Money Laundering Typologies & Threat Landscape 2025
A comprehensive analysis of evolving money laundering schemes, emerging threat actors, and how AI-native detection technology identifies sophisticated financial crime patterns.
Executive Summary
Money laundering continues to evolve in sophistication, with the IMF estimating global flows of $2-4 trillion annually (2-5% of global GDP). This whitepaper examines contemporary money laundering typologies, emerging threats from cryptocurrency and fintech, and how machine learning models detect patterns that evade traditional rule-based systems.
1. The Three Stages of Money Laundering
1.1 Placement
Introducing illicit funds into the financial system:
Common Placement Techniques:
- Structuring (Smurfing): Breaking large cash deposits into sub-$10,000 amounts to avoid CTR reporting
- Currency Smuggling: Physically moving cash across borders to deposit in jurisdictions with weaker controls
- Cash-Intensive Businesses: Commingling dirty money with legitimate cash from restaurants, car washes, casinos
- Money Mules: Recruiting individuals to deposit cash or receive wire transfers
1.2 Layering
Obscuring the audit trail through complex transactions:
Layering Schemes:
- Rapid Movement: Wire transfers through multiple banks and jurisdictions within hours
- Shell Companies: Transactions between related entities with no economic substance
- Loan Back Schemes: Criminal "lends" dirty money to themselves through offshore structure
- Round-Tripping: Money flows out and back to appear as foreign investment
1.3 Integration
Returning laundered funds to criminal with appearance of legitimacy:
- Real Estate Purchases: Buying property with cash, selling at profit
- Luxury Assets: Art, yachts, jewelry purchased at inflated prices
- Business Investments: Seemingly legitimate business acquisitions or expansions
- Salary/Dividends: Paying criminal as employee or shareholder of front company
2. Traditional Money Laundering Typologies
2.1 Trade-Based Money Laundering (TBML)
Exploiting international trade to transfer value and disguise proceeds:
TBML Techniques:
- Over-Invoicing: Exporter inflates price; excess payment transfers value to criminal→ Example: $10 widgets invoiced at $100 each
- Under-Invoicing: Understate price to move value in opposite direction→ Example: $100 widgets invoiced at $10 each
- Over/Under Shipment: Invoice quantity doesn't match actual goods→ Example: Invoice 1000 units, ship 500 or 2000
- Phantom Shipping: Invoice for goods that are never shipped→ Example: Payment for non-existent commodity shipment
2.2 Professional Money Laundering Organizations
Specialized criminal enterprises offering laundering-as-a-service:
Professional Launderers:
- Chinese Underground Banking (IVTS): Hawala-style value transfer avoiding formal banking
- Black Market Peso Exchange: Latin American trade-based laundering network
- Professional Gatekeepers: Corrupt lawyers, accountants, real estate agents
- Money Services Businesses: Unlicensed MSBs/remittance networks
2.3 Casino & Gaming Laundering
Exploiting casinos to exchange and legitimize cash:
- Minimal Gaming: Buy chips with cash, minimal play, cash out with check
- Third-Party Chips: Criminal's cash buys chips for accomplice who cashes out
- Collusion: Rigged games transfer funds between players
- Junkets: High-roller programs used to move money cross-border
3. Cryptocurrency & Digital Asset Laundering
3.1 Cryptocurrency Mixing & Tumbling
Services that obscure blockchain transaction trails:
Mixing Techniques:
- Centralized Mixers: Services like Tornado Cash pool funds and redistribute to break on-chain links→ Detection: Taint analysis tracking deposits/withdrawals temporal correlations
- CoinJoin: Multiple users combine transactions in single Bitcoin transaction→ Detection: Pattern analysis of input/output amounts and timing
- Privacy Coins: Monero, Zcash use cryptography to hide transaction details→ Detection: Focus on fiat on/off ramps and exchange behavior
3.2 DeFi Laundering
Exploiting decentralized finance protocols:
- Liquidity Pools: Deposit dirty crypto, withdraw from pool with different addresses
- Flash Loans: Complex multi-step transactions executed in single block
- Cross-Chain Bridges: Move assets between blockchains to evade monitoring
- NFT Wash Trading: Buy own NFT at inflated price to create provenance
3.3 Ransomware Proceeds Laundering
Converting ransomware cryptocurrency payments to fiat:
Typical Ransomware Cash-Out Chain:
- Victim pays Bitcoin ransom to attacker's wallet
- Funds immediately sent through mixer (Tornado Cash, Blender.io)
- Mixed funds distributed to 100+ intermediary wallets
- Conversion to privacy coin (Monero) on decentralized exchange
- Monero sent to Russian/Chinese OTC brokers
- Cash-out to bank accounts or cash pickup
4. Emerging Typologies
4.1 Fintech & Neobank Exploitation
Criminals exploit digital-first banks' speed and lower friction:
Fintech Vulnerabilities:
- Instant Onboarding: Weak KYC allows synthetic identities and mule account creation
- P2P Payments: Venmo, Zelle, CashApp used for rapid layering
- Embedded Finance: Buy-now-pay-later and crypto platforms with minimal AML controls
- Cross-Border Fintech: Multi-currency accounts facilitate international movement
4.2 Professional Enablers Network
Convergence of corrupt professionals facilitating high-value laundering:
- Trust & Company Service Providers: Create offshore structures with nominee directors
- Real Estate Professionals: All-cash luxury property purchases with shell buyers
- Private Banking: Corrupt relationship managers facilitate PEP laundering
- Accountants & Lawyers: Structure transactions, provide legal opinions legitimizing schemes
4.3 Environmental Crime Proceeds
Growing typology linked to illegal mining, logging, wildlife trafficking:
Environmental Crime Laundering:
- Illegal Gold Mining: $24B annually; laundered through refineries and jewelry supply chain
- Timber Trafficking: Fraudulent export documentation; commingled with legal lumber
- Wildlife Trafficking: Ivory, rhino horn sold via online marketplaces; proceeds via MSBs
- Illegal Fishing: Catches sold to legitimate processors; payments via trade mis-invoicing
5. Typology Detection with AI
5.1 Structuring Detection
Traditional rule-based systems use simple thresholds (e.g., multiple deposits just under $10,000). AI improves detection by:
ML-Enhanced Structuring Detection:
- Velocity Features: Number, frequency, amounts over rolling time windows (1h, 24h, 7d, 30d)
- Pattern Recognition: LSTM models detect periodic/clustered deposits even with varying amounts
- Network Analysis: Graph Neural Networks identify coordinated activity across multiple accounts
- Behavioral Deviation: Compare to entity's historical patterns and peer group baselines
- Geographic Clustering: Deposits at branches/ATMs in geographic proximity
5.2 Trade-Based Money Laundering Detection
TBML is notoriously difficult to detect. AI approaches:
TBML Detection Features:
- Price Anomalies: Compare invoice prices to commodity benchmarks (UN Comtrade, WTO data)
- Counterparty Risk: Entity relationships with shell companies, high-risk jurisdictions
- Volume Inconsistencies: Company size/type doesn't match trade volume
- Circular Trading: Graph analysis detects goods "round-tripping" through multiple entities
- Freight Correlation: Compare shipping costs to declared cargo value/weight
5.3 Crypto Laundering Detection
Blockchain analysis combined with off-chain data:
- Wallet Clustering: Group addresses controlled by same entity using transaction graph analysis
- Mixer Identification: Pattern matching against known mixer contracts and address clusters
- Peel Chains: Recognize characteristic pattern of sequential small withdrawals from large deposit
- Exchange De-Anonymization: Link crypto addresses to fiat bank accounts via deposits/withdrawals
- Smart Contract Analysis: Identify DeFi protocols used for obfuscation
6. Threat Actor Profiles
6.1 Organized Crime Groups
- • Large cash deposits in border regions
- • MSB transfers to high-production countries
- • Used car dealership cash purchases
- • Rapid crypto-to-fiat conversions
- • Accounts receiving frequent P2P transfers
- • Young account holders with anomalous activity
- • Massage parlors, nail salons with high cash flow
- • Frequent remittances to source countries
- • Multiple low-value money orders
- • NPO transfers to conflict zones
- • Small-value crowdfunding from many sources
- • Travel to high-risk regions preceding transactions
6.2 State-Sponsored Actors
Nation-states use sophisticated laundering to evade sanctions and fund operations:
State Actor Techniques:
- North Korea (Lazarus Group): $2B+ stolen via crypto hacks; laundered through Chinese OTC markets
- Russia: Use of shell companies and luxury assets to circumvent sanctions
- Iran: Front companies, trade-based laundering for oil revenue
7. Geographic Risk Factors
7.1 High-Risk Jurisdictions
Jurisdictions with weak AML controls, bank secrecy, or non-cooperation:
FATF Grey & Black Lists (2025):
- Increased Monitoring (Grey List): Myanmar, Nigeria, South Africa, UAE, others with strategic deficiencies
- High-Risk (Black List): North Korea, Iran (call for countermeasures)
- Offshore Financial Centers: BVI, Cayman, Panama, Seychelles used for shell company formation
- Non-Cooperative Tax Havens: Jurisdictions resisting beneficial ownership transparency
7.2 Geographic Red Flags
- Structurally Unusual: Transactions with no apparent economic rationale for jurisdiction pairing
- Sanctions Risk: Activity involving designated countries or regions
- Correspondent Banking: Nested accounts from high-risk jurisdictions
- Free Trade Zones: Transactions through FTZs with weak oversight (Dubai, Hong Kong)
8. Industry-Specific Risks
8.1 Real Estate
- All-Cash Purchases: Luxury properties bought without financing
- Shell Company Buyers: Ownership hidden behind offshore entities
- Rapid Resale: Property flipped quickly at inflated prices
- Straw Buyers: Nominee purchasers concealing beneficial owner
8.2 Art & Antiquities
- Subjective Valuation: Easy to justify inflated prices
- Private Sales: Anonymous buyers through intermediaries
- Portability: High value, easy to transport across borders
- Weak Regulation: Art dealers not subject to AML requirements in many jurisdictions
8.3 Professional Sports
- Player Transfers: Inflated transfer fees between related clubs
- Image Rights: Payments to offshore companies for player likeness
- Sports Betting: Fixed matches combined with betting syndicates
- Sponsorship Deals: Shell companies overpaying for advertising rights
9. Red Flag Indicators
9.1 Customer Behavior Red Flags
- ✗ Reluctance to provide information or documentation
- ✗ Provides minimal or fictitious information
- ✗ Unusual concern regarding compliance or reporting requirements
- ✗ No concern about high fees or unfavorable exchange rates
- ✗ Appears to be acting on behalf of third party but declines to provide information
- ✗ Sudden change in transaction patterns without apparent explanation
9.2 Transaction Red Flags
- ✗ Transactions just below reporting thresholds
- ✗ Unusual patterns of deposits and withdrawals
- ✗ Rapid movement of funds through account
- ✗ Wire transfers to/from high-risk jurisdictions
- ✗ Transactions inconsistent with customer profile
- ✗ Unnecessarily complex transaction structures
- ✗ Round-dollar amounts (suggesting estimates rather than actual business)
10. Future Threat Landscape
10.1 Emerging Threats
Threats on the Horizon:
- AI-Powered Evasion: Criminals using ML to optimize structuring and evade detection models
- Quantum Threats: Future quantum computers breaking current encryption protecting transactions
- Metaverse Laundering: Virtual real estate, NFTs, and in-game assets used for value transfer
- Deepfake KYC: AI-generated fake IDs and biometrics defeating identity verification
- Central Bank Digital Currencies: New payment rails requiring AML adaptation
10.2 Defensive Innovation
nerous.ai's research priorities for emerging threats:
- Adversarial ML Robustness: Hardening models against evasion attacks
- Multi-Modal Detection: Combining transaction data with text, images, network traffic
- Causal Inference: Moving beyond correlation to understand why transactions are suspicious
- Explainable Graph Neural Networks: Making complex network analysis interpretable for investigators
11. Conclusion
Money laundering continues to evolve in sophistication, exploiting new technologies and regulatory gaps. Traditional rule-based detection cannot keep pace with adaptive adversaries. Machine learning—particularly graph neural networks, anomaly detection, and behavioral profiling—provides the advanced analytics needed to identify emerging typologies and sophisticated schemes that evade conventional monitoring.
Key Takeaways:
- ✓ Global money laundering flows estimated at $2-4 trillion annually
- ✓ Cryptocurrency and DeFi create new laundering vectors requiring blockchain analytics
- ✓ Trade-based money laundering remains difficult to detect with traditional methods
- ✓ AI detects complex patterns (structuring networks, TBML anomalies) that evade rules
- ✓ Threat actors increasingly sophisticated, requiring adaptive detection technology
- ✓ Future threats include AI-powered evasion and metaverse laundering
Download Full Whitepaper
Get the complete 45-page threat intelligence report including typology detection guides, red flag reference cards, and AI detection case studies.
Request Full PDF →