red Flag Indicators about Senders or Recipients
This set of indicators is relevant to the profile and unusual behavior of either the sender or the recipient of the illicit transactions.
Irregularities observed during account creation
Solution: The institution’s existing KYC system should provide the necessary insight to determine if there is a relationship between multiple accounts.
Solution: CipherTrace Inspector can be used to further identify potential relationships by performing a trace analysis to spot the consolidation of funds as they move in and out of suspect accounts at the VASP and reconsolidate in another wallet.
Solution: The institution’s core operating system can identify suspicious login activity.
Solution: CipherTrace Inspector can be used to further investigate IP address activity (caveat: a large percentage of crypto transaction activity is channeled thru TOR and/or VPNs).
Solution: The institution’s core operating system can identify suspicious login activity.
Solution: CipherTrace Inspector can be used to further investigate IP address activity (caveat: a large percentage of crypto transaction activity is channeled thru TOR and/or VPNs).
Solution: The institution’s core operating system can identify suspicious login activity.
Irregularities observed during CDD process
Solution: The institution’s KYC system should provide the necessary insight to determine if the accounts have similarities.
Solution: CipherTrace Inspector can be used to perform additional due diligence on Virtual Asset addresses furnished by the customer. Trace analysis may reveal further risk related to source of VAs.
Solution: CipherTrace Armada VASP Risk Monitor data can be used to further profile operational (KYC) and transactional (AML) risk associated with a VASP opening an account.
Solution: The institution’s core operating system may provide additional insight to suspicious sender/recipient activity.
Solution: CipherTrace Inspector can be used to perform additional due diligence on Virtual Asset addresses furnished by the customer. Trace analysis may reveal further risk related to source of VAs.
Solution: The institution’s KYC system should provide the necessary insight to determine customer due diligence (CDD) irregularities.
Customer Profiles
Solution: The institution’s core operating system can cross reference shared credentials.
Solution: CipherTrace Inspector can be used to check IP address information (as available) for pattern use of TOR or a VPN.
Solution: The institution’s core operating system can identify suspicious login activity.
Solution: CipherTrace Inspector can be used to check IP address information (as available) for pattern use of TOR or a VPN.
Solution: CipherTrace Sentry APIs identifies addresses associated with illegal activity. CipherTrace collects millions of pieces of attribution each month, including OSINT, darknet and public forum postings.
Solution: CipherTrace Inspector identifies addresses associated with illegal activity. CipherTrace collects millions of pieces of attribution each month, including OSINT, darknet and public forum postings.
Solution: The institution’s CDD and KYC controls should flag the customer.
Solution: CipherTrace Sentry APIs identifies addresses associated with criminal activity. CipherTrace collects millions of pieces of attribution each month, including sanction list data.
Solution: CipherTrace Inspector identifies addresses associated with criminal activity. CipherTrace collects millions of pieces of attribution each month, including sanction list data.
Solution: compliance team’s core operating and KYC systems may flag the unusual customer activity.
Solution: CipherTrace Inspector can be used to trace source of VA for illicit activity.
Profile of potential money mule or scam victims
Solution: The institution’s core operating and KYC systems may flag the unusual customer activity.
Solution: CipherTrace Inspector can be used to trace source or destination of VA for illicit activity.
Solution: The institution’s core operating and KYC systems may flag the unusual customer activity.
Solution: CipherTrace Inspector can be used to trace source or destination of VAs for illicit activity.
Solution: The institution’s core operating and KYC systems may flag the unusual customer activity.
Solution: CipherTrace Inspector can be used to trace source or destination of VAs to provide further insight if the funds are consistent with the customer profile/behavior.
Other unusual behavior
Solution: The institution’s core operating and KYC systems should provide the necessary insight to flag the unusual customer account activity.
Solution: CipherTrace Inspector can be used to trace source or destination of VAs to provide further insight if the funds are consistent with the customer profile/behavior.
Solution: The institution’s core operating system can identify suspicious login activity.
Solution: The institution’s core operating system to read messages like Op_Returns, etc.
Solution: CipherTrace Sentry APIs identifies transaction addresses associated with illicit activity, including dark markets where illicit goods including drugs and stolen credit cards can be bought and sold.
Solution: CipherTrace Inspector identifies transaction addresses associated with illicit activity, including dark markets where illicit goods including drugs and stolen credit cards can be bought and sold.
Solution: The institution’s core operating and KYC systems should provide the necessary insight to flag the unusual customer account activity.
Solution: CipherTrace Inspector can be used to trace source or destination of VAs to provide further insight if the funds are consistent with the customer profile/behavior.
Red Flag Indicators in the Source of Funds or Wealth
As demonstrated by cases submitted by jurisdictions, the misuse of VAs often relates to criminal activities, such as illicit trafficking in narcotics and psychotropic substances, fraud, theft and extortion (including cyber-enabled crimes). Below are common red flags related to the source of funds or wealth linked to such criminal activities:
Solution: CipherTrace Sentry APIs identifies transaction addresses associated with the aforementioned activities.
Solution: CipherTrace Inspector allows compliance analysts to perform further analysis on transactions that involve the aforementioned activities. CipherTrace collects millions of pieces of attribution each month related to these illicit activities.
Solution: CipherTrace Sentry APIs identifies online gambling services sending or receiving VA transactions.
Solution: The institution’s core operating system should provide the necessary insight to flag the withdrawal of large amounts of fiat to purchase VAs.
Solution: The institution’s core operating and KYC systems should provide the necessary insight to determine if the login and account activity and funds are consistent with the customer profile/behavior.
Solution: CipherTrace Inspector allows compliance analysts to perform further analysis on the destination of the funds if not immediately converted to fiat or sent to another exchange to convert to fiat.
Solution: The institution’s core operating and KYC systems should provide the necessary insight to determine if the account activity and funds are consistent with the customer profile/behavior and provident of credit or pre-paid cards.
Solution: CipherTrace Inspector allows compliance analysts to perform further analysis on the source of funds used for the initial deposit to determine if the funds are consistent with the customer profile and/or business.
Solution: CipherTrace Sentry APIs return data that identify incoming and outgoing transaction data from third-party mixing services or wallet tumblers.
Solution: CipherTrace Inspector allows for deeper analysis of the source of customer funds.
Solution: CipherTrace Inspector allows for deeper analysis of the source of customer funds used for the initial deposit to determine if the funds are consistent with the customer profile and/or business.
Solution: CipherTrace Quarterly AML reports and other customer communications regularly profile fraudulent ICO activity.
Solution: OSINT, SEC and other publicly data available sources.
Solution: CipherTrace Sentry APIs return data that identifies the sending or receiving VASP, including the identification of a High Risk VASP.
Solution: CipherTrace Armada VASP Risk Monitor provides compliance analysts with risk data on operational (KYC) and transactional (AML) practices for each VASP. VASPs that lack AML/CFT controls quickly stand out.
Red Flag Indicators Related to Geographical Risks
This set of indicators emphasizes how criminals, when moving their illicit funds, have taken advantage of the varying stages of implementation by jurisdictions on the revised FATF Standards on VAs and VASPs. Based on cases reported by jurisdictions, criminals have exploited the gaps in AML/CFT regulations on VAs and VASPs. These jurisdictions may not have a registration or licensing regime or have not extended STR requirements to cover VAs and VASPs or may not have otherwise introduced the full spectrum of preventive measures as required by the FATF Standards.
These risks are associated with source, destination, and transit jurisdictions of a transaction. They are also relevant to risks associated with the originator of a transaction and the beneficiary of funds that may be linked to a high-risk jurisdiction. In addition, they may be applicable to the customer’s nationality, residence, or place of business.
Solution: CipherTrace Sentry APIs return data that identifies the VASP sending or receiving VAs.
Solution: CipherTrace Armada VASP Risk Monitor provides compliance analysts with jurisdiction information for each VASP.
Solution: CipherTrace Inspector provides compliance analysts with jurisdiction information for each VASP.
Solution: CipherTrace Sentry APIs return data that identifies the VASP sending or receiving VAs.
Solution: CipherTrace Armada VASP Risk Monitor provides compliance analysts with operational (KYC) and transactional (AML) risk, along with the jurisdiction information, for each VASP.
Solution: CipherTrace Sentry APIs return data that identifies the VASP sending or receiving VAs.
Solution: CipherTrace Armada VASP Risk Monitor provides compliance analysts with operational (KYC) and transactional (AML) risk, along with the jurisdiction information, for each VASP.
Solution: CipherTrace Sentry APIs return data that identifies the VASP sending or receiving VAs.
Solution: CipherTrace Armada VASP Risk Monitor provides compliance analysts with operational (KYC) and transactional (AML) risk, along with the jurisdiction information, for each VASP.
Solution: CipherTrace Sentry APIs return data that identifies the VASP sending or receiving VAs.
Solution: CipherTrace Armada VASP Risk Monitor provides compliance analysts with operational (KYC) and transactional (AML) risk, along with the jurisdiction information, for each VASP.
FinCEN’s Virtual Asset Red Flag Indicators of Money Laundering and Terrorist Financing
Darknet Marketplaces
- A customer conducts transactions with CVC addresses that have been linked to darknet marketplaces or other illicit activity.
- A customer’s CVC address appears on public forums associated with illegal activity.
- A customer’s transactions are initiated from IP addresses associated with TOR.
- Blockchain analytics indicate that the wallet transferring CVC to the exchange has suspicious source or sources of funds, such as a darknet marketplace.
- A transaction makes use of mixing and tumbling services, suggesting an intent to obscure the flow of illicit funds between known wallet addresses and darknet marketplaces.
Unregistered or Illicitly Operating P2P Exchangers
- Transfers or receives funds, including through traditional banking systems, to or from an unregistered foreign CVC exchange or other MSB with no relation to where the customer lives or conducts business.
- Utilizes a CVC exchanger or foreign-located MSB in a high-risk jurisdiction lacking, or know to have inadequate AM/CFT regulations for CVC entities, including inadequate KYC or customer due diligence measures.
- A customer directs large numbers of CVC transactions to CVC entities in jurisdictions with reputations for being tax havens.
- A customer that has not identified itself to the exchange, or registered with FinCEN, as a money transmitter appears to be using the liquidity provided by the exchange to execute large numbers of offsetting transactions.
Unregistered Foreign MSBs
- Receives multiple cash deposits or wires from disparate jurisdictions, branches of a financial institution, or persons and shortly thereafter uses such funds to acquire virtual currency.
- Receives a series of deposits from disparate sources that, in aggregate, amount to nearly identical aggregate funds transfers to a known virtual currency exchange platform within a short period of time.
- Customer’s phone number or email address is connected to a known CVC P2P exchangeA Peer-to-Peer (P2P) exchange acts like a match-maker or auc... More platform advertising exchange services.
- Transfers or receives funds, including through traditional banking systems, to or from
- Transfers or receives funds, including through traditional banking systems, to or from an unregistered foreign CVC exchange or other MSB with no relation to where the customer lives or conducts business.
- Utilizes a CVC exchanger or foreign-located MSB in a high-risk jurisdiction lacking, or know to have inadequate AM/CFT regulations for CVC entities, including inadequate KYC or customer due diligence measures.
- A customer directs large numbers of CVC transactions to CVC entities in jurisdictions with reputations for being tax havens.
- A customer that has not identified itself to the exchange, or registered with FinCEN, as a money transmitter appears to be using the liquidity provided by the exchange to execute large numbers of offsetting transactions.
Unregistered or Illicitly Operating CVC Kiosks
- A customer operates multiple CVC kiosks in locations that have a relatively high incidence of criminal activity.
- Large numbers of transactions from different customers sent to and from the same CVC wallet addresses but not operating as a known CVC exchange.
Illicit Activity Leveraging CVC Kiosks
- Structuring of transactions just beneath the CTR threshold or the CVC kiosk daily limit to the same wallet addressA wallet address is a way of grouping bitcoin addresses into... More either by using multiple machines or tied to the same phone number.
Conclusion
The red flag indicators included in this report are neither exhaustive nor applicable in every situation. These indicators are often just one of many elements contributing to a bigger overall picture of potential ML or TF risk.
Indicators of ML or TF are constantly evolving, especially in the virtual asset sector. Over $1.3 trillion was transacted in virtual currency last year, and this will double year-on-year. Over $1 billion of this was criminal and laundered through banks.
In order for banks to comply with any of the virtual asset red flags for ML or TF, it is necessary for them to be able to accurately identify and monitor all virtual asset-related transactions flowing through their institutions. CipherTrace enables your financial institution to detect virtual asset-related activity on your credit cards, wire transfers and ACH transactions, and giving your institution the intelligence needed to file Suspicious Activity Reports related to these transactions.