top of page

Know The Patterns
Stop The Flow

The financial crime landscape moves fast. This taxonomy moves with it

Explore Typologies

A New Vision for Financial Crime Detection

Daqiq is built for the evolving landscape of financial crime, combining advanced analytics with intuitive design to empower compliance teams.

Green and Gray Minimalist Personal Business Card (3).png

Dynamic Intelligence

​A digital-first tool that tracks and adapts to evolving financial crime behaviors in real-time.

Green and Gray Minimalist Personal Business Card (4).png

Compliance-Focused

Built specifically for compliance teams, risk professionals, and financial crime investigators.

Green and Gray Minimalist Personal Business Card (6).png

Living Taxonomy

An adaptive system that evolves with new threats, ensuring you're always ahead of emerging patterns.

Green and Gray Minimalist Personal Business Card (8).png

Intuitive Design

Sophisticated enough for intelligence units, yet clean and accessible for analysts at any experience level.

53

Total Typologies

48

FATF Identified

5

Emerging Typologies

6

Thematic Categories

Browse Financial Crime Behaviors

A clean, standardized index of financial crime methods. Condensed from hundreds of repetitive entries into a single, searchable resource.

Stay Ahead of What's Next

Exclusive, research-backed typologies that spotlight the newest shifts in financial crime behavior.

Cryptojacking Treasury Streams

Government aligned APT groups hijack computing power from compromised servers, cloud instances or licensed mega farms to mine privacy coins. The mined cryptocurrency is peeled, mixed and converted to cash to fund sanctioned regimes.

Tools/Assets:
Hijacked CPU/GPU hash-power, Monero, Bitcoin

Stage:
Multi-Stage

Primary Actors/Channels:
State sponsored mining operations, compromised infrastructure, crypto exchanges and OTC cash out networks

Flash Loans & Yield Farming Obfuscation

Criminal actors use DeFi flash loans and yield farming to launder illicit funds. Tokens are rapidly borrowed, swapped and repaid within a single transaction, while stolen crypto is cycled through liquidity pools or vaults to appear as legitimate gains, obscuring its origin.​

Tools/Assets:
Flash loan smart contracts, liquidity pools, yield farms, decentralized exchanges (DEXs)

Stage:
Layering

Primary Actors/Channels:
DeFi hackers, technical money launderers using arbitrage

State-Backed Intrusion-Driven Revenue

State backed APT groups steal, extort, mine or manufacture value through network intrusions, then convert and launder it across fiat and crypto rails. The funds move through mixers, bridges and DeFi venues to bypass sanctions and finance national objectives. Operations span coordinated compromises and rapid value conversion across many asset types.

Tools/Assets:
Stolen fiat funds, cryptocurrency ransoms (BTC, XMR), hacked exchange or bridge tokens, illicitly mined coins, digital gaming assets

Stage:
Multi-Stage

Primary Actors/Channels:
State sponsored APT groups and affiliates, illicit financial networks, DeFi and on chain laundering services, gray market trading venues

Credential/Access-Brokerage for RaaS Revenue-Sharing

State affiliated operators sell or lease high level network access to ransomware as a service crews, earning up front fees and a share of ransom payments. This converts intrusion capabilities into recurring revenue while bypassing sanctions through crypto based payouts.

Tools/Assets:
High privilege enterprise credentials, reverse proxy tunnels, revenue share smart contracts and wallet splits

Stage:
Multi-Stage

Primary Actors/Channels:
State sponsored access brokers, dark web marketplaces, private communication channels for ransomware affiliates

DePIN Reward-Gaming/Synthetic-Activity Laundering

Fraud rings manipulate decentralised physical infrastructure networks by spoofing location, signals or usage data to inflate token rewards. Proceeds are routed through chained wallets, swapped to stablecoins and cashed out, disguising illicit gains as legitimate network activity.

Tools/Assets:
Native network tokens (HNT, MOBILE, FIL, DIMO, PCN, HONEY) and spoofing hardware or scripts

Stage:
Multi-Stage

Primary Actors/Channels: 
Organised DePIN reward farms, automated node or device fleets, crypto exchanges and OTC desks

Coming Soon...

Financial crime tactics are constantly evolving, with new methods emerging across traditional and digital markets. We continuously monitor global trends, threat intelligence and illicit finance innovations to keep this resource current and ensure you have the latest insights.

Live Threat Intelligence

Stay ahead of emerging financial crime patterns with real-time alerts and notifications. These updates spotlight shifts within established typologies, tracking new tools, methods, and infrastructure that evolve known schemes without introducing entirely new typologies.

Coming Soon...

Financial crime tactics are constantly evolving, with new methods emerging across traditional and digital markets. We continuously monitor global trends, threat intelligence and illicit finance innovations to keep this resource current and ensure you have the latest insights.

Low Risk

ALERT ID: 2025-08-UGC-01

Symbolic Service Scams Using Static Platforms

Related To: Online Platform Fraud, Ecommerce and Marketplace Diversion

Executive Summary:

Fraud actors are leveraging minimalist static websites and encrypted messaging apps to market emotionally manipulative or symbolic service offerings in exchange for cryptocurrency. These schemes include spiritual spells, hacking-for-hire promises, or fake scam recovery services. Victims are asked to send funds in advance via crypto, often through unverified emails or Telegram accounts. While the service themes vary, the underlying structure is consistent: low-value payment fraud scaled through cloned infrastructure and reused wallet addresses. This model reflects a broader trend of pseudo-service storefronts replacing traditional ecommerce fraud with emotionally targeted deception.

View Full Alert

Medium Risk

ALERT ID: 2025-08-UGC-02

Dark Web Snuff Content Monetization Ecosystem

Related To: Virtual Asset Layering and Anonymity Tools Typology

Executive Summary:

This alert highlights a significant evolution within virtual asset layering typologies, where criminal actors operating on the dark web are using decentralized infrastructure, high-value paywalls, and wallet rotation in place of traditional mixers and privacy tools. Instead of relying on advanced blockchain obfuscation methods, these operators monetize extreme content through structured access fees and repeated payment fragmentation across mirrored sites. The laundering process is built into the architecture of the platform itself, allowing fund flows to be layered and anonymized through persistent infrastructure, wallet hygiene, and cross-promotion via encrypted channels.

View Full Alert

Medium Risk

ALERT ID: 2025-08-UGC-03

IS Digital Financing Tactics Evolve Toward Anonymous Micro-Laundering Models

Related To: Terrorism Financing Through Non Profit Misuse and Micro Loans

Executive Summary:

Islamic State (IS) continues to demonstrate resilience in its online presence through a decentralized network of dark web sites, cryptocurrency wallets, and Telegram infrastructure. While most coverage of IS infrastructure focuses on propaganda and recruitment, new findings show a deliberate evolution in how the group manages financial support. The use of Monero wallets embedded across dozens of static onion sites, coupled with Telegram bots and secure messengers, suggests a shift toward anonymous micro-donation models that resemble cybercriminal micro-laundering tactics. These patterns reflect a blending of ideological fundraising with the technical sophistication of digital financial crime, warranting renewed attention to how terrorism financing may mimic or exploit broader financial typologies.

View Full Alert

High Risk

ALERT ID: 2025-08-UGC-04

Industrialized Pig Butchering Scams Expanding Across Regions

Related To: Romance Investment and Pig Butchering Scams Typology

Executive Summary:

Transnational crime syndicates are running large-scale pig butchering scam compounds that combine romance fraud with fake investment platforms to steal billions in cryptocurrency. These operations, once concentrated in Southeast Asia, are now expanding into Africa and other regions. Criminal networks are coercing trafficked workers into executing highly organized schemes, often supported by professionalized services and AI-enabled targeting. Victims are groomed over weeks or months through social media or messaging apps before being directed to fraudulent crypto investment sites that display fabricated profits to prompt further deposits. The evolution shows a shift toward industrial-scale infrastructure, cross-border collaboration between criminal actors, and increasingly sophisticated social engineering, making this a priority threat for financial institutions and law enforcement.

View Full Alert

Global Financial Crime Watch

Stay ahead with curated coverage of breaking developments in the financial crime landscape. This section highlights news, legal changes, and enforcement actions from around the world, providing context to how these events intersect with established typologies and ongoing threat trends.

About The Research Project

Anatomies of Evasion
Towards A Living Taxonomy of Financial Crime

​Global anti-money laundering efforts continue to be shaped by static frameworks such as the FATF typologies, which were intended to raise awareness but have proven insufficient in capturing the complexity and evolution of financial crime. Research shows that despite near universal compliance, detection rates remain negligible and intelligence sharing fragmented, with typologies often inconsistent and lacking standardization.

Daqiq (to scrutinize) emerged from the project to address this gap, transforming from a traditional research study into a living repository of illicit finance methods. By offering a continuously updated, standardized taxonomy built on multi-method research, Daqiq advances understanding, detection, and monitoring of financial crime in ways that static models cannot, moving the field toward a more dynamic and evidence based approach.

Building a Global Corpus

We compiled 394 typologies from FATF and FSRB reports (2017–2023). After removing duplicates and cleaning the text, 289 unique entries formed the working dataset for analysis.

Clustering and Taxonomy Design

Using TF-IDF vectorization and hierarchical clustering, we grouped entries into coherent families. Manual refinement produced a standardized taxonomy of 48 typologies.

Capturing Emerging Virtual Assets

Eighty-four crypto-related entries were re-clustered at higher granularity, yielding 15 refined subtypes spanning mixers, DeFi platforms, NFTs, and gaming environments.

Enriching with Operational Attributes

Each typology was annotated with its dominant laundering stage, characteristic tools or assets, and primary actors or channels, creating an operational coding frame that links behavior, method, and context.

The Emerging Typologies

To identify new and emerging typologies, we reviewed grey literature and recent academic papers (2025) using targeted search strings around financial crime innovation (ex: “financial crime” AND (“emerging” OR “novel” OR “rising”) AND (“typology” OR “scheme” OR “pattern”)), then validated findings through open-source reporting and technical attack analyses. Only behaviors supported by multiple independent cases were elevated to typology status, while those overlapping with existing categories were collapsed back into the core taxonomy. This process surfaced five distinct emerging patterns, each mapped with attributes spanning asset class, actors, laundering stage, method, technique, and core action.​​

The Importance of Crime Scripts

Crime scripts provide a structured analytical framework that decomposes complex offenses into sequential stages, from preparation to exit. Within criminology and intelligence studies, this approach is valued because it exposes the procedural mechanics of crime and identifies potential points for disruption and prevention.
 

In this study, crime scripts were constructed for the five emerging typologies using academic literature, grey reports, and attack analyses. Each was organized into five stages: Preparation and Set-Up, Entry and Infiltration, Execution, Cash-Out and Conversion, and Exit and Post-Condition. This systematic mapping transforms typologies from descriptive categories into operational intelligence, enabling a clearer understanding of how schemes function in practice and where defensive interventions can be most effective.

A Scoping Review On The Tools Used To Combat Financial Crime

This scoping review systematically mapped peer-reviewed literature (2020–2024) on the tools, methods, and systems used to combat financial crime typologies. Following the Arksey and O’Malley framework, refined by Levac and guided by the Joanna Briggs Institute, the process drew on six major databases and adhered to PRISMA-ScR reporting standards. From over 1,407 records initially retrieved, 42 studies met the final inclusion criteria and were coded through a multi-cycle synthesis.

What We Looked At

Included
 

  • Peer-reviewed journal articles, book chapters, and conference proceedings
     

  • Published between 2020 and 2024, in English
     

  • Focused on financial crime typologies (traditional or emerging, such as TBML, terrorist financing, shell companies, crypto laundering, NFT wash trading)
     

  • Described or evaluated tools, methods, systems, or frameworks for prevention, detection, investigation, or disruption
     

  • Relevant to institutional actors (banks, FIUs, regulators, forensic teams, VASPs)

Excluded
 

  • Non–peer-reviewed sources (blogs, news, working papers)
     

  • Studies before 2020 or not in English
     

  • Generic fraud detection studies using benchmark datasets without typology link (Kaggle dataset)
     

  • Purely conceptual or theoretical works without methodological or technical detail

Who & What We Focused On

  • Population: Institutions and actors engaged in combating financial crime (FIUs, regulators, banks, compliance units, forensic analysts, VASPs).
     

  • Concept: Tools, methods, systems, and analytical frameworks used to prevent, detect, investigate, or disrupt financial crime typologies.
     

  • Context: Peer-reviewed academic studies published between 2020 and 2024 across criminology, law, finance, and data science.

How We Did It

We searched three major database (Scopus, IEEE Xplore and SpringerLink) using structured Boolean queries tailored to each. From 1,407 initial records, duplicates and irrelevant studies were removed. After screening titles, abstracts, and full texts, 42 studies were included in the final dataset. ​​​

Example Search String
 

TITLE-ABS-KEY(
("financial crime" OR "money laundering" OR "terrorist financing" OR "proliferation financing" OR "illicit finance" OR "illicit financial flows" OR "trade-based money laundering" OR "shell company" OR "professional enabler" OR "real estate laundering" OR "money mule" OR hawala OR "structured cash" OR "charity abuse" OR "politically exposed" OR "sanction evasion" OR "nonprofit misuse" OR ransomware OR "dark web" OR "cryptocurrency laundering" OR "blockchain forensics" OR "virtual asset laundering" OR mixer OR "privacy coin" OR "cross-chain swap" OR "NFT laundering" OR "wallet compromise" OR "credential brokerage" OR "play to earn scam" OR "crypto fundraising" OR "virtual asset provider") 
W/5 (combat* OR prevent* OR detect* OR investigate* OR disrupt* OR monitor* OR trace OR enforce OR prosecute OR identify OR respond OR flag)

AND TITLE-ABS-KEY(tool* OR method* OR technique* OR system* OR analytic* OR model* OR framework OR "network analysis" OR "transaction monitoring" OR "typology detection" OR "entity resolution" OR "forensic accounting" OR "risk scoring" OR "open source intelligence" OR OSINT OR "threat intelligence") 
AND NOT TITLE-ABS-KEY("credit card" OR "payment card" OR dataset OR Kaggle OR "benchmark dataset" OR "image classification" OR "speech recognition" OR "face recognition" OR "medical imaging" OR "nanoparticles" OR "spectroscopy" OR "porous structure" OR "hydrogen storage" OR "metaverse concert" OR "food dehydration" OR "piano" OR "agriculture yield" OR "battery performance" OR "alloy synthesis") 
AND PUBYEAR > 2023 
AND (LIMIT-TO(LANGUAGE, "English")) 
AND (LIMIT-TO(DOCTYPE, "ar") OR LIMIT-TO(DOCTYPE, "cp"))

The Extraction Sheet

Study Context

  • author(s)

  • title

  • publication year

  • location

  • date data was collected

  • type of evidence sources

Methods & Approach

  • aim of article

  • methodology

  • methods

  • data collection

Findings & Insight

  • result of study

  • summary

  • recommendation

  • typology addressed

  • crime lifecycle stage

Tools & Application

  • system name

  • tool type / technology class

  • institutional actor(s)

  • tools

  • key thematic tags

  • design notes or implementation guidance

Advancing the Intelligence Behind Financial Crime Detection

Between 2020 and 2024, academic literature shows a clear shift from static rule-based monitoring toward advanced analytics and hybrid systems, reflecting the same pressures driving innovation in compliance and intelligence today. While traditional rules and red flag indicators remain essential, they are increasingly undermined by high false positives. Studies demonstrate that machine learning models such as Random Forest and XGBoost consistently outperform older classifiers, and unsupervised methods like Isolation Forest and Local Outlier Factor have been successful in detecting hidden risks such as terrorist financing within remittance flows. Hybrid frameworks that integrate typology features with machine learning are especially promising, reducing noise while enhancing detection. Deep learning approaches, including LSTMs and graph neural networks, are emerging but continue to face challenges around explainability and data access.
 

Network and graph analysis stand out as particularly powerful for exposing complex structures that underlie financial crime. Research shows these techniques can identify illicit shell companies with near 90 to 98 percent accuracy, trace money mule clusters, and map terrorist financing flows. In the digital asset space, blockchain forensics is advancing rapidly, with models detecting illicit Bitcoin activity, revealing mixer “fingerprints,” and uncovering NFT wash trading through abnormal trading loops.


For Daqiq, the implications are clear: the most effective anti-financial crime strategies draw on a broad toolkit. This includes AI-enhanced trade document analysis, statistical anomaly detection in remittance corridors, open-source intelligence for ownership and dark web tracing, and privacy-preserving approaches such as federated learning for cross-institution collaboration. The evidence confirms that a multi-layered, intelligence-driven approach is essential for staying ahead of evolving financial crime typologies.

The Global Scale of Financial Crime

Illicit finance accounts for trillions in annual flows, cutting across human trafficking, narcotics, terrorism, and systemic fraud. Money laundering is estimated at up to five percent of global GDP. Cybercrime alone is projected to reach ten trillion dollars annually by 2025, with ransomware costs rising steeply year over year. Organized scams, corporate fraud, and cyber-enabled extortion continue to expand their reach, while enforcement operations expose only a fraction of the activity.

US $346.7 billion

Tied to Human Trafficking

(2023 Estimation)

US $782.9 billion

Tied to Drug Trafficking

(2023 Estimation)

US $11.5 billion

Tied to Terrorist Financing

(2023 Estimation)

Beneath the Global Numbers

Analysis of more than 2,500 illicit onion sites shows that financial crime online is not random but highly structured. Investment scams and cloned card services dominate the ecosystem, while sexual exploitation, counterfeit operations, and membership communities diversify its reach. From thousands of Bitcoin addresses, just over 1,100 were confirmed as operator-controlled, and the top ten campaigns alone accounted for tens of Bitcoins in profit, spanning multiple illicit categories at once.

 

Illicit shops also reveal a skewed economy: a handful of long-running operations capture most of the revenue, while thousands of smaller shops vanish quickly with little impact. This creates the illusion of a vast decentralized market when in reality the majority of flows are concentrated in professionalized actors. For investigators, this means enforcement often targets low-value shops while the real hubs remain resilient.

 

By 2021, this concentration became starkly visible. Sexual abuse markets pulled in more than $94 million, financial crime around $10 million, and drugs about $1.5 million. Hydra, a single marketplace, processed nearly half a billion dollars alone. These flows did not remain contained to the dark web but moved through chokepoints like Binance and Huobi, showing how illicit actors rely on mainstream exchanges to cash out.

About this project


Daqiq is a standardized, global and continuously updated map of financial crime typologies, created as part of the Undergraduate Summer Research Internship (USRI) Fellowship at Western University. This research was conducted by Abdel Rahman Nasir in the DAN Department of Management & Organizational Studies under the supervision of Professor Joanna Andrejkow.

​

Last Updated: 2025-08-08

​

© 2025 Abdel Rahman Nasir. All rights reserved.

​

Contact


Email: anasir24@uwo.ca

Western University – London, Ontario, Canada

​

Acknowledgements


This project was supported by Western University’s USRI program, which provides undergraduate students with opportunities to engage in hands-on research across disciplines.

​

Disclaimer


The information provided on this website is for educational and research purposes only. While efforts are made to maintain accuracy, financial crime tactics and typologies evolve rapidly and the content may not reflect the most current developments. No liability is assumed for actions taken based on this material, and users should seek up-to-date, independent verification before making decisions.

bottom of page