Transaction Laundering ExamplesReal-World Transaction Laundering Case Studies
Transaction Laundering Examples: Examining High-Profile Cases Ripped Right From the Headlines
Transaction laundering isn't just a theoretical risk. These attacks have resulted in some of the most significant financial crime prosecutions in recent history.
In this chapter, I wanted to run down a few high-profile transaction laundering examples. These case studies should help illustrate how criminals exploit payment processing systems, creating severe consequences for everyone involved.
Transaction Laundering
Transaction laundering is a serious matter for eCommerce. With the right strategies in place, though, merchants can protect their businesses, prevent loss, and preserve their relationships with financial institutions. But what do you need to know to protect your business?
Liberty Reserve: The $6 Billion Digital Currency Empire (2006-2013)
Liberty Reserve, founded by Arthur Budovsky, operated as a digital currency payment processor that laundered over $6 billion for cybercriminals worldwide before being shut down by US authorities in May 2013.
How it Worked: Budovsky specifically designed the system with weak anti-money laundering controls to appeal to criminal clientele, allowing users to move money anonymously regardless of volume or source.
Liberty Reserve had more than 5 million user accounts worldwide, including over 600,000 in the United States. The operator processed millions of transactions connected to investment fraud, credit card fraud, identity theft, and computer hacking, as per the Department of Justice. At its peak in late 2012, Liberty Reserve handled over $300 million in monthly transaction volume.
Consequences: After being arrested in Spain and extradited to the United States, Budovsky pleaded guilty to money laundering conspiracy in January 2016. He was ultimately sentenced to 20 years in federal prison. At the time, the judge noted that Budovsky showed no “genuine remorse,” and that his crimes caused widespread harm to “countless victims of fraud around the world.”
Key Takeaway: Budovsky had previously been convicted of running an unlicensed money transmitting business in 2006, yet continued building payment processing systems specifically designed to evade law enforcement. His case shows that determined criminals will repeatedly attempt to exploit vulnerabilities in payment networks for personal profit.
Allied Wallet: The $150 Million Payment Facilitator Scheme (2014-2024)
The executives of Allied Wallet Inc., a Los Angeles-based payment processor, were charged with fraud for processing over $150 million in prohibited transactions in 2019.
How it Worked: The scheme involved using more than 100 sham merchant accounts for high-risk businesses including online gambling, prescription drugs, payday lending, and debt collection.
Allied Wallet created shell companies, designing fake websites that appeared to sell low-risk retail and home goods, and using industry-standard merchant category codes that miscategorized the true nature of transactions. Agents would instruct clients on setting up shell companies, and outline best practices to hide their risky activities. They worked with another known fraudster, Thomas Wells, to help dubious merchants conceal their fraud from banks and card networks.
Consequences: In 2019, the FTC imposed a $110 million judgment against Allied Wallet and its CEO Ahmad Khawaja for knowingly processing payments for merchants engaged in fraud, including schemes that were subject to law enforcement action by the FTC and SEC. Multiple executives have since pleaded guilty, including Thomas Wells (wire fraud conspiracy), Mohammad Diab (bank fraud conspiracy), and Amy Rountree (bank fraud conspiracy). CEO Ahmad Khawaja remains a fugitive on both payment processing charges and a separate federal indictment for campaign finance violations and obstruction of justice.
Key Takeaway: This case demonstrates that payment facilitators face severe liability when they fail to adequately vet merchants, or worse, deliberately help high-risk businesses circumvent compliance requirements.
Axson Data: The Illegal Pharmacy Payment Processor (2021-2024)
In October 2024, Jimmy Fu of California was arrested for allegedly processing over $11.5 million in payments for counterfeit prescription drugs containing controlled substances on behalf of illicit online pharmacies operated out of India.
How it Worked:Fu operated Axson Engineering Inc., doing business as “Axson Data,” which processed customer payments for controlled substances and wired the proceeds to various overseas businesses identifying as information technology consulting firms.
Bank records revealed thousands of checks deposited from individuals across the US for amounts ranging from hundreds to thousands of dollars. Undercover law enforcement made 18 purchases of counterfeit drugs during their investigation, all processed through Axson's accounts. A search warrant even uncovered evidence of customers receiving methamphetamine-laced pills when they had ordered Adderall, highlighting the dangerous nature of the products being sold.
Consequences: As of this writing, Fu is still awaiting trial. He faces up to 20 years in prison, up to three years of supervised release, and a fine of up to $500,000 or twice the funds laundered, whichever is greater.
Key Takeaway: Transaction launderers often present themselves as legitimate technology or consulting businesses while secretly processing payments for dangerous illegal products that put consumers at serious health risk.
Common Patterns Across Cases
The case studies I outlined above show that there are a few consistent tactics used by transaction launderers:
- Shell Companies: Creating fake businesses with legitimate-sounding names and professional-looking websites.
- MCC Miscoding: Using merchant category codes for low-risk businesses (retail, consulting, IT services) while actually selling prohibited products.
- Geographic Obfuscation: Operating offshore or misrepresenting business locations to avoid regulatory oversight.
- Multiple Accounts: Using dozens, even hundreds of merchant accounts to spread risk and avoid detection.
- Complicit Intermediaries: Recruiting sales agents, ISOs, or payment facilitators who profit from bringing in high-risk merchants.
- Weak KYC: Exploiting processors with inadequate know-your-customer procedures or overwhelming legitimate businesses’ compliance systems.
Criminals are sophisticated. They’ll create seemingly legitimate front businesses, and do a lot of legwork to cover their tracks. That’s why it’s essential for payment processors to conduct thorough due diligence beyond surface-level website appearances.