Money Laundering Examples: How It Happens in Real Life

Money laundering is tech-driven a good amount of times and it is integrated into our daily lives more than most of us realize. It is the process of making dirty money look clean so it can be used without triggering alarms at a bank or with the IRS. This is the basic definition of money laundering. It mostly comes through illicit activities like fraud, drug trafficking, or cybercrime. That is the reason it has to be laundered. The scope of this problem in finance is much bigger than you think. The United Nations Office on Drugs and Crime (UNODC) suggests that illicit finance accounts for roughly 2% to 5% of global GDP every year. If undocumented fraud, corruption, tax evasion, cybercrime, and funding of criminal organizations are taken into account, the actual economic cost is far higher.

We live in a world of instant digital payments and finance is being a part of the new AI era. The money can be washed now at an industrial level speed. Criminals are no longer just hiding money. They are also benefiting AI managing complex webs of transactions and utilizing global real estate markets or crypto-stablecoins to park their wealth in plain sight.

Understanding how this works in the real world is about more than just spotting a crime. It is about seeing the wash cycle that follows. One day it can be a local catalytic converter theft ring that moves high amounts of money through shell companies. Another day it can be massive international schemes which involve sovereign wealth funds. In all cases and examples the goal is the same. The money has to be disconnected from the crime so it can be spent.

We are seeing a major shift toward high-speed digital laundering, but the core logic of placement, layering, and integration remains the foundation of every case. The following topics are going to be covered in this article;

  • Small Business Money Laundering: The Restaurant Down the Street
  • Real Estate Money Laundering: Buying Property with Dirty Money
  • Online Fraud to Money Laundering Pipeline
  • Crypto Money Laundering in Practice
  • Trade-Based Money Laundering: The Fake Invoice
  • Professional Money Laundering: When Lawyers and Accountants Help
  • How These Examples Connect to Your AML Program

1. Small Business Money Laundering: The Restaurant Down the Street

Small businesses are often the go-to choice for money laundering. They deal in a high amount of cash money and have perishable inventory. It is easy to hide illicit funds inside legitimate transactions. This is a cash-intensive front. Commingle dirty cash from outside sources with the clean revenue from selling burgers or pasta down the street. This is the foundation of this common strategy.

Three main methods are employed by the criminals when they want to inflate their books without attracting immediate attention from the bank. The mechanics of the wash works as follows:

  • Inflating Sales (Ghost Customers): This is the most common tactic. A restaurant might ring up hundreds of fake cash orders a day. To a bank or tax auditor, it seems like a busy restaurant with booming work. In reality, the criminal now has a reason to deposit drug money into the business bank account.
  • Paying for Supplies with Cash: Pay vendors or local farmers in cash. The digital footprint is now reduced with supplies which are off-the-books. High price premium meat is bought but only one fifth of it is recorded on the books. The remaining is paid in dirty cash to cover the difference. This keeps the profit margins looking normal even while they pump illicit funds in.
  • Fictitious Staff (Ghost Payroll): This is a clever way to get money back out into the hands of the criminals. The business creates a payroll for ghost employees. Ghost meaning those people don’t actually work there. The restaurant pays these employees a salary, again in cash or via checks to shell companies. This is a clean income for the conspirators and it creates a tax-deductible expense for the business.

Why does the math don't add up? A restaurant reporting $500,000 a year with only 20 customers a day is a classic red flag for forensic accountants. To this be meaningful, every single customer would need to spend an average of nearly $70 to $100 per visit. If that restaurant is a casual taco shop or a deli, that average check is impossible. Analysts also look at Revenue Per Available Seat Hour(RevPASH).

A real-world example concluded recently in the "Feeding Our Future" case. Conspirators used a small storefront deli in Minnesota to launder money. They claimed to serve thousands a day, seven days a week, from a tiny storefront in a strip mall. In reality, the site was serving almost no one. They submitted fake attendance rosters and meal count sheets to launder millions in federal funds. This case illustrates how a small, quiet business can be used to move industrial-level amounts of money.

2. Real Estate Money Laundering: Buying Property with Dirty Money

Real estate is metaphorically the Swiss bank account of the modern times. A digital balance may be frozen with a keystroke. But a luxury condo is a tangible asset that appreciates over time most probably. For a money launderer, buying property isn't just about hiding money; it’s about "Integration. This is the final stage of the wash cycle where illicit funds are converted into a respectable, high-value investment.

Shell Companies are functioning as the iron curtain of ownership at this point. An effective way to buy property anonymously is through Limited Liability Companies (LLCs) and Shell Companies. When a clean person buys a home, their name is on the deed. When a launderer buys one, they create an LLC. This often happens in a secrecy haven like Delaware, Wyoming, or the British Virgin Islands. The LLC buys the property for cash. If a regulator looks at the public records, they only see the name of the LLC. To find the real owner, they would need to peel back multiple layers of corporate filings. They are often designed as a dead end. Criminals, corrupt officials, and sanctioned individuals park wealth in major cities without ever setting foot in the country.

The FinCEN nationwide reporting rule has been a major attempt over the last year. FinCEN tried to close the all-cash loophole. Historically, if you used a mortgage, the bank did the background checks. If you paid a high amount in cash, no one was strictly required to ask where the money came from. The "Residential Real Estate Rule" was set to go live on March 1, 2026. It would have required title companies and settlement agents to report the beneficial owner behind any LLC or trust buying residential property in cash. In a massive turn of events, a federal court in Texas vacated the rule on March 19, 2026. The court ruled that FinCEN exceeded its authority, just weeks after it started. As of today, the reporting requirement is in a state of legal limbo. This means the all-cash loophole for anonymous buyers is effectively back open for the time being, though the government is expected to appeal.

The famous example of how this works at scale is the Vancouver Model. It is a global wash cycle with a sophisticated triangular scheme. It involves Canadian real estate and Chinese underground banking:

  1. Lets say wealthy individuals in China want to move money out of the country. They want to bypass strict monetary controls.
  2. They give their money to an underground banker in China.
  3. The banker doesn't actually move the money across the border. Instead, they contact an associate in Canada who already has dirty cash. It is from local drug sales presumably.
  4. The client's representative in Vancouver receives the same money in total, from the affiliate in Canada.
  5. This cash is bought in as chips in a casino. After a few hours playing, it is cashed out as a clean casino check. That cheque is then used as a down payment or full payment for a luxury home in Vancouver.

This model swaps clean money in China for dirty drug money in Canada. The final asset is a multimillion-dollar house and it is now considered as clean.

3. Online Fraud to Money Laundering Pipeline

Before money can be laundered, it has to be stolen. In the FBI’s 2025 Internet Crime Report released in April 2026, Americans' annual loss of a record $20.8 billion to cyber-enabled crimes and scams was mentioned. The transition from a digital scam to clean cash is a high-speed operation in logistics of money. This pipeline can be more automated with AI now, but it still relies on a very human vulnerability, the money mule. Three main engines drive this pipeline:

  • Business Email Compromise (BEC): This remains the heavyweight of fraud. It is estimated to have roughly over annual $3 billion in losses. It can be catastrophic in terms of expected damage, and when the related effects are added. AI perfectly mimics the writing style of a CEO or a vendor. An urgent invoice update is sent that redirects a legitimate corporate payment to a bad account.
  • Romance Scams and Pig Butchering: These scams cost victims close to an estimated one billion last year. Scammers now use real-time deepfake video and voice cloning to maintain months-long relationships. Victims somehow are convinced to invest in fake crypto platforms.
  • Ransomware: The reported payout figures are lower as many companies don't report. The laundering process here is the most technical. It often starts with privacy-focused cryptocurrencies before hitting the banking system.

The biggest challenge for a criminal is moving stolen money out of a victim's bank account without the bank freezing the transfer. To do this, they use money mules. A money mule is someone who receives stolen funds into their own bank account and then forwards them to the criminal. A small cut is usually taken. The majority of mules are unwitting victims. They might think they have a new job from home as a payment processor or believe they are helping a romantic partner move money for a business emergency. By the time the bank realizes the initial deposit was fraudulent, the mule has already sent the money via wire transfer, gift cards, or crypto. The mule is left with a frozen account and potential legal liability, while the criminal is several layers away.

The goal of the pipeline is to move money through so many accounts so quickly that the trail goes cold:

  1. Placement: The stolen money enters the system, often through a mule’s personal account or a neobank with faster onboarding.
  2. Layering: The funds are split into dozens of smaller transactions. Instant payment rails are being used to move money across multiple banks in seconds. lFedNow in the U.S. or Pix in Brazil are examples for the instant payment rails. They also use chain hopping. Funds are moved from one cryptocurrency to another to break the digital residue.
  3. Integration: Finally, the money is withdrawn as cash. Many times it is used to buy high-value goods like watches or electronics. It is also settled into a business account that looks legal.

Criminals employ AI bots to manage mule conversations. These bots can detect when a bank's fraud department is asking questions and provide the mule with a script to bypass the bank's security checks in real time.

4. Crypto Money Laundering in Practice

Money laundering has moved from briefcases to chain-hopping and automated scripts in digital times. The speed of execution has outpaced many traditional regulatory controls. Cryptocurrency laundering is a multi-step process designed to break the on-chain link between a theft and the eventual cash-out.

The modern wash cycle process follows a high-speed pipeline to overwhelm blockchain investigators:

1. The Theft (Placement): The cycle begins when assets are moved from a victim's wallet to a criminal-controlled address. This is done through a compromised exchange or a private seed phrase leak.

2. The Obfuscation (Layering): Criminals don't just stay on one blockchain, they chain-hop. They move funds from Ethereum to Bitcoin, then to Solana or TRON. They utilize cross-chain bridges like Ren Bridge or Avalanche Bridge. Investigators now have to jump between different ledgers.

They also use mixers and their alternatives. Classic mixers like Tornado Cash and Sinbad are heavily sanctioned. There are always new versions like YoMix. Traditional mixers mostly fall short in speed when the plan is for a big heist. Decentralized exchanges like THORChain are employed. Anonymous swap services like eXch are also tools to trade stolen tokens for cleaner assets like Bitcoin or stablecoins.

1. The Exit (Integration): The funds have to be moved into the financial system. This is done through Over-the-Counter (OTC) desks or weak-AML exchanges in jurisdictions with minimal oversight. These entities often accept large volumes of crypto for fiat currency with a no questions asked policy.

The Lazarus Group and the $1.5 Billion Bybit Hack in 2025-26 is a good example of crypto money laundering. The February 2025 Bybit heist was attributed to North Korea’s Lazarus Group. It stands as the largest single crypto theft in history. Lazarus didn't hack the blockchain; they hacked the people. They used a supply chain attack to compromise the software Bybit used to manage its transfers, Safe{Wallet}. The CEO signed a routine transaction. At least he thought he did. A malicious script has replaced the destination address with one controlled by Lazarus. In 48 hours the estimated laundered amount was more than $150 million. The stolen ETH was moved through peeling chains. Funds were split into smaller amounts. eXch like platforms were utilized to swap the peeled millions. Bybit requested to block the addresses. These platforms permitted the swaps and generated massive fees from the illicit volume.

The EU’s Markets in Crypto-Assets(MiCA) regulation is in full implementation in 2026. It requires every exchange to verify the beneficial owner of wallets. The CLARITY Act in the U.S. has given FinCEN broader powers to shut down un-hosted wallets P2P desks that facilitate these North Korean cash-out pipelines are included.

5. Trade-Based Money Laundering: The Fake Invoice

Money laundering is thought of as physical cash or crypto mostly. Meanwhile, a very effective way to cross huge sums through borders is Trade-Based Money Laundering (TBML). Service-based laundering is specifically a nightmare for regulators. There are no physical goods to inspect at a port. It is just a piece of paper, an invoice, with a claim that work was done.

A $1 million invoice for consulting services in another country is the classic over-invoicing or phantom service scheme. It can be called the ghost consulting loophole. In this setup, Company A (the launderer) and Company B (the shell company) are usually controlled by the same criminal network. Company A sends an invoice for a high-level service that is difficult to value. It can be "Strategic Market Entry Advice" or "IT Infrastructure Consultation."

As these services are intangible, a bank’s traditional monitoring systems often see the transfer as a standard B2B payment. The money moves legally through the SWIFT network. It has a clean audit trail of a business expense. In reality, no consulting ever happened. The $1 million is now clean in Country Y, ready to be used or invested.

Detecting this requires more than just looking at the wire transfer. It requires contextual monitoring. Banks mostly looked at the "Who" and the "How Much." Now, the reason why is also necessary to ask:

  • Fair Market Value Analysis: Modern AI systems now compare the invoice amount to the size and history of the companies involved. If a two-person firm with no website is suddenly billing $1 million for "expert consulting," the system triggers a "Lifestyle Inconsistency" alert for the business.
  • Cross-Referencing: Regulators are increasingly using tools to match invoices with actual tax filings and corporate activity. Company A claims to provide IT services but has zero payroll expenses or software licenses. This can be read as the consulting part is most probably a front.
  • Micro-Laundering: The flow of money is fragmented. Instead of one, criminals divide a $1 million invoice to five lets say, for subscription services to avoid hitting reporting thresholds that trigger deeper manual reviews.

The U.S. Department of Justice issued charges against the Prince Group's leadership in 2025. It is a Cambodian-based conglomerate. The group presented itself as a legitimate multinational business. Investigators alleged it functioned as a sophisticated laundering engine. They allegedly used a web of shell companies and fake service contracts to move billions of dollars. Regulators alleged that they even operated an online marketplace that provided services to other cyber-scammers. They effectively laundered the proceeds of forced-labor fraud camps through what looked like legitimate business-to-business transactions. By early 2026, over $15 billion in related assets had been targeted for seizure. This is one of the biggest actions in sanctioning.

6. Professional Money Laundering: When Lawyers and Accountants Help

A professional with a license can be a more effective tool than a complex algorithm in money laundering schemes. It can be a lawyer, accountant, and trust provider. These are referred to by regulators as gatekeepers. Of course most of these people are just doing their legal jobs. A small subset specializes in professional money laundering. Their specialized knowledge opens doors of law and finance to them. They benefit from that knowledge and access to build impenetrable barriers between a criminal and their money.

Professional launderers legitimize money using their special methods. They are not these to just hide the money. Here is the common toolkit for these enables:

  • Trust and Foundation Structures: A lawyer can set up a discretionary trust in say South Dakota, the Cayman Islands, or Jersey. The criminal transfers their assets to the trust. Now in legal terms the owner is the trust, not the criminal. Through a private "Letter of Wishes," the criminal still controls the expenditures. These asset protection trusts are commonly used to shield bad money from international seizure orders.
  • Offshore Management: Accountants can create a daisy chain of shell companies across multiple countries. For example, a company in Panama might be owned by a foundation in Liechtenstein. Then in turn it is managed by a nominee director in the Seychelles. Each layer requires a separate legal request to uncover. So if it is wanted to be investigated, it takes years for law enforcement.
  • The "Privilege" Shield: This is a pretty controversial tactic. Lawyers claim attorney-client privilege in every interaction. They may even go as far as using their own escrow accounts to move money for the client. Now the records are put in the protected legal secrets category.

The Panama Papers leak and the subsequent Pandora Papers exposed how firms like Mossack Fonseca operated as factories for secrecy. That exposure led to the Corporate Transparency Act in the U.S. and new beneficial ownership registers in Europe. Today's reality is that the industry has migrated to more boutique and tech-savvy firms. Instead of massive leaks, targeted enforcement against professional money laundering networks are more common.

The new European Anti-Money Laundering Authority (AMLA), has signaled non-financial professionals oversight. For the first time at the EU level, AMLA will expand AML/CFT regulation to non-financial sector OEs. Non-financial workers are legal professionals, accountants, real estate agents etc. In another jurisdiction, under Australia's Tranche 2 updates, non-financial professionals like lawyers, accountants, real estate agents, and other designated professions will have to adhere to AML/CTF regulations starting in July 2026.

7. How These Examples Connect to Your AML Program

The global regulators now expected simply having the policies to demonstrable effectiveness. The technical compliance expectation comes second. It is no longer enough to have a screening tool. FinCEN and the new EU AMLA now ask if your tool actually stops the laundering engine. Here is how each real-life example we discussed maps directly to the specific pillars of a modern AML program.

KYC and KYB: Catching the Restaurant Front

The Goal is unmasking the business model before the first dollar is deposited. While traditional KYC was a snapshot taken during onboarding, Perpetual KYC (pKYC) is turning into a new standard. With dynamic risk scoring, pKYC doesn't wait for a three-year review of the restaurant reporting $500,000 with only 20 customers a day. It uses automated event-driven" triggers. If the business’s reported tax filings or foot traffic data which are sourced from third-party APIs, don't align with their high-volume cash deposits, the risk score spikes immediately. A manual site visit or an Enhanced Due Diligence (EDD) review is triggered.

Transaction Monitoring: Catching Invoice Fraud and Mules

The Goal is detecting the "why" behind the money movement, not just the "how much." For the Fake Invoice example, new context-aware AI systems use fair market value algorithms. If Company A invoices $1 million for consulting, the system checks the company’s digital footprint. If it finds no employees on company details and no office space etc., it flags the transaction.

To stop the online fraud pipeline and for detection of mules, monitoring systems look for burst activity. A quiet, low-balance personal account suddenly receives a $50,000 wire. The person then tries to immediately chain-hop it into crypto or multiple small payments. The system freezes the funds in real-time. This is the only way to stop the instant payment laundering we see today.

Sanctions Screening: Stopping the Lazarus Group

The Goal is blocking the entry and exit points for high-risk actors. Wallet-to-Identity Mapping is the key step at this point. For Crypto Laundering, simple name-matching is obsolete. Programs now integrate real-time blockchain analytics directly into the screening engine. If a customer tries to withdraw funds to a wallet address that has been "tainted" by a mixer used by the Lazarus Group, the transaction is blocked automatically. In 2026, the "Travel Rule" ensures that this identity data follows the crypto from one exchange to the next.

Adverse Media & PEP Screening: Spotting the Luxury Buyer

The Goal is identifying reputational risk before it becomes a legal liability. Real-Time sentiment analysis is the control that catches the professional enablers and real estate schemes. If a Politically Exposed Person (PEP) or their Relative or Close Associate (RCA) is mentioned in a leaked document or a local news report regarding a corruption probe in a high risk country, adverse media tools flag them.

Even if they use a shell company to buy a condo, the moment a beneficial ownership register or a whistleblower leak connects their name to that LLC, the AML program identifies the “Sanctioned Person” risk and files a Suspicious Activity Report (SAR).

The aforementioned controls cannot live in silos. The unified defense solutions are effective. Fraud, sanctions, and AML can be mentioned together as financial crime functions. KYC provides the identity, transaction monitoring provides the behavior, sanctions and adverse media provide the context. When these three work together, the "Restaurant Down the Street" and the "Billion-Dollar Crypto Hack" become visible patterns, not isolated events.

Judi Tero

Judi Tero

Senior Content Writer

View full profile →