FINANCIAL INTELLIGENCE BRIEF  ·  INTERNAL USE
CONFIDENTIAL

The Money-Laundering-as-a-Service Pipeline

A forensic reading of two SBI bank statements that, read together, expose a transnational investment-scam laundering syndicate operating at industrial throughput through India's UPI & NEFT rails.

SubjectTwo SBI Accounts
Records analysed321,967
Aggregate flow₹22.36 Cr
TypologySmurf → Layer → Drain
§ 01 — Executive Summary

Two accounts, one factory floor.

Two SBI customer accounts processed 321,967 transactions moving ₹22.36 crore in aggregate, where 99.7% of inflows arrived as sub-₹2,000 UPI credits and almost every rupee was drained out within hours through standardised NEFT/RTGS payouts to a tightly-clustered set of recipient accounts. The retained balance in one account was 0.03% of inflow. This is not a customer using a bank account; this is a wallet being rented to a payment-aggregation engine.

The single most important finding: both accounts in this analysis received their inflows funnelled through the same upstream source account — 4897735162098 — and 5,005 retail VPAs sent money into both accounts independently. This is a confirmed inter-mule layering network with shared victim pool. It is the signature of Money-Laundering-as-a-Service (MLaaS) — a managed pipeline rented out to multiple downstream fraud operators (investment scams, task-based scams, illegal betting, crypto-shell mining), most consistent with the modus operandi of Chinese-syndicate cyber-fraud rings operating against Indian retail victims.
₹22.36 Cr
Aggregate Throughput
across both accounts in concentrated bursts
321,094
Micro-Credits Received
avg. ₹693 — classic smurfing signature
875
Aggregated Payouts
avg. ₹2.55 lakh — RTGS / NEFT to mule fleet

The accounts demonstrate eleven distinct AML red-flag patterns simultaneously. Most are individually detectable by any half-decent transaction-monitoring system, yet the activity ran. The remainder of this brief decomposes the patterns and proposes a concrete, rule-by-rule detection architecture SBI can deploy in its FCMS / AMLOCK / equivalent monitoring stack to interdict accounts like these before they complete the laundering cycle.

§ 02 — Forensic Snapshot

What the statements actually show.

Account A — "SBI 1 ID" High-risk mule

MetricValue
Total records95,474
Credit transactions95,301
Total credits₹6.98 Cr
Debit transactions173
Total debits₹6.98 Cr
Net retained₹18,287 (0.03%)
Max balance held₹13.61 lakh
Velocity (turnover)51.3×
True activity window (from RTGS epochs)~5h 13m
Credit Side ProfileValue
Median credit ticket₹500
Most common amount₹500 (25%)
Top-10 amounts cover93.4% of txns
Unique sender VPAs/phones68,682
Phone-number-VPAs share88.7%
Unique sender banks (IFSC prefix)120
Random 4-char "notes"93.9%
All credits routed via single source acct4897735162098

Debit side — Account A

BeneficiaryTxnsChannelDestination AcctTicket Size
SHOP BASKET / S H O P BASKET127RTGS (INB)98561053319₹4,00,113 – ₹4,18,378
RAMSO ECOMMERCE PRIVATE LIMITED46RTGS (INB)98561053319₹4,00,113 – ₹4,18,378

All 173 debits went to a single destination account. The two distinct names — "SHOP BASKET" and "RAMSO ECOMMERCE PRIVATE LIMITED" — sharing one account number indicates either a shell/proprietorship overlap or trade-name spoofing for narrative variety in statements.


Account B — "SBI 3 ID" High-risk mule

MetricValue
Total records226,493
Credit transactions225,791
Total credits₹15.38 Cr
Debit transactions702
Total debits₹15.31 Cr
Net retained₹6.42 lakh (0.42%)
Max balance held₹36.24 lakh
Velocity (turnover)42.4×
Credit Side ProfileValue
Median credit ticket₹300
Most common amount₹100 (30%)
Unique sender VPAs/phones172,509
Unique sender banks153
Senders also seen in Acct A5,005
Distinct outflow destinations42 sequential mule accts
NEFT remark"COREPAY" (uniform)
All credits routed via single source acct4897735162098

The mule fleet on the receiving end (Account B's 42 destinations)

Branch: SBI Aurangabad — Branch Code 10-824301
3197 series: 3197942044308, 3197945044305, 3199301044303, 3199302044302
4697 series (12 accts): 4697153044301 → 4697164044309
4698 series (25 accts): 4697129044303 → 4698153044303
4899 series: 4899157044304
Total recipients: 42 accounts — all NEFT-tagged "COREPAY"
Range per account: ₹17.78 lakh – ₹59.63 lakh in a single burst
Mean per account: ₹36.46 lakh

The sequential account numbering (4698129, 4698130, 4698131, … 4698153 — 25 consecutive accounts in the same series) is mathematically certain to be a single batch of accounts opened at the same branch in close succession, likely within the same week, probably by the same on-the-ground KYC operator. This is the unmistakable fingerprint of a mule fleet — accounts opened by recruited individuals (often unwitting students, daily-wage labourers, the elderly, or unemployed) whose KYC and signed cheque-books / debit cards / UPI access are handed to syndicate handlers.

§ 03 — Money-Laundering Patterns

Eleven red flags. All present. Simultaneously.

The activity profile satisfies the textbook FATF, FIU-IND, and RBI AML typologies for digital-rails money laundering. Each pattern below is observed directly in the data; the bracketed evidence is verifiable on inspection of the statements themselves.

Industrial-scale smurfing through UPI micro-deposits

The classic anti-AML technique — break one large deposit into many tiny ones — taken to its logical extreme. Account A received 95,301 individual credits with a median of ₹500; Account B received 225,791 credits with a median of ₹300. Each individual credit is invisible to threshold-based monitoring; the aggregate is criminal.

Account A: 93.4% of credits fall into just 10 round amounts: ₹100, ₹200, ₹300, ₹400, ₹500, ₹600, ₹1000, ₹2000, ₹3000, ₹5000
Account B: Top amount ₹100 alone = 30% of all credits; top-3 amounts cover 65% of flow
No natural distribution: A genuine retail account would show a continuous, long-tailed distribution. This is a quantised, programmatic distribution.

Pass-through account with near-zero retention

Account A retained 0.03% of inflow; Account B retained 0.42%. A legitimate business account, even a thin-margin one, retains 5–40% of inflow as working capital, taxes, or operational float. Retention below 1% is a defining feature of a layering account — money exists only to be moved.

Velocity multiplier: A=51.3×, B=42.4× — money cycles the account ~50 times its peak balance
Inflow ≈ Outflow: A: ₹6.98 Cr in / ₹6.98 Cr out | B: ₹15.38 Cr in / ₹15.31 Cr out

Five-hour activity window for 95,000+ transactions

Account A's RTGS reference numbers carry embedded Unix epoch timestamps revealing the true activity window: 2025-07-01 15:10:42 IST to 20:24:05 IST — five hours and thirteen minutes. That is ~5 transactions per second sustained for a fraction of a working day, well outside human input rates. Both files display dates in cells that appear to be normalised statement-render dates, but the embedded RTGS/NEFT references encode the real chronology.

RTGS sample: RTGS1751382642566CRL4117571 → epoch 1751382642566 ms → 01-Jul-2025 15:10:42.566 IST
Throughput: 5.07 txns/sec average over 5h13m — beyond manual data entry, requires automation/API
SBI 3 ID: 226,493 transactions tagged to a single date — same compression pattern

Hundreds of thousands of senders, single forwarding source, handful of beneficiaries

The fan-in / fan-out is forensically diagnostic. 241,191 distinct retail senders across both accounts → one upstream "TRANSFER FROM" source account (4897735162098)43 destination accounts (1 in Acct A, 42 in Acct B). This hourglass shape is the canonical signature of a payment-aggregator-style laundering pipeline.

Hourglass topology: 241,191 → 1 → 43
Anchor account 4897735162098: Appears in 100% of credits to BOTH accounts
5,005 senders cross-overlap: Same victims paid into multiple mule accounts

Bot-generated 4-character random transaction notes

UPI permits a free-text note. Human users write things like "Rent", "Food", "Tea", "Mom". In Account A, 93.9% of notes are exactly four random alphanumeric characters (e.g., 29go, jlgo, k9go, m9go, c1f, p6f) — characteristic API-generated reference tokens emitted by an aggregator/orchestrator app. The remaining 6% are stub strings like "Payme", "UPI P", "Paid" — also auto-generated, just from a different code path.

Random-token notes: 89,474 of 95,301 = 93.9%
Distinct word-notes: ~30 stems — "Payme", "UPI", "Paid", "Pay", "Sent", "CBDC", etc.
Zero rent/food/grocery/loan/EMI notes — vocabulary entirely absent.

~89% of senders use bare phone-number handles

While phone-number VPAs are valid, an 89% concentration is anomalous. Sophisticated UPI users tend to use bank/app-issued VPAs (name@okhdfcbank, name@paytm). Bare 10-digit phone-number VPAs are easy to spoof, easy to recruit via task-based scams ("install this app and send ₹500 — get ₹600 back"), and easy to recycle across syndicate handlers.

Phone-number VPAs: ~88.7% of senders in Acct A
Sender bank IFSC spread: 120 distinct banks for Acct A, 153 for Acct B — broad enough to evade single-bank-side velocity rules

5,005 senders paid into BOTH analysed accounts

Sender VPA overlap between two seemingly unrelated SBI accounts is statistically near-impossible for organic activity. The 5,005 shared retail VPAs (out of ~68k in A and ~172k in B) prove these two SBI accounts are nodes in the same syndicate, sharing a victim/contributor pool routed by the same aggregator (4897735162098).

Shared VPAs: 5,005 individuals sent UPI credits to both mule accounts
Shared upstream: "TRANSFER FROM 4897735162098" appears in 100% of parsed credits across BOTH files

RTGS amounts consistently parked at ₹4 lakh / ₹2 lakh sweeps

Account A's debits cluster between ₹4,00,113 and ₹4,18,378 — a 4.5% spread around ₹4 lakh. Account B's debits cluster between ₹1,99,950 and ₹2,49,838 — sweeping at ~₹2 lakh. These ticket sizes are calibrated below typical RTGS scrutiny thresholds, branch-manager-approval thresholds, and FIU-IND CTR triggers (₹10 lakh+), and below the ₹50 lakh wire-instrument STR floor. RTGS has no statutory upper limit on a per-transaction basis, but operational and compliance frictions kick in at well-known internal bank thresholds. The actor knows them.

Acct A debit range: [₹4,00,113 — ₹4,18,378], σ=₹6,178
Acct B debit range: [₹1,99,950 — ₹2,49,838], σ=₹16,056
Tight clustering: A's stdev of ₹6k on a ₹4-lakh mean = 1.5% CoV — engineered, not organic

42 sequentially-numbered SBI Aurangabad accounts

Account B's payouts fan out to 42 distinct accounts at SBI Aurangabad (branch 10-824301), with account numbers running in tight numerical ranges: 46971534697164 (12 consecutive), 46981294698153 (25 consecutive). Account numbers are assigned sequentially by SBI's CBS on customer onboarding. Sequential numbers at a single branch = accounts opened in the same opening session, the same day or the same week, by the same KYC processor — a mule-onboarding episode.

Branch: SBI Aurangabad, branch code 10-824301
Sequential blocks: 4698129, 4698130, 4698131, …, 4698153 (25 in a row)
All tagged "COREPAY": Uniform remark across 702 NEFT debits — programmatic, not narrated

Spoofed e-commerce trade names obscuring single beneficiary

Account A's debits show two payee names — "SHOP BASKET" and "RAMSO ECOMMERCE PRIVATE LIMITED" — both resolving to the same destination account number 98561053319. NEFT/RTGS allow free-text beneficiary names; CBS only validates account number + IFSC. This is the abuse: present an "e-commerce" cover story in the narrative field, while every rupee funnels to one numbered destination. The names "SHOP BASKET" and "S H O P BASKET" (note the spaces) is a known evasion against simple string-match rules.

Two narrative names, one account: SHOP BASKET (96) + S H O P BASKET (31) + RAMSO ECOMMERCE PRIVATE LIMITED (46) → all to 98561053319
Name-variant evasion: "SHOP BASKET" vs "S H O P BASKET" — splitting to evade exact-match name-based monitoring rules

System-rendered dates inconsistent with embedded RTGS / NEFT timestamps

Both statements display all activity on a single date (Acct A: 31-Mar-2026 — note this is a future date relative to current system time; Acct B: 20-Apr-2026). Decoding the RTGS reference numbers in Acct A yields actual processing times of 01-Jul-2025. This is most likely a CBS statement-render artefact when transactions are exported across boundaries, but it has a security implication: investigators relying on transaction-date stamps in CBS-exported statements without cross-validating embedded UTR/RTGS reference timestamps will get the wrong forensic timeline.

Display date Acct A: 2026-03-31 (all 95,473 of 95,474 records)
True date from RTGS: 2025-07-01 15:10–20:24 IST
Implication: SBI statement-generation pipeline can mask true chronology when rendered statements are produced; cross-reference RTGS/NEFT UTR is mandatory
§ 04 — End-to-End Money Flow

The pipeline, visualised.

⬢ Mule Account ⬡ Aggregator / Pass-through ○ Victim / "Investor" ▣ Final Beneficiary
STAGE 1 — RECRUITMENT STAGE 2 — INFLOW (UPI smurfing) STAGE 3 — LAYERING (mule accts) STAGE 4 — OUTFLOW / PLACEMENT Investment-scam victims, task-scam workers, illegal-betting players ~241,191 distinct retail VPAs across 153 banks UPI micro-credits, median ₹300–₹500 ◆ 93.9% bot-generated notes UPI AGGREGATOR / SWITCH "TRANSFER FROM 4897735162098" Appears in 100% of credits in BOTH accounts ◆ likely API-driven payment switch MULE ACCOUNT A · "SBI 1 ID" 95,301 credits ◆ ₹6.98 Cr in ◆ 5h13m Retention: 0.03% ◆ Velocity: 51.3× MULE ACCOUNT B · "SBI 3 ID" 225,791 credits ◆ ₹15.38 Cr in ◆ 1 day Retention: 0.42% ◆ Velocity: 42.4× 5,005 shared senders FINAL DRAIN — Account A ONE ACCOUNT: 98561053319 173 × ~₹4 lakh RTGS via SHOP BASKET / RAMSO E-COM ₹6.98 Cr drained — placement / off-ramp stage FINAL DRAIN — Account B 42 ACCTS · SBI Aurangabad (10-824301) 702 × ~₹2 lakh NEFT, tag: COREPAY ₹15.31 Cr → mule fleet (further layering)

In aggregate: ₹22.36 crore moves through this two-account snapshot in concentrated bursts. Forty-three downstream accounts absorb the funds. The same upstream aggregator (4897735162098) services both. Five thousand of the retail "victim" VPAs appear in both inflow streams. The same SBI branch (Aurangabad 10-824301) hosts twenty-five sequentially numbered destination accounts. This is one operation, not two.

§ 05 — Transnational Markers

What makes this look Chinese MLaaS.

The Indian CERT-In, I4C (Indian Cyber Crime Coordination Centre), Enforcement Directorate, and FIU-IND have, over 2023–2025, repeatedly characterised a specific operating pattern of organised-crime cyber-fraud rings — predominantly Chinese-syndicate-operated, headquartered in scam compounds in Cambodia, Laos, Myanmar (the KK-Park / Sihanoukville / Bavet cluster), with on-the-ground recruitment partners in India. The activity in these two SBI accounts is highly consistent with that pattern.

Operational fingerprints

  • Industrial throughput — 5+ transactions per second sustained for hours. Implies automated UPI initiation, almost certainly by a payment-gateway-style switch (the "TRANSFER FROM 4897735162098" entity) connected to mule wallets via API or rooted Android farms.
  • Mule fleet at a single branch — sequential account numbers indicate a single onboarding episode. Indian mule recruitment is a known service-line of these syndicates, often via Telegram channels offering "easy-earning" or "USDT exchange" gigs to college students and the unemployed.
  • Pass-through accounts at near-zero retention — the mule never benefits beyond a small handler fee. They are rented for a session.
  • Bot-generated note tokens — a 4-char random alphanumeric is what scam-CRM and payment-aggregator code generates as a fallback reference. No human handwrites k9go.

Likely upstream predicate offences

  • Pig-butchering ("Sha Zhu Pan") investment scams — victims onboarded via WhatsApp/Telegram into fake stock-trading or crypto-trading apps, asked to deposit "investment" funds via UPI in small lots.
  • Task-based scams — victims told to "like videos", "rate restaurants", or "do tasks" for small commissions; later asked to "prepay" via UPI to "unlock higher tasks".
  • Illegal online betting and rummy/colour-prediction games — many such platforms route INR collection through UPI mules.
  • USDT off-ramping — final beneficiaries (e.g. "SHOP BASKET", or the 42 Aurangabad accounts) likely convert INR into USDT via peer-to-peer crypto exchanges, completing the cross-border transfer outside the banking system.
  • "Digital arrest" / fake-officer extortion — victims coerced under threat of fake police/CBI cases to UPI-transfer money.
Why "as a service": The fact that 5,005 unique retail senders sent UPI credits to both Account A and Account B independently, via the same upstream switch (4897735162098), strongly suggests the underlying mule infrastructure is rented to multiple downstream fraud rings simultaneously. The same payment switch services scam ring α (whose victims flow through Account A) and scam ring β (Account B), pooling victim deposits before disbursing to ring-specific final-drain accounts. This is the defining property of Money-Laundering-as-a-Service: the launderers are not the fraudsters; they sell a laundering pipeline to fraudsters as a managed service, taking a commission per rupee processed.
§ 06 — Detection Architecture

How SBI should see this — in real time, before the drain.

The detection problem is not one of clever rules; it is one of shifting the temporal window from end-of-day batch to streaming, combining behavioural baselines with network-topology features, and giving the FCMS engine enough latency budget to actually act. Both accounts described here would have been intercepted in under thirty minutes by a properly tuned streaming detection stack. They were not.

Layered defence model

LayerTime-budgetPurposeOutcome
L0 — Onboarding / KYC re-riskT+0 (account opening)Flag mule-fleet onboarding episodes at the branch levelHold first-credit drawdown
L1 — Streaming velocity rules≤ 1 minuteDetect burst inflow / outflow events at the account levelTrigger soft-block on outflows above ₹50k
L2 — Behavioural-baseline rules5–15 min rollingDetect deviation from the account's own historical profileGenerate Level-1 AML alert; require step-up authentication on debits
L3 — Network/Graph analytics15 min – 4 hrsDetect inter-account funnel structures: shared senders, sequential mule numbering, common upstream aggregatorsGenerate STR / EFRMS hold; freeze inter-account transfer ability pending review
L4 — Daily reconciliationT+24 hrsConfirm STR filings to FIU-IND, share with I4C if predicate offence suspectedRegulatory disclosure + law-enforcement co-ordination

The three feature families SBI's FCMS needs

A — Transactional velocity features (per account, rolling)

B — Behavioural / distributional features (compared to baseline)

C — Network / graph features (account ↔ counterparty topology)

§ 07 — Detection Rules

23 concrete rules SBI can deploy today.

Each rule below is written to be implementable in a standard transaction-monitoring engine (BAE, AMLOCK, FCM, or in-house) with parameters tuned to the throughput observed in the two analysed accounts. Severity is the recommended initial alert level. False-positive control is via a 30-day calibration window before production cut-over.

R-01
Critical

Smurfing — Micro-Credit Velocity

≥ 500 incoming UPI credits in any rolling 60-minute window where median ticket ≤ ₹2,000 and ≥ 80% of credits fall in ten round amounts (₹100/200/300/500/1k/2k/3k/5k/10k).

Why it catches thisAcct A produced 95,301 credits in 5h13m at median ₹500 — over 18,200/hour. Rule fires at minute 2.
ActionSoft-block all outflows > ₹50k; require branch-level relationship-manager call-back.
R-02
Critical

Pass-Through Retention Anomaly

Outflow ≥ 95% of inflow in any 24-hour rolling window, with absolute inflow ≥ ₹10 lakh, AND account age < 12 months OR declared "purpose" is salary/savings.

Why it catches thisBoth accounts retained < 1% of inflow — defining the funnel.
ActionL3 AML alert; hold subsequent outflows pending source-of-funds documentation.
R-03
Critical

Common-Source-Funnel Cluster

Two or more customer accounts receive ≥ 80% of their UPI inflow from the same upstream "TRANSFER FROM" account in any 7-day window, with combined inflow ≥ ₹50 lakh.

Why it catches thisBoth accounts have 4897735162098 as the sole upstream — would have been the highest-priority alert.
ActionSuspend both customer accounts; investigate upstream account; escalate to FIU-IND.
R-04
Critical

Sequential-Number Mule Cluster

Same branch shows ≥ 8 accounts opened within any 30-day window, with account numbers within a 30-number contiguous range, where any 3 of them receive > ₹5 lakh inflow within 90 days of opening.

Why it catches thisAcct B's 42 destinations include 25 contiguous accounts (4698129→4698153) at branch 10-824301. Rule would have flagged the onboarding episode itself.
ActionBranch-manager review of all such accounts; KYC re-verification (in-person, with utility-bill cross-check).
R-05
High

Sub-Threshold RTGS Sweeping

≥ 20 outbound RTGS transfers in 24 hrs, each within a tight ±5% band of an internal scrutiny threshold (₹2 L, ₹4 L, ₹5 L, ₹9 L, ₹49 L are common syndicate setpoints).

Why it catches thisAcct A: 173 RTGS in 5 hrs, all within ₹4,00,113–₹4,18,378 (a 4.5% band). Acct B: 702 NEFT clustered at ₹2 lakh.
ActionL2 alert; halt subsequent RTGS until call-back.
R-06
High

Diverse-Sender / Single-Beneficiary Asymmetry

Distinct credit-senders in rolling 24h ≥ 100 × distinct debit-beneficiaries in same window, AND inflow ≥ ₹10 lakh.

Why it catches thisAcct A: 68,682 senders → 1 beneficiary account. Ratio of 68,682 (rule threshold ≥ 100).
ActionL2 alert; soft-block outflows above ₹25k pending review.
R-07
High

Bot-Note Concentration

≥ 70% of UPI-credit narration fields in last 1,000 txns match the regex ^[a-z0-9]{2,4}$ (random short tokens).

Why it catches thisAcct A: 93.9% match this regex. Rule fires within the first ~500 credits.
ActionL2 alert; behavioural anomaly tag.
R-08
High

Trade-Name Spoofing

Same destination account-number appears in outbound payments under ≥ 2 distinct beneficiary-name strings within 7 days, where Levenshtein/Jaro-Winkler distance between names > 0.4 (i.e., they are clearly different names not just typos).

Why it catches this"SHOP BASKET" + "S H O P BASKET" + "RAMSO ECOMMERCE PRIVATE LIMITED" all → 98561053319.
ActionL2 alert; verify beneficiary identity at remitter side.
R-09
High

Cross-Account Sender Overlap

Two SBI customer accounts share ≥ 500 common third-party-VPA senders within a 30-day window.

Why it catches thisAccts A and B share 5,005 senders. Far above any organic overlap (a single retail customer would share ≤ 5 with any random peer).
ActionL3 graph-cluster alert; subject both accounts to enhanced due diligence.
R-10
High

Sub-1-Second Inter-Credit Gap

Median inter-arrival time of UPI credits in any rolling 5-min window < 500 ms, over ≥ 100 credits.

Why it catches this5.07 txns/sec average in Acct A = 197 ms average gap. Fires immediately.
ActionReal-time rate-limit on incoming UPI to the account; escalate.
R-11
High

Uniform-Narration NEFT Burst

≥ 50 outbound NEFT in 24 hrs with identical narration field (e.g., "COREPAY", "PAYOUT", "REFUND") to ≥ 20 distinct beneficiary accounts.

Why it catches this702 NEFT debits in Acct B, all tagged "COREPAY", to 42 beneficiaries.
ActionL2 alert; require declaration of payee relationship.
R-12
High

Phone-VPA Sender Dominance

≥ 85% of UPI credit senders in last 1,000 txns use bare phone-number VPAs (^[6-9]\d{9}$ prefix) and credit ticket ≤ ₹5,000.

Why it catches thisAcct A: 88.7% phone-number VPAs at micro-ticket — classic scam-victim profile.
ActionL2 alert; correlate with I4C reported VPAs.
R-13
Medium

Working-Hours Activity Burst

≥ 80% of total monthly transaction count happens within a single 6-hour window in a single calendar day.

Why it catches thisAcct A's entire 95k+ credits fit in 5h13m. Acct B's 226k fit in one calendar day.
ActionL1 behavioural-baseline alert; require call-back on next outflow.
R-14
Medium

Round-Amount Concentration

≥ 75% of credits in last 500 txns are exact round amounts (multiples of ₹100 ≤ ₹10k).

Why it catches thisTop-10 round amounts cover 93.4% of Acct A credits.
ActionBehavioural anomaly tag; feed into composite risk score.
R-15
Medium

Geographic Sender Diversity Anomaly

Distinct sender-IFSC count in any rolling 1-hour window > 50, where the customer's declared profile is "salaried individual" or "small-trader".

Why it catches thisAcct A: 120 distinct sender banks. A salaried individual receives money from 1–3 banks normally.
ActionL1 alert; KYC profile re-verification.
R-16
Medium

Newly-Opened Account / First-Month Volume Anomaly

Account opened within last 90 days, cumulative inflow in any 30-day window > 20× declared expected monthly turnover (from account-opening form) OR > ₹25 lakh, whichever lower.

Why it catches thisThe 42 mule accounts at SBI Aurangabad are almost certainly new accounts pushing first-month volume.
ActionL2 alert; freeze outflows until source-of-funds documented.
R-17
High

Same-Day Open-and-Drain

Any account where first significant inflow (> ₹1 lakh) and first outflow occur on the same calendar day AND outflow ≥ 80% of inflow.

Why it catches thisBoth accounts' real activity is concentrated to single-day burst patterns with near-total drain.
ActionL2 alert; require RM call-back before any subsequent outflow.
R-18
High

Sequential-Account Outflow Pattern

Outbound transfers to ≥ 10 destination accounts whose account numbers fall within a contiguous range of 50, at the same branch IFSC, within 24 hours.

Why it catches thisAcct B's 42 destinations include 25 contiguous accounts at one branch.
ActionL3 graph alert; freeze outflows to that IFSC range; investigate cluster.
R-19
Medium

I4C / Cybercrime VPA Hit-List Match

Inflow to customer account from any VPA appearing on the I4C / 1930-helpline known-victim list within last 12 months — accumulate count.

Why it catches thisProvides external validation: if 100+ of an account's senders have filed cybercrime FIRs, the account is the mule.
ActionL3 alert + immediate STR filing; coordinate with state cyber-cell.
R-20
Medium

Beneficiary-Name vs. Account-Number Mismatch Pattern

≥ 5 distinct outbound beneficiary-name strings paired with the same account number over 30 days.

Why it catches thisOne account (98561053319) received under 3 distinct narrative names from Acct A.
ActionL1 alert; cross-reference beneficiary CBS-name against narrative.
R-21
High

VPA-Velocity Across SBI Footprint

Any third-party VPA sending to ≥ 3 distinct SBI customer accounts within 7 days, with cumulative amount ≥ ₹50,000.

Why it catches thisThe 5,005 VPAs sending to both Acct A and Acct B would each fire this rule individually.
ActionFlag the sending VPA as likely-victim or runner; alert downstream receiving SBI accounts.
R-22
Medium

Statement-Date / UTR-Date Inconsistency

Forensic rule run on statement-export: where statement-rendered txn date differs from RTGS/NEFT UTR embedded date by > 24 hrs for ≥ 5% of records.

Why it catches thisAcct A: displayed date 31-Mar-2026, embedded RTGS epoch 01-Jul-2025. Detects either CBS render error or statement-tampering by parties handling the export.
ActionInternal IT data-integrity escalation; for investigators, mandate UTR-based timeline reconstruction.
R-23
Critical

Composite Mule-Account Index (CMAI)

Weighted score across R-01 through R-22. If CMAI ≥ 65/100 within any rolling 24-hour window, auto-trigger Level-3 freeze.

Why it catches thisBoth analysed accounts would have scored > 90/100 within their first hour of burst activity. The composite is what defeats single-rule evasion.
ActionAutomatic account freeze of all non-essential debits; mandatory RM call-back; STR.
§ 08 — Real-Time Intervention Playbook

What action follows what alert.

Response tiers

TierTriggerSystem actionCustomer-visibleSBI internal
T1 — Soft Watch Any L1 rule fires once None automated. Logged. None FCMS dashboard tag; RM notified
T2 — Outflow Throttle L2 rule fires OR 2+ L1 rules in 24 hrs Cap RTGS/NEFT/IMPS outflows at ₹49,000/day pending review "For your protection, larger outflows require branch verification today" L2 alert in AMLOCK / FCM; analyst review within 2 hrs
T3 — Outflow Freeze (Reversible) L3 rule fires OR CMAI ≥ 65 Block all RTGS/NEFT outflows; UPI capped at ₹5,000/day; cards blocked SMS + email: "Please contact your home branch / call 1800-XXXX immediately to verify recent activity" L3 alert; mandatory analyst + RM call-back within 30 min; STR drafted
T4 — Full Freeze + Disclosure T3 not resolved in 24h OR confirmed predicate offence All outflows frozen; account in "Section 102 CrPC posture" Branch-counter notice only; no app/online access STR filed with FIU-IND; intimation to I4C / NCRP; police lien if applicable

30-minute intervention window: a worked timeline

For an account profile matching the two analysed here, a properly-instrumented monitoring stack achieves the following:

Time elapsedCumulative activityDetection stateAction
T+0 minFirst 50 credits, total ₹25kBelow thresholdsLogged
T+2 min500 credits, ₹2.5 LR-01 fires (smurfing velocity), R-10 fires (sub-second inter-arrival)T2 throttle: outflow cap ₹49k/day, analyst paged
T+8 min2,000 credits, ₹10 LR-07 fires (bot-notes ≥ 70%), R-12 fires (phone-VPAs ≥ 85%), R-14 fires (round-amount > 75%). CMAI ≥ 55.Analyst reviewing — RM notified
T+15 min5,000 credits, ₹25 L. First debit attempt of ₹4 L.R-06 fires (sender-asymmetry), R-15 fires (geo-sender diversity). CMAI ≥ 75.T3 freeze: debit blocked at switch; account marked.
T+30 minRM has called account holder; cannot verify; cannot reach declared address.R-09 / R-21 fire on cross-account graph.T4: STR drafted, FIU-IND alerted within EOD.

Net effect: ~₹6.7 Cr of layering blocked at the SBI rails. Recovery to victims becomes possible because funds are still in the system.

§ 09 — Governance & Process

What rules alone can't fix.

Detection is necessary but not sufficient. The two accounts in this analysis were not blocked because something in SBI's monitoring stack, escalation chain, or branch-level KYC process failed to act on signals that should have been present. The following are the structural recommendations.

1. Onboarding hardening

2. Real-time data plumbing

3. External integrations

4. Branch-level accountability

5. Customer education & deterrence

One sobering note: the patterns in these statements would have triggered, conservatively, six to eight independent rules in any commercial transaction-monitoring system that has them switched on with reasonable thresholds. The activity nevertheless completed. The bottleneck is not algorithmic. It is operational: the latency from alert generation → analyst review → action far exceeds the velocity of the laundering pipeline. Until SBI compresses that latency below the syndicate's drain time (about 30 minutes), the syndicate will continue to win.
§ 10 — Closing Note

The forensic posture going forward.

These two account statements describe one fragment of a much larger operating system — a payment-aggregator-shaped laundering pipeline servicing multiple downstream fraud rings, harvesting from a hundred-thousand-strong retail-victim pool, drained into a small fleet of branch-clustered terminal mule accounts that almost certainly off-ramp into USDT or shell-company invoices abroad. The actors are skilled. The pipeline is robust. The unit economics are favourable.

The defence against this is not exotic. The rules listed in §07 are individually unremarkable; their combination, applied to streaming data with low-latency action, is what changes the equation. Every one of the eleven patterns identified in §03 leaves a trace that is mathematically obvious in the data. SBI has the data. The question is whether the institutional posture is to wait for the regulator to ask, or to interdict at the first 500 random-token-noted micro-credits.

The two accounts described here moved ₹22.36 crore in concentrated bursts. The wider operation they belong to moves orders of magnitude more, every day, across the Indian banking system. A bank that detects this in fifteen minutes saves victims; a bank that detects it at end-of-day batch produces an STR after the fact. The technology gap between these two postures is not large. The will gap, sometimes, is.


Appendix — quick reference: indicators present in this case

IndicatorAccount AAccount B
Smurfing (R-01)
Pass-through retention < 1% (R-02)✓ (0.03%)✓ (0.42%)
Common upstream funnel-source (R-03)✓ (same 4897735162098)
Sequential mule cluster on outflow (R-04, R-18)✓ (25 contig. at Aurangabad)
Sub-threshold RTGS sweeping (R-05)✓ (~₹4L band)✓ (~₹2L band)
Diverse-sender / single-beneficiary (R-06)✓ 68,682:1✓ 172,509:42
Bot-notes ≥ 70% (R-07)✓ (93.9%)✓ (similar)
Trade-name spoofing (R-08)
Cross-account sender overlap (R-09)✓ (5,005 shared)
Sub-second credit gap (R-10)✓ (5 tps)
Uniform-narration NEFT (R-11)✓ ("COREPAY")
Phone-VPA dominance (R-12)✓ (88.7%)
Working-hours burst (R-13)✓ (5h13m)✓ (1 day)
Round-amount concentration (R-14)✓ (93.4%)