Compliance Hub

Choosing the Right AML Software for Your Business

Site Logo
Tookitaki
4 min
read

Anti-Money Laundering (AML) regulations are becoming increasingly stringent, and businesses are under more pressure than ever to comply. With the rise of financial crimes and the need for transparency, AML software has become a crucial tool for businesses to detect and prevent money laundering activities.

But with so many AML software options available, how do you choose the right one for your business? In this article, we’ll explore the key factors to consider when selecting AML software and provide tips for finding the best fit for your business.

Why Is AML Software Important?

Money laundering is a serious issue that can have severe consequences for businesses. Not only can it result in financial losses, but it can also damage a company’s reputation and lead to legal repercussions.

AML software helps businesses comply with regulations and identify suspicious activities that may indicate money laundering. It automates the process of monitoring transactions and customer data, making it easier for businesses to identify and report suspicious activities.

AML Compliance

AML software is essential for businesses to comply with regulations set by governing bodies such as the Financial Action Task Force (FATF) and the Financial Crimes Enforcement Network (FinCEN). These regulations require businesses to have robust AML programs in place to prevent money laundering and terrorist financing.

By implementing AML software, businesses can ensure they are meeting compliance requirements and avoid hefty fines and penalties.

Detecting Suspicious Activities

AML software uses advanced algorithms and machine learning to analyze customer data and transaction patterns. This allows businesses to identify suspicious activities that may indicate money laundering, such as large cash deposits, frequent transactions between unrelated parties, and transactions involving high-risk countries.

By detecting these activities, businesses can take action to prevent money laundering and protect their reputation and financial stability.

Streamlining AML Processes

Manual AML processes can be time-consuming and prone to human error. AML software automates these processes, making them more efficient and accurate. This saves businesses time and resources, allowing them to focus on other critical tasks.

{{cta-first}}

Key Factors to Consider When Choosing AML Software

When selecting AML software for your business, there are several key factors to consider. These include:

Compliance Requirements

Different industries and businesses have varying compliance requirements, and it’s essential to choose AML software that meets your specific needs. For example, if you’re an accountant, you may need AML software that is tailored to your industry and can integrate with your existing accounting software.

Before choosing AML software, make sure to research the compliance requirements for your industry and ensure the software you choose meets those requirements.

Features and Functionality

AML software can vary in features and functionality, so it’s crucial to consider what your business needs. Some essential features to look for include transaction monitoring, customer due diligence, and case management.

Additionally, consider if the software offers automation and integration capabilities, as well as reporting and analytics features. These can help streamline processes and provide valuable insights into your AML program’s effectiveness.

User-Friendliness

The AML software you choose should be user-friendly and easy to navigate. This is especially important if you have multiple employees using the software, as it should be accessible to all team members.

Consider doing a demo or trial of the software before committing to ensure it is user-friendly and meets your business’s needs.

Cost

The cost of AML software can vary significantly, so it’s essential to consider your budget when choosing a solution. Some software may have a one-time fee, while others may require a monthly or annual subscription.

Be sure to research the pricing options for different AML software and choose one that fits within your budget while still meeting your business’s needs.

Customer Support

In case you encounter any issues or have questions about the software, it’s crucial to have reliable customer support. Look for AML software providers that offer 24/7 support and have a good reputation for responding to customer inquiries promptly.

Tips for Finding the Right AML Software for Your Business

Now that you know the key factors to consider when choosing AML software, here are some tips to help you find the right fit for your business:

Research Different Providers

There are many AML software providers on the market, and it’s essential to research and compare different options. Look for providers that have experience in your industry and have a good reputation for providing reliable and effective AML solutions.

Read Reviews and Ask for Recommendations

Reading reviews from other businesses can provide valuable insights into the effectiveness and user-friendliness of different AML software. Additionally, ask for recommendations from other businesses in your industry to see what software they use and if they have had success with it.

Consider Scalability

As your business grows, your AML needs may change. It’s essential to choose AML software that can scale with your business and accommodate any future needs. This will save you from having to switch to a new software in the future and go through the selection process again.

Take Advantage of Demos and Trials

Many AML software providers offer demos or trials of their software, allowing you to test it out before committing. Take advantage of these opportunities to ensure the software meets your business’s needs and is user-friendly.

{{cta-ebook}}

Wrapping Up

Choosing the right AML software for your business is crucial for complying with regulations and preventing financial crimes. Tookitaki's FinCense stands out as the best option for banks and fintech companies, offering collective intelligence, comprehensive risk coverage, scalability, best-in-class technology, sharper alerts, and unified workflow management.

Financial institutions looking to enhance their AML program should definitely consider talking to Tookitaki's experts to learn more about FinCense and how it can benefit their business. By choosing the right AML software, businesses can streamline processes, detect suspicious activities, and ensure compliance with regulations, ultimately safeguarding their reputation and financial stability.

Talk to an Expert

Ready to Streamline Your Anti-Financial Crime Compliance?

Our Thought Leadership Guides

Blogs
30 Apr 2026
6 min
read

Tranche 2 AML Reforms in Australia: What Businesses Need to Do Now

The email from your legal operations director lands on a Tuesday morning. It references something called the AML/CTF Amendment Act 2024. It asks whether your law firm is now a "reporting entity." It asks whether you need to enrol with AUSTRAC.

You are a managing partner. You run a mid-size conveyancing and commercial law practice. You have never thought of your firm as being in the same regulatory category as a bank. You do not have a compliance team. You do not have an AML programme. And somewhere in the back of your mind, you remember hearing about "Tranche 2" a few years ago — and then hearing it had been delayed again.

It has not been delayed again.

The AML/CTF Amendment Act 2024 received Royal Assent on 29 November 2024. If your firm provides designated legal services — real estate transactions, managing client funds, forming companies or trusts, managing assets on behalf of clients — you are captured. The clock is running.

Talk to an Expert

What Tranche 2 Is, and Why It Took 17 Years

Australia's Anti-Money Laundering and Counter-Terrorism Financing Act 2006 — the AML/CTF Act — came into force as Tranche 1. It regulated financial institutions: banks, credit unions, remittance dealers, casinos. Lawyers, accountants, and real estate agents were left out, with an explicit commitment that a second tranche of reforms would extend the regime to designated non-financial businesses and professions (DNFBPs).

That commitment sat largely dormant for 17 years.

The Financial Action Task Force (FATF) conducted a Mutual Evaluation of Australia in 2015 and named the absence of Tranche 2 as a major gap in Australia's AML/CTF framework. Australia's national risk assessment consistently identified real estate, legal services, and corporate structuring as channels for money laundering — yet the lawyers, accountants, and property agents facilitating those transactions had no formal AML obligations. Australia was one of the last FATF member jurisdictions to operate without DNFBP coverage.

The AML/CTF Amendment Act 2024 ends that. It amends the AML/CTF Act 2006 to extend obligations to Tranche 2 entities for the first time. Royal Assent was 29 November 2024.

Who Is Captured Under Tranche 2

Not every professional in a captured sector becomes a reporting entity. The test is whether you provide a "designated service" as defined under the amended Act. The scope matters.

Lawyers and Law Firms

Law firms are captured when providing specific services:

  • Acting in the purchase or sale of real property on behalf of a client
  • Managing client money, securities, or other assets
  • Forming companies, trusts, or other legal entities on behalf of a client
  • Acting as a director, secretary, or nominee shareholder for a client
  • Providing business sale or purchase advice involving fund transfers

Litigation is not captured. General legal advice is not captured. The obligations attach to the transaction-facing, fund-handling, and corporate-structuring work — the services most associated with money laundering risk.

Accountants

Accountants providing the following services are captured:

  • Managing client funds or financial assets
  • Forming companies, trusts, or other legal entities
  • Providing advice on business acquisition or disposal that involves fund transfers

Tax return preparation alone is not captured. The risk-based logic is the same as for lawyers: the obligations follow the money and the structural work.

Real Estate Agents

Real estate agents acting in the purchase or sale of real property are captured. Property management services are not captured. This distinction matters for agencies that carry both a sales division and a property management business — the compliance obligations attach to the former, not the latter.

Dealers in Precious Metals and Stones

Dealers conducting cash transactions at or above AUD 5,000 are captured. This threshold reflects the cash-intensity risk in this sector. Card or bank transfer transactions below that threshold are not in scope.

Trust and Company Service Providers (TCSPs)

TCSPs are captured for the full range of their entity formation, directorship, and registered office services.

What Tranche 2 Entities Must Do: The Core Obligations

Once captured, the obligations are substantive. They mirror the framework already imposed on financial institutions under the AML/CTF Act 2006, adapted to a professional services context.

Enrol with AUSTRAC. Reporting entities must register with AUSTRAC before providing designated services after the relevant commencement date. AUSTRAC maintains a public register of reporting entities.

Develop an AML/CTF programme. The programme has two parts. Part A is a board-approved risk assessment — a documented analysis of the ML/TF risks your firm faces based on the designated services you provide, the client types you serve, the jurisdictions involved, and the delivery channels used. Part B is the set of controls: customer identification procedures, ongoing monitoring, staff training, and reporting processes.

Customer identification and verification. Before providing a designated service, the entity must identify and verify the customer. For individuals, this typically means collecting and verifying name, date of birth, and address using reliable documentation. For companies and trusts, the obligations extend to beneficial ownership — understanding who ultimately controls or benefits from the entity.

Ongoing customer due diligence. The initial CDD is not a one-time exercise. Entities must monitor existing client relationships for changes in risk profile and update their CDD records accordingly.

Transaction monitoring. Entities must monitor for unusual or suspicious activity. The definition of "unusual" depends on the firm's own risk assessment — a conveyancing practice will have different baseline transaction patterns from an accounting firm that manages investment assets.

File Suspicious Matter Reports (SMRs). Where an entity has reasonable grounds to suspect that a customer or transaction is connected to money laundering or terrorism financing, an SMR must be filed with AUSTRAC within 3 business days of forming that suspicion. The 3-day clock is statutory — it is not extendable because the matter is complex.

File Threshold Transaction Reports (TTRs). Cash transactions of AUD 10,000 or more must be reported to AUSTRAC. This is the same threshold that applies to financial institutions.

Record keeping. Customer due diligence documents and transaction records must be retained for 7 years from the date of the relevant transaction or the end of the business relationship, whichever is later.

AUSTRAC annual compliance report. Reporting entities must submit an annual compliance report to AUSTRAC covering the adequacy of their AML/CTF programme and their compliance during the reporting period.

Phased Implementation: What Is Happening When

The AML/CTF Amendment Act 2024 received Royal Assent on 29 November 2024, but that date did not trigger immediate obligations for Tranche 2 entities. Commencement of specific provisions is subject to Ministerial instruments, and AUSTRAC has signalled a phased approach to give newly captured entities time to build their programmes.

AUSTRAC's published guidance indicates that enrolment obligations and AML/CTF programme development requirements are expected to commence in 2026, with the full suite of reporting and ongoing obligations to follow. However, specific commencement dates for each obligation type remain subject to confirmation through formal commencement instruments.

This is a meaningful distinction. The legislation exists. The obligation to eventually comply is not in doubt. But the date from which AUSTRAC can take enforcement action for non-compliance with a given obligation depends on the commencement date of that obligation — and those dates are being phased, not simultaneous.

What this means in practice: Firms should monitor AUSTRAC's website (austrac.gov.au) for confirmed commencement dates and guidance specific to their sector. AUSTRAC has already published Tranche 2 guidance for lawyers, accountants, real estate agents, and TCSPs. Waiting for a final date before starting programme development is not a sound approach — the lead time required to build a compliant AML/CTF programme is measured in months, not weeks.

What This Means for Banks and Existing Reporting Entities

Tranche 2 does not only affect the newly captured entities. For banks and other financial institutions already operating under the AML/CTF Act 2006, it changes the risk environment in two ways.

The counterparty risk picture changes. Law firms, accounting practices, real estate agencies, and precious metals dealers that were previously unregulated are now reporting entities with their own AML obligations. Banks that hold accounts for these businesses can factor their regulated status into CDD assessments. A law firm that has enrolled with AUSTRAC, implemented an AML/CTF programme, and is actively monitoring for suspicious activity is a materially different risk profile from one that had no such obligations.

Expectations around correspondent and professional services accounts will rise. AUSTRAC is likely to assess whether banks are reflecting the updated regulatory status of Tranche 2 sectors in their own monitoring and CDD frameworks. A bank that continues to treat a law firm client account as low-risk without considering whether that firm has enrolled and implemented its programme is exposed to questions about the adequacy of its own risk assessment.

Property-linked layering — moving proceeds of crime through sequential real estate transactions — is documented in Australia's national money laundering risk assessments as a method that has operated with relative ease due to the absence of AML controls on real estate agents and conveyancers. That gap is now being closed. Banks whose transaction monitoring is tuned to detect this pattern should review whether the new regulated status of real estate agents affects their detection logic.

For more detail on AUSTRAC's expectations for transaction monitoring at financial institutions, see our guide to AUSTRAC transaction monitoring requirements.

ChatGPT Image Apr 30, 2026, 09_48_09 AM

Building an AML Programme from Scratch: Seven Steps

For Tranche 2 entities starting from zero, the AML/CTF programme requirement is the most substantive obligation. Here is the structure.

Step 1: Identify your designated services. Not all services a law firm or accounting practice provides are captured. Document which of your services meet the definition of a designated service under the amended Act. This is the scope boundary for everything that follows.

Step 2: Conduct a risk assessment (Part A). For each designated service, assess the money laundering and terrorism financing risks based on: client types (individuals, companies, trusts, politically exposed persons, foreign clients), delivery channels (in-person, remote, intermediary-introduced), transaction types and sizes, and the jurisdictions involved. The risk assessment must be documented and approved at board or senior management level.

Step 3: Design your customer identification procedures. Document exactly what identity information you collect from each customer type, at what point in the engagement, and how you verify it. Verification sources must be reliable and independent. Document what you do when you cannot complete verification.

Step 4: Define your ongoing monitoring approach. For your client base, define what an unusual transaction or instruction looks like. A real estate agent processing a cash contract at AUD 4,800 — just below the AUD 5,000 cash threshold — warrants scrutiny. A law firm receiving funds from an unexpected third party for a property settlement is a red flag regardless of amount. Document your red flag indicators and the escalation process.

Step 5: Establish your SMR and TTR filing process. Designate who is responsible for filing Suspicious Matter Reports. Build the 3-business-day clock into your workflow. For TTRs, create a process that captures cash transactions at or above AUD 10,000 at point of receipt — do not rely on end-of-period reconciliations.

Step 6: Train your staff. Everyone who interacts with clients or handles client funds needs AML/CTF awareness training. Training should cover: what money laundering looks like in your practice context, how to identify red flags, what to do when something feels wrong, and how to report internally without tipping off the client.

Step 7: Establish your record-keeping system. You need to retain CDD documents and transaction records for 7 years. If your firm's document management system was designed for legal file retention rather than AML compliance, you may need a separate system or process for AML records.

AUSTRAC's Enforcement Posture

AUSTRAC has a documented history of supporting newly regulated sectors through education before moving to enforcement. The regulator published Tranche 2-specific guidance and engaged with professional associations in the legal and accounting sectors during the consultation process.

That said, the context for Tranche 2 is different from previous regulatory expansions. Australia has operated without DNFBP AML coverage for 17 years, under sustained FATF scrutiny. The reputational and diplomatic pressure behind Tranche 2 is significant. AUSTRAC is unlikely to treat good-faith ignorance the same way it might have in an earlier era.

AUSTRAC's civil penalty powers apply from commencement. For body corporates, civil penalties can reach AUD 17.9 million per contravention. For individuals, penalties are lower but substantial. AUSTRAC also has the power to accept enforceable undertakings, issue infringement notices, and seek injunctions.

The enforcement risk is not theoretical. AUSTRAC has pursued major civil penalty actions against Westpac (AUD 1.3 billion), Commonwealth Bank (AUD 700 million), and SportsSuper. A newly captured entity that makes no effort to enrol or build a programme faces a different enforcement calculus from one that has enrolled, built a programme, and is working through implementation challenges.

Getting the Programme Right

For Tranche 2 entities building their first AML/CTF programme, technology makes a material difference in whether the programme works in practice. A documented policy that exists only on paper will not detect a suspicious transaction or generate a timely SMR.

For institutions already operating under the AML/CTF Act 2006 that need to review their transaction monitoring in light of Tranche 2, our transaction monitoring software buyer's guide covers what to look for in a compliant monitoring system. If you are newer to transaction monitoring concepts, our introduction to transaction monitoring sets out the fundamentals.

Tookitaki's AFC Ecosystem is built for the compliance requirements that AUSTRAC and other regulators enforce. If you are building or upgrading an AML programme for the Australian market — whether as a newly captured Tranche 2 entity or an existing reporting entity adjusting to the new environment — book a demo to see how the platform handles the specific detection and reporting requirements that apply under the AML/CTF Act.

AUSTRAC has confirmed that Tranche 2 obligations are coming. The question now is not whether to build a programme — it is whether to build one before commencement or after the first enforcement action arrives.

Tranche 2 AML Reforms in Australia: What Businesses Need to Do Now
Blogs
29 Apr 2026
6 min
read

Inside the Parañaque Scam Factory: What 48 Arrests Reveal About the Industrialisation of Online Fraud

On 20 April 2026, Philippine media reported that the National Bureau of Investigation had arrested 48 individuals after raiding an alleged online scamming hub in Parañaque City. The timing matters. This is not an old case being revisited. It is a fresh reminder that scam operations across Southeast Asia are still active, organised, and scaling fast.

When authorities entered the site, they did not just uncover another isolated scam. They walked into something far more structured — an operation that looked less like opportunistic fraud and more like a production line.

Dozens of individuals. Multiple devices. Coordinated activity. A setup that resembled a call centre more than a loose group of fraudsters.

For compliance teams, this is not just another headline. It is a signal. Modern scam networks are becoming more industrialised, and the financial trails they leave behind are becoming harder to detect with static, siloed controls.

Talk to an Expert

What Actually Happened in Parañaque

The raid exposed an online scamming hub operating at scale. Investigators found individuals actively engaged in defrauding victims, likely through a mix of social engineering tactics — investment scams, impersonation schemes, and possibly romance or job scams.

What stood out was not just the activity itself, but the structure:

  • Multiple operators working simultaneously
  • Dedicated systems and devices
  • Coordinated workflows
  • A controlled environment, almost like a call centre

This was not a loose group of fraudsters. It was organised, repeatable, and designed for volume.

That distinction matters.

Because once fraud becomes structured like this, it stops being unpredictable and starts becoming scalable.

The Shift from Scams to Scam Infrastructure

For years, fraud has often been viewed as a series of isolated incidents. A phishing email here. A social engineering case there.

That lens no longer holds.

What the Parañaque case reveals is something deeper: the rise of scam infrastructure.

These are not individuals improvising. These are networks designed with:

  • Recruitment pipelines
  • Scripted engagement models
  • Operational roles and hierarchies
  • Performance-driven execution

In many ways, these setups mirror legitimate businesses — except the product being “sold” is deception.

And like any efficient system, they optimise over time.

They test what works. They refine messaging. They reuse successful playbooks. They scale quickly.

For financial institutions, this changes the challenge entirely.

You are no longer detecting one-off fraud. You are up against systems that are constantly learning and adapting.

Why This Matters for Financial Institutions

At first glance, a physical raid in the Philippines may feel distant to a bank in Singapore or a fintech in Australia.

But the financial footprint of such operations is rarely local.

Scam proceeds move quickly — often across borders, across institutions, and across channels.

A typical flow might look like this:

  • Victim transfers funds via online banking or wallet
  • Funds are routed through mule accounts
  • Split into smaller transactions
  • Moved across jurisdictions
  • Layered further to obscure origin

By the time the money surfaces in a financial institution’s system, it often appears routine.

That is the real risk.

Not at the point of the scam, but at the point where illicit funds blend into legitimate financial flows.

The Hidden Complexity Behind “Simple” Scams

It is easy to dismiss scams as basic manipulation.

But cases like this show how layered they have become.

Behind a single victim interaction, there may be:

  • A recruitment network sourcing operators
  • A technical setup managing communication channels
  • A financial layer handling fund movement
  • A supervisory layer coordinating activity

Each layer introduces its own signals.

But those signals are rarely obvious in isolation.

A transaction might look normal.
A customer profile might appear clean.
A payment pattern may not trigger any threshold.

Yet, when viewed together, they form a pattern.

This is the daily reality for compliance teams — connecting weak, fragmented signals into something meaningful.

ChatGPT Image Apr 29, 2026, 12_19_03 PM

Where Traditional Detection Starts to Break Down

Most financial institutions still rely, at least in part, on rule-based monitoring.

And rules do have their place.

But against structured scam operations, they begin to show limitations:

  • Static thresholds struggle against evolving behaviour
  • Isolated alerts fail to capture network patterns
  • Manual tuning cannot keep pace with changing typologies

In the Parañaque case, individual transactions may not have appeared suspicious.

What made them risky was the context — the coordination, the repetition, the connections.

This is where traditional systems fall short.

They are built to detect anomalies, not ecosystems.

The Role of Mule Networks in Scaling Fraud

No large-scale scam operation works without one critical component: money mules.

These accounts absorb, move, and disguise illicit funds.

And they are becoming increasingly sophisticated.

Some are unwitting — recruited through job offers or incentives.
Others are complicit — knowingly participating in exchange for a share.

Either way, they create a buffer between fraudsters and the financial system.

In operations like the Parañaque hub, mule networks likely operate in parallel:

  • Receiving funds from multiple victims
  • Redistributing across accounts
  • Moving funds rapidly across borders

From a compliance perspective, mule activity often appears as:

  • High-velocity transactions
  • Rapid inflows and outflows
  • Accounts with little genuine economic activity

But again, these signals are rarely conclusive on their own.

The Cross-Border Reality

Modern fraud rarely stays within one jurisdiction.

A scam initiated in one country can impact victims in another, with funds routed through multiple regions.

This creates three persistent challenges:

  1. Fragmented visibility
    No single institution sees the full transaction chain
  2. Jurisdictional differences
    Regulatory expectations and data access vary
  3. Delayed intervention
    By the time alerts are triggered, funds have already moved

The Parañaque case reinforces a simple truth: financial crime is global, even when it appears local.

What Compliance Teams Should Be Looking For

Rather than focusing on isolated red flags, institutions need to identify patterns of behaviour.

Indicators aligned with operations like this include:

  • Clusters of accounts exhibiting similar transaction flows
  • Repeated low-to-mid value transfers across multiple beneficiaries
  • Rapid movement of funds with minimal retention
  • Shared identifiers such as devices, IPs, or contact details
  • Activity inconsistent with stated customer profiles

Individually, these may not trigger concern.

Collectively, they signal coordination.

Moving from Detection to Understanding

There is a broader shift underway in financial crime prevention.

From generating alerts…
To understanding behaviour.

It is no longer enough to flag transactions.

Teams need to ask:

  • Why is this activity happening?
  • How is it connected to other behaviour?
  • What broader typology does it resemble?

This shift is not easy.

Because understanding requires context — and context requires intelligence beyond internal data.

The Role of Collaborative Intelligence

Cases like the Parañaque scam hub highlight a structural gap.

No single institution has full visibility.

Fraud patterns are distributed across:

  • Banks
  • Fintech platforms
  • Payment processors
  • Geographies

Which means detection cannot rely on isolated systems.

Collaborative intelligence becomes critical.

By sharing typologies, behavioural patterns, and risk signals without exposing sensitive data institutions can:

This is where community-driven intelligence models are gaining traction.

Where Technology Needs to Evolve

To keep pace with structured fraud operations, detection systems need to evolve in three ways:

1. From rules to adaptive intelligence
Systems must continuously learn from emerging patterns

2. From transactions to networks
Detection must capture relationships, not just events

3. From alerts to actionable insights
Outputs must support faster, clearer investigation decisions

This is not about replacing existing systems overnight.

It is about enhancing them to reflect how fraud actually operates today.

The Cost of Getting This Wrong

The impact of missing these signals goes beyond financial loss.

There are broader consequences:

  • Increased regulatory scrutiny
  • Reputational damage
  • Erosion of customer trust

In fast-growing digital markets, trust is not easily rebuilt once lost.

And fraud, left unchecked, directly undermines it.

A More Grounded Way Forward

The Parañaque case is not an anomaly. It is part of a pattern.

Fraud is becoming:

  • More organised
  • More scalable
  • More adaptive

And increasingly embedded within legitimate financial systems.

Responding to this requires a shift:

From reactive to proactive
From siloed to collaborative
From static to adaptive

For compliance teams, this is not about chasing every new scam.

It is about building the capability to recognise patterns — even as they evolve.

Conclusion: Beyond the Raid

The arrest of 48 individuals is a meaningful enforcement action.

But it is not the end of the story.

Operations like these rarely disappear. They adapt, relocate, and re-emerge.

For financial institutions, the real question is not whether such scams exist.

It is whether their systems can detect the financial signals these operations inevitably leave behind.

Because while enforcement can shut down a physical hub, the financial trails continue to move.

And that is where the real battle is being fought.

Inside the Parañaque Scam Factory: What 48 Arrests Reveal About the Industrialisation of Online Fraud
Blogs
29 Apr 2026
6 min
read

AML Compliance in Malaysia: A Complete Guide to BNM Requirements and AMLATFPUAA

Picture a compliance officer at a Malaysian licensed bank three weeks out from a BNM AML/CFT examination. She has read AMLATFPUAA. She knows the Act was amended in 2014 and again in 2020. What she needs now is not another legislative summary. She needs to know what BNM's examiners will actually open on their laptops when they arrive — which files, which logs, which policy documents — and where programmes at institutions like hers most commonly fall short.

That is what this guide covers.

The legislative history of AMLATFPUAA and its impact on Malaysia's financial sector is covered in our [overview of AMLA and its impact on the Malaysian financial landscape](/compliance-hub/understanding-amla-impact-on-malaysia-financial-landscape). This article focuses on the operational layer: the ongoing compliance obligations that BNM-supervised institutions must meet, the specific thresholds and timelines that govern reporting, and the recurring examination gaps that BNM has identified in practice.

Talk to an Expert

The Regulatory Framework in Brief

Two instruments govern AML/CFT compliance for BNM-supervised institutions in Malaysia.

AMLATFPUAA 2001 is the primary legislation. The 2014 amendment expanded the list of predicate offences and brought Designated Non-Financial Businesses and Professions (DNFBPs) into the compliance perimeter. The 2020 amendment strengthened beneficial ownership requirements and raised maximum penalties to MYR 3 million per offence, or 5 years imprisonment, or both. For financial institutions, the penalties can run per transaction or per day of non-compliance — which changes the risk calculus considerably.

BNM's AML/CFT and TF Policy Document (2023) is where the day-to-day compliance standards sit. The Policy Document translates AMLATFPUAA's obligations into specific programme requirements: who must be screened, how, at what intervals, and with what documentation. BNM's Financial Intelligence and Enforcement Department (FIED) is the enforcement arm that reviews STR filings and leads enforcement action.

When a BNM examiner cites a deficiency, the reference is almost always to the Policy Document, not to the Act itself. Knowing the Act is necessary; knowing the Policy Document is what keeps a programme compliant.

Who Must Comply: Reporting Institutions Under AMLATFPUAA

AMLATFPUAA defines "Reporting Institutions" across three categories, each carrying distinct obligations.

Category 1 covers licensed banks, Islamic banks, and development financial institutions. These institutions carry the fullest set of AML/CFT obligations under the Policy Document, including mandatory enterprise-wide risk assessments and comprehensive transaction monitoring programmes.

Category 2 covers money service businesses (MSBs), remittance operators, and e-money issuers. The obligations are materially equivalent to Category 1 for CDD and reporting, but the Policy Document recognises that the risk typologies differ — particularly for remittance operators processing high-frequency, lower-value cross-border transfers.

Category 3 covers DNFBPs: lawyers, accountants, and real estate agents, brought in under the 2014 amendment. DNFBP obligations are threshold-triggered — they apply when a transaction reaches a defined cash value or when the DNFBP is facilitating a category of activity specified in the Act.

The DNFBP category matters for banks because banks deal with these professionals as customers. When a law firm holds a client account at your institution, BNM expects you to recognise that relationship as carrying elevated risk — and to apply the CDD standards appropriate to it.

Customer Due Diligence: Three Tiers, Different Standards

BNM's AML/CFT Policy Document sets three CDD tiers. Which tier applies depends on the risk profile of the customer and the nature of the business relationship — not on an institution's convenience.

Standard CDD

Standard CDD applies to all new customers unless simplified CDD conditions are met. It requires identification and verification of the customer, documentation of the purpose and intended nature of the business relationship, and a customer risk assessment at onboarding. Verification must be based on independent and reliable sources — a customer self-certifying their identity is not sufficient.

For individual customers, verification typically involves government-issued identification. For corporate customers, it extends to directors, authorised signatories, and ultimate beneficial owners (UBOs).

Simplified CDD

Simplified CDD is available for customers assessed as low-risk: listed companies on a regulated exchange, government entities, and FIs supervised by BNM or an equivalent foreign regulator. Under simplified CDD, identification is still required but the depth of verification can be reduced, and ongoing monitoring can operate at lower intensity.

The Policy Document is explicit that simplified CDD is a risk-based determination — not a category exemption. An institution cannot apply simplified CDD to a listed company without first concluding that the specific company and the specific transaction type present low money laundering risk.

Enhanced Due Diligence

Enhanced Due Diligence (EDD) is mandatory for four customer categories:

  • Politically Exposed Persons (PEPs) — domestic and foreign
  • Customers from FATF-identified jurisdictions with strategic AML/CFT deficiencies
  • Corporate customers with complex or non-transparent ownership structures
  • Customers engaged in cash-intensive businesses

EDD requirements under the Policy Document are specific. For PEPs, the institution must verify source of funds and source of wealth — not just identify the customer's occupation. Senior management approval is required before establishing or continuing a relationship with a PEP. The approval must be documented, with a named approver. Periodic review of PEP relationships is mandatory at least every 2 years.

For all EDD customers, monitoring intensity must be increased. What "increased" means in practice is calibrated monitoring rules, not a generic note in the file that the customer is high-risk.

Beneficial ownership threshold: BNM sets the threshold for identifying UBOs at 25% ownership or control — consistent with the FATF standard. Institutions must trace ownership to natural persons. Nominee structures, trusts, and multi-layer corporate arrangements are not a legitimate stopping point. If your CDD file shows a holding company as the UBO rather than the individuals who own it, the file is incomplete.

For institutions operating digital onboarding channels, the BNM eKYC Policy Document sets out the technical requirements that must be met for remote CDD to carry the same assurance as face-to-face verification. The specifics for digital banks and e-money issuers are covered in our eKYC Malaysia guide.

Ongoing Monitoring Requirements

Onboarding CDD is not a one-time event. BNM's Policy Document requires institutions to monitor the business relationship throughout its duration — which means monitoring transactions for consistency with the customer's risk profile, stated purpose, and expected transaction patterns.

When Re-KYC Is Required

The Policy Document specifies triggers that require re-assessment of a customer's KYC data:

  • A material change in the customer's circumstances (change in business activity, change in ownership structure, change in country of domicile)
  • A change in the customer's risk rating — either triggered by a system alert or a periodic review
  • Reactivation of a dormant account (inactive for 12 months or more)
  • Scheduled periodic review for high-risk customers — at minimum every 2 years

The 12-month dormancy trigger and the 2-year PEP review cycle are not recommendations. They are requirements. BNM examiners check whether these cycles are documented and whether the reviews are substantive — not whether a checkbox was ticked.

Transaction Monitoring Calibration

BNM's examination findings have repeatedly cited one gap above others: institutions running transaction monitoring with default threshold settings that have not been calibrated to the institution's own customer risk profile.

Default thresholds — those that come with a monitoring system out of the box — are designed to be functional across a broad range of institutions. They are not designed to reflect the specific risk profile of your customer book. A licensed bank whose retail clients are primarily salaried employees in Klang Valley has a different expected transaction pattern than an MSB processing remittances to Southeast Asian labour markets. Their monitoring should look different.

BNM expects institutions to document why their thresholds are set where they are, when they were last reviewed, and who approved the current calibration. If the answer is "these are the system defaults," that is a finding waiting to be written.

To understand what an effective transaction monitoring programme should look like — and what to evaluate when selecting or upgrading a system — see our Transaction Monitoring Software Buyer's Guide and What Is Transaction Monitoring.

ChatGPT Image Apr 29, 2026, 11_14_44 AM

Reporting Obligations: Timelines and Thresholds

BNM-supervised institutions have two primary reporting obligations to FIED. Both have defined timelines that examination teams check.

Cash Threshold Reports (CTRs)

Any cash transaction — or series of related cash transactions — of MYR 25,000 or above must be reported to FIED via the goAML system (Malaysia adopted the UNODC goAML platform in 2020). The filing deadline is 3 business days from the date of the transaction.

CTR filing is largely mechanical for institutions with core banking systems capable of automated flagging. Where BNM has found gaps is in the manual detection of structured transactions — multiple sub-MYR 25,000 cash deposits by the same customer within a short period, designed to stay below the CTR threshold. Structuring is a predicate offence under AMLATFPUAA. Failing to detect it is a monitoring failure, not just a reporting failure.

Suspicious Transaction Reports (STRs)

An STR must be filed when a staff member or system alert produces grounds to suspect that a transaction involves the proceeds of a scheduled offence or is connected to terrorist financing. The deadline is 3 working days from the point at which suspicion is formed — not from when the transaction occurred.

That distinction matters. If a transaction alerts in your monitoring system on Monday and a compliance analyst forms a reasonable suspicion on Wednesday, the STR clock started on Wednesday, not Monday.

BNM examination findings have identified a specific quality gap in STR filings: reports submitted without an adequate documented basis for suspicion. An STR that records "transaction appeared unusual" without specifying what pattern triggered the suspicion, what investigation was conducted, and why the analyst concluded suspicion was warranted, does not meet the standard. The goAML system requires structured data fields to be completed — but the narrative quality of what goes into those fields is what BNM examiners assess.

The internal pathway matters too. Institutions must have a documented process for staff to escalate concerns to the MLRO via an Internal Suspicious Transaction Report (ISTR). Frontline staff who identify red flags and have no clear escalation route — or who fear that escalating will reflect poorly on them — are a systemic gap. BNM expects staff training to address this directly.

AML/CFT Programme Governance

A compliant AML/CFT programme is not a set of policies in a folder. BNM's Policy Document specifies the governance structure that must be in place.

Board-approved compliance programme. The institution's AML/CFT programme must be documented, formally approved by the Board of Directors, and reviewed at minimum annually. A programme that exists only in the compliance officer's head — or that was last updated before the 2020 AMLATFPUAA amendments — is non-compliant.

Designated Compliance Officer (DCO). The DCO must sit at senior management level and must have direct access to the Board or Board Audit Committee when escalation is required. BNM examiners specifically check whether the DCO has the seniority and independence to escalate concerns without internal obstruction. An institution where the MLRO reports upward through the business line whose clients they are monitoring has a structural governance problem.

Independent AML/CFT audit. The audit function — whether internal or conducted by a qualified external party — must assess the AML/CFT programme at least once per year. The scope must cover policy adequacy, operational effectiveness, and staff training outcomes. An audit that confirms the policies exist but does not test whether they work is not what BNM requires.

Staff training. Training must be documented, with records of attendance and assessment results. BNM examiners have cited institutions where training records were incomplete or where training had not been updated to reflect regulatory changes — including the goAML transition and the 2020 AMLATFPUAA amendments.

Common BNM Examination Gaps

Based on publicly available BNM guidance and supervisory feedback, five gaps recur across examinations of Malaysian institutions.

Outdated customer risk assessments. Customers onboarded years ago under different risk criteria and never re-assessed — even when their transaction patterns have materially changed.

Incomplete beneficial ownership documentation for corporate customers. Files that identify a corporate structure but stop at the holding company level, without tracing to the natural persons who ultimately control it.

STRs filed without documented analytical basis. The filing exists, but the rationale is absent. This satisfies neither the spirit nor the operational requirement of the obligation.

Default monitoring thresholds. System thresholds not calibrated to the institution's specific customer risk profile — and no documentation that the calibration question was ever asked.

Inadequate scrutiny of DNFBPs as customers. Banks treating law firm client accounts or real estate agent trust accounts the same as ordinary business accounts, without recognising the elevated risk profile those relationships carry under AMLATFPUAA.

Malaysia's FATF Context: Why Examination Intensity Has Increased

Malaysia's FATF Mutual Evaluation in 2023 assessed both technical compliance and effectiveness — two different standards. Technical compliance measures whether the laws and regulations are in place. Effectiveness measures whether they work.

Malaysia's technical compliance ratings were largely Compliant or Largely Compliant. Its effectiveness ratings were lower — particularly for the transparency of corporate beneficial ownership, where the evaluation found that beneficial ownership information was not always available to competent authorities in a timely way.

For BNM-supervised institutions, the practical effect is this: BNM is under pressure to demonstrate that AML controls are operationally effective, not just formally present. Examination intensity has increased since 2023. The scrutiny on beneficial ownership documentation, on monitoring calibration, and on STR quality is not coincidental. These are the areas the FATF evaluation identified as weakest, and they are the areas BNM examiners are examining most carefully.

Preparing for What Examiners Actually Review

The compliance officer three weeks out from her BNM examination should be checking seven things:

  1. Are customer risk assessments current — specifically for dormant accounts and for customers whose transaction patterns have changed?
  2. Do all corporate customer files trace beneficial ownership to natural persons at the 25% threshold?
  3. Are monitoring thresholds documented with a calibration rationale — and reviewed within the last 12 months?
  4. Do STR files contain a structured basis for suspicion, not just a transaction reference?
  5. Is the DCO's seniority and Board access documented?
  6. Was the AML/CFT audit conducted in the past year, and did its scope include operational testing?
  7. Are staff training records complete and current for all frontline and compliance staff?

These are not abstract compliance questions. They are the specific items that BNM examinations have produced findings on. Getting them right before the examination is considerably easier than explaining gaps during it.

If you want to see how Tookitaki's platform supports CDD, transaction monitoring calibration, and STR quality management for BNM-supervised institutions, book a demo. Or download our Malaysia AML compliance checklist for a full pre-examination review framework tailored to AMLATFPUAA and the BNM AML/CFT Policy Document. For institutions evaluating or upgrading their monitoring systems, the Transaction Monitoring Software Buyer's Guide covers what to look for and what to ask vendors about calibration and alert management. If you're new to the foundations of KYC and CDD, our What Is KYC guide provides the conceptual grounding the Policy Document assumes you have.

AML Compliance in Malaysia: A Complete Guide to BNM Requirements and AMLATFPUAA