Jump to content

#33 Talking Money Mule Account Detection with Facephi and How Advanced Biometrics Drive Fraud Prevention

Play
Season 5, episode 7
40 min / Published
By DIACC

In this episode of Trust Talks & Digital Dives, we delve into the growing threat of money mule accounts, a significant challenge in financial fraud where criminals exploit stolen identities to launder illicit funds. Our discussion features Facephi, a leader in digital identity verification solutions, as we dive into the challenges in detecting mule accounts and how advanced biometric technology, including facial recognition and liveness detection, helps combat identity document fraud. We also examine how AI-powered identity verification enables financial institutions to detect suspicious activity while maintaining a seamless customer experience. Finally, we look ahead at how innovations will shape the future of fraud prevention and financial security.


Guest: José Israel Castro, Senior Identity Solutions Manager at Facephi
Moderator: Joni Brennan, President at DIACC


Key Discussion Topics & Questions

1. How do criminals use stolen identities to open money mule accounts, and why is this a growing financial fraud problem?

Criminals are increasingly relying on money mule accounts to move illicit funds tied to scams, phishing attacks, and organized financial crimes. These accounts are opened using stolen, leaked, or synthetic identities, which are often obtained through data breaches or social engineering. Once created, the accounts are used to receive, transfer, and withdraw money, making it more difficult to trace the origin of fraudulent transactions. 

There are three main types of mule accounts: 

  • Complicit mules: Opened with fake or stolen identities and directly operated by criminals. 
  • Willing mules: Individuals who knowingly let their accounts be used in exchange for a commission. 
  • Unwilling mules: Victims who are manipulated into transferring money, unaware they’re aiding criminal activity.

This issue is rapidly escalating. According to SEPBLAC, up to 5% of global GDP, around $2 trillion, is laundered each year, and over 4 million fraudulent accounts were identified globally in the last year alone. 

To understand how this works in real life, here are two real-world examples of authorized fraud, cases where victims themselves perform the transactions under deception, making detection even harder: 
 

Case: “The fake bank call” (unwilling mule) 

  • Ana receives a call from someone claiming to be from her bank’s security team. 
  • The fraudster knows some of her details (full name, ID digits, recent transactions), increasing credibility. 
  • She’s been informed of suspicious activity and asked to transfer her funds to a “safe” account. 
  • Under emotional pressure, she voluntarily transfers €6,000 using her usual device and 2FA. 
  • The receiving account belongs to a mule, who immediately withdraws the money. 
  • Since Ana authorized the transaction, it's considered valid despite being a scam. 

Case: “WhatsApp identity scam” (willing or complicit mule) 

  • Marta receives a message from an unknown number claiming to be her son: “Hi mom, this is my new number.” 
  • Hours later, “her son” asks her to urgently pay a phone bill since he lost access to his bank. 
  • Marta transfers €980 to the account provided, trusting the request. 
  • Only later does she learn her son never changed his number. A mule used the account to withdraw the funds. 

These examples show how easily fraudsters exploit emotional trust and identity data, bypassing traditional security systems. Since transactions appear technically legitimate, banks may struggle to detect or reverse them, especially when the recipient is a mule using a verified identity. 


That’s why fighting mule accounts requires a new layer of defence, continuous identity verification, behavioural biometrics, and anomaly detection powered by AI, to go beyond credentials and assess intent, context, and behaviour in real time. 


This isn’t just a compliance challenge. It’s a growing threat to the integrity of the entire financial system. 

 

2. What are the biggest challenges in detecting mule accounts, and how can advanced digital identity solutions, like Facephi, help combat this issue?

One of the biggest challenges is that traditional systems are designed to detect unauthorized access, such as Account Takeover (ATO) attacks. Still, they’re not prepared to identify mule accounts, especially when it comes to voluntary or involuntary types. 


At Facephi, we focus on proactive detection, and that completely changes the game. 
We use three main approaches: 

  1. Pre-fraud signals: We analyze early warning signs from the moment the account is opened, including transactions, banking channels, and devices shared between accounts. 
  2. Dynamic risk scoring: We employ a dynamic classification of accounts, enabling us to assign a risk score and anticipate potential fraudulent activity. 
  3. Collaborative intelligence: We promote secure and privacy-compliant data sharing between financial institutions to detect fraud patterns at scale. 

This enables us to stop fraud schemes before they’re activated, not after.

 

3. How does biometric technology, including facial recognition and liveness detection, strengthen prevention efforts against identity document fraud?

The user verification process we use at Facephi leverages biometric data to validate a person’s identity, while also ensuring the document they’re using is legitimate. 


First, the user scans their ID document using automated OCR technology, which instantly extracts the data. In the same step, the document’s authenticity is verified. 


Then, the user takes a selfie, and our passive liveness detection confirms that it’s a real person in front of the camera, not a spoofed photo or video. We then match the facial features with the document image to ensure they align. 


The process concludes with advanced verification steps, including checks on age, location, device, and cross-references with official databases, watchlists, or self-exclusion schemes. 


If a financial institution needs even stronger authentication, it can also add other biometric modalities, such as voice, fingerprint, or behavioural biometrics, for continuous, silent verification. 


In short, these technologies not only prevent the use of fake or stolen documents, they raise the bar for security without compromising the user experience. 

 

4. How can financial institutions use AI-powered identity verification to detect and stop suspicious accounts without causing friction for legitimate customers?

Our system, powered by AI and machine learning, constantly evolves to identify new fraud threats. This enables us to analyze large volumes of data in real-time and detect suspicious patterns, without interrupting legitimate users. 


Additionally, when we combine AI with behavioural biometrics, we significantly reduce false positives. That means fewer unnecessary blocks and a much smoother experience for genuine customers. 

 

5. How will innovations in digital identity solutions, such as those developed by Facephi, shape the future of fraud prevention and financial security?

At Facephi, we’re working to build a future driven by intelligent, adaptive, and collaborative solutions. We don’t just develop technologies to verify identities; we create comprehensive platforms that help institutions anticipate fraud before it happens. 


This includes multibiometric authentication, document verification, behavioural analysis, consortium intelligence, and early detection of mule accounts. 


Our goal is to protect users, shield institutions, and give the financial sector the tools it needs to become more resilient against any threat. 


Yes, digital identity will not only serve as a layer of protection but also become the core of financial security in the future.


References:

Get to Know:

  • digital trust
  • digital identity
  • facial recognition
  • money mule accounts
  • fraud prevention
  • biometrics
  • document verification
  • identity verification
  • Facephi
  • DIACC
  • AI
The show team
DIACC
DIACC
Host and Producer
Xev
Xev
Administrator and Social Media
Episode ratings
Please log in or sign-up to rate this episode.
Trust Talks & Digital Dives
A podcast by DIACC
Exploring digital trust and identity verification capabilities that put people's benefits at the centre of the design.
Episode comments

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
What do you think about this episode? Leave a comment!

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×

Important Information

By using this website, you accept the use of cookies in accordance with our Privacy Policy.