Beautiful Virgin Islands

Wednesday, May 13, 2026

SWIFT Details How Cyber Criminals Encash Stolen Funds

SWIFT Details How Cyber Criminals Encash Stolen Funds

In a new report, SWIFT and BAE Systems reveal how cyber attackers launder money and ‘cash out’ following large-scale heists.
SWIFT and BAE Systems Applied Intelligence have published a new report describing the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the financial system after a cyber-attack.

SWIFT commissioned BAE Systems to investigate this element of the money laundering process as part of its Customer Security Programme (CSP), which seeks to help the financial community to strengthen its cyber defences.

Although there has been much research into the methods that cyber criminals use to conduct attacks, there has been less investigation into what happens to funds once they have been stolen, SWIFT says. The report highlights the ingenuity of money laundering tactics to obtain liquid financial assets and avoid any subsequent tracing of the funds.

According to the report, cyber criminals often recruit unsuspecting job seekers to serve as money mules that extract funds, in addition to using insiders at financial institutions to evade or undermine the scrutiny of compliance teams carrying out KYC and due diligence checks on new account openings.

In addition, the report says, they convert stolen funds into assets such as property and jewellery that hold value and are less likely to attract the attention of law enforcement, indicating their levels of professionalism and experience. Less experienced criminals who immediately make extravagant purchases have drawn the attention of law enforcement agencies and been arrested.

According to the report, cyber criminals tend to use textile, garment, fishery and seafood businesses as front companies to obfuscate funds, typically in parts of East Asia where less stringent regulations make it easier to conduct their activities.

Cryptocurrencies are also being used by cyber criminals for money laundering, albeit to a lesser degree, but where major incidents still involve millions of dollars. Digital transactions conducted in a peer-to-peer manner circumvent compliance and KYC checks at banks, and often requiring only an e-mail address, making them appealing to cyber criminals.

“The threat posed by cyber-attacks to the financial sector has never been greater,” said SWIFT’s Head of the Customer Security Programme, Brett Lancaster. “Attackers are well-resourced, constantly evolving their modus operandi and using untraceable money laundering techniques.”

“The report highlights how the growth in cyber-attacks is increasing the need for the convergence of anti-money laundering, fraud and cybersecurity processes in financial institutions.”

The report calls for financial institutions to increase information sharing, tighten due diligence requirements and smartly invest in maintaining systems to strengthen their defences.

The full report is available bellow.
Newsletter

Related Articles

Beautiful Virgin Islands
0:00
0:00
Close
The Great Western Exit: Why Best Citizens Are Fleeing the Rich World [PODCAST]
The New Robber Barons of Intelligence: Are AI Bosses More Powerful Than Rockefeller?
The End of the Old Order [Podcast]
Britain’s Democracy Is Now a Costume
The AI Gold Rush Is Coming for America’s Last Open Spaces [Podcast]
The Pentagon’s AI Squeeze: Eight Tech Giants Get In, Anthropic Gets Shut Out [Podcast]
The War Map: Professor Jiang’s Dark Theory of Iran, Trump, China, Russia, Israel, and the Coming Global Shock [Podcast]
Labour Is No Longer a National Party [Podcast]
AI Isn’t Stealing Your Job. It’s Dismantling It Piece by Piece.
Lawyers vs Engineers: Why China Builds While America Litigates [Podcast]
Churchill’s Glass: The Drunk, the Doctor, and the Myth Britain Refuses to Sober Up From
Apple issues an unusual warning: this is how your iPhone can be hacked without you doing anything
The Met Gala Meets the Age of Billionaire Backlash
Russian Oligarch’s Superyacht Crosses Hormuz via Iran-Controlled Route
Gunfire Disrupts White House Correspondents’ Dinner as Trump Is Evacuated
A Leak, a King, and a Fracturing Alliance
Inside the Gates Foundation Turmoil: Layoffs, Scrutiny, and the Cost of Reputational Risk
UK Biobank Breach Exposes Health Data of 500,000, Listed for Sale on Chinese Platform
KPMG Cuts Around 10% of US Audit Partners After Failed Exit Push
French Police Probe Suspected Weather-Data Tampering After Unusual Polymarket Bets on Paris Temperatures
News Roundup
Microsoft lost 2.5 millions users (French government) to Linux
Privacy Problems in Microsoft Windows OS
News roundup
Péter András Magyar and the Strategic Reset of Hungary
Hungary After the Landslide — A Strategic Reset in Europe
×