Multi-accounting, often referred to as bonus abuse in regulated financial ecosystems, is the deliberate creation, use, or control of multiple accounts by a single individual or colluding group to exploit promotional incentives, evade risk controls, or obscure transactional behaviour.
While commonly associated with online gaming or promotional platforms, the practice has direct implications for AML/CFT risk because it offers a mechanism to disguise identity, fragment illicit flows, and circumvent monitoring thresholds.
In the AML/CFT context, multi-accounting is treated as a structural red flag. It enables criminals to dilute visibility over fund sources, repeatedly exploit onboarding incentives for laundering purposes, and create networks of seemingly unrelated accounts to disperse proceeds of crime.
Financial institutions, fintechs, PSPs, and VASPs, therefore, view multi-accounting as a behavioural typology that must be identified, contained, and monitored.
Explanation
Multi-accounting represents a convergence of identity manipulation, behavioural fraud, and financial crime.
At its core, the practice exploits gaps in identity verification, device fingerprinting, behavioural analytics, and promotional controls.
The perpetrator may create these accounts directly or may coordinate with third parties (mules) to open and operate accounts on their behalf.
The motivations vary, but typically fall into two buckets:
Exploiting bonuses, rewards, or referral incentives in a manner that violates platform policy.
Using multiple accounts to fragment, conceal, or reroute funds in ways that evade AML detection.
From an AML/CFT lens, bonus abuse is not merely a promotional fraud scenario.
It is a structural entry point for laundering illicit proceeds, testing systems for weaknesses, and building operational cover for future criminal activity.
When a network of accounts behaves as a coordinated cluster, the institution faces elevated exposure to layering schemes, mule activity, and regulatory non-compliance.
Multi-Accounting in AML/CFT Frameworks
Multi-accounting intersects with AML/CFT regulatory expectations because it directly impacts the transparency and integrity of customer identity, account usage, and transaction monitoring.
Key intersections include:
Weaknesses in KYC processes allow repeated onboarding by the same actor through manipulated identity attributes.
Transaction monitoring systems detect anomalous fund flows when multiple accounts are used to fragment deposits and withdrawals.
Referral systems and promotional bonuses are exploited to create circular fund movements that conceal beneficial ownership.
Bonus exploitation can serve as a cover for laundering small-value payments across many accounts (smurfing).
Risk scoring engines must account for behavioural patterns rather than relying solely on static profile data.
In regulated environments, multi-accounting can constitute grounds for suspicious transaction reporting when accompanied by unexplained value transfer, patterns inconsistent with customer profiles, or links to known mule networks.
Key Components of Multi-Accounting (Bonus Abuse)
Victimisation and Predicate Crimes
Multi-accounting can be linked to several predicate offences, depending on how the accounts are used.
These include:
Fraud and identity theft, where real identities are misused to create scalable account networks.
Cyber-enabled crime, particularly bot-driven account creation or credential stuffing.
Tax evasion and underground economic activity are facilitated by anonymous wallets or prepaid instruments.
Money laundering involves the distribution and re-aggregation of illicit proceeds.
Terrorist financing typologies where small-value transactions are obscured across multiple accounts.
Common Stages and Behaviours
While not a three-stage model like classic money laundering, multi-accounting typically follows predictable behavioural steps:
Account Creation:
Using synthetic identities or manipulated KYC data.
Leveraging VPNs, disposable devices, or virtual numbers.
Exploiting gaps in biometric or document verification systems.
Account Conditioning:
Completing minimal activity to gain trust scores.
Claiming bonuses or incentives.
Initiating microtransactions to test controls.
Coordinated Exploitation:
Redeeming bonuses across multiple accounts.
Transferring funds between accounts for layering.
Withdrawing accumulated incentives or laundered funds into a central account.
Common Methods & Techniques
Perpetrators employ a range of tactics to conceal ownership and manipulate account ecosystems:
Use of identity manipulation (synthetic, stolen, or altered documents).
Multiple devices or emulators to simulate unique customers.
VPNs, proxy networks, and IP rotation tools to mask location.
Coordinated mule networks that create or operate accounts.
Rapid onboarding using automated scripts or bots.
Circular transaction patterns to route funds through bonus-receiving accounts.
Use of payment instruments that support semi-anonymous funding.
These techniques make traditional rule-based AML models insufficient, increasing the need for behavioural analytics and device-level intelligence.
Risk Indicators and Red Flags
Institutions should treat multi-accounting as a behavioural AML/CFT red flag.
Typical indicators include:
Multiple accounts sharing the same device fingerprint or IP pattern.
Use of identical or nearly identical personal details across accounts (email variations, slight name changes).
Repeated signups using prepaid mobile numbers or disposable email services.
Clusters of accounts exhibiting identical login, spending, or withdrawal patterns.
Rapid and uniform redemption of bonuses followed by immediate withdrawals.
Transaction flows that repeatedly converge into a few central accounts.
Dormant accounts are suddenly activated in coordinated sequences.
Mismatches between KYC attributes and behavioural signals (e.g., declared residence vs device geolocation).
Examples of Multi-Accounting Scenarios
Bonus Abuse for Laundering Small-Value Funds
A criminal creates 50 accounts using synthetic identities, claims new-user bonuses, deposits small amounts of illicit cash, and withdraws the combined funds into a central wallet.
The bonus layer helps disguise the illicit portion of the funds.
Coordinated Account Rings Using Mules
An organised network recruits individuals to open accounts and hand over access credentials.
These accounts are then used to disperse and re-route funds from online scams to obscure wallet trails.
Crypto Exchange Exploitation
A fraudster opens multiple accounts on a VASP, uses each to perform small crypto-fiat conversions, and aggregates withdrawals into one external wallet.
The aim is to avoid triggering threshold-based monitoring.
Gaming-Based Laundering via Bonus Exploitation
Multi-accounts are created to claim promotional credits, which are used to place offsetting bets or low-risk wagers.
The returned funds appear as legitimate gaming proceeds, providing an integration mechanism.
Impact on Financial Institutions
Multi-accounting and bonus abuse create substantial regulatory, operational, and financial consequences:
Elevated AML/CFT risk due to obscured customer identity and increased exposure to mule networks.
Higher operational costs stemming from investigative workloads, remediation, and system enhancements.
Reputational risk when platforms are perceived as vulnerable to abuse.
Potential regulatory action for weak KYC, poor transaction monitoring, or inadequate fraud prevention controls.
Losses from bonus exploitation, chargebacks, and fraudulent withdrawals.
Distortion of behavioural analytics and risk models due to polluted customer datasets.
Institutions that fail to detect multi-accounting often face compound risks: fraud exposure in the short term and AML enforcement consequences in the long term.
Challenges in Detecting & Preventing Multi-Accounting
Key challenges include:
Technological sophistication, such as device spoofing, IP masking, and automated onboarding scripts.
Fragmentation of activity across many accounts, limiting visibility through traditional rule-based controls.
Incomplete or low-quality KYC datasets that enable identity manipulation.
High transaction volumes obscure small-value laundering.
Difficulty distinguishing legitimate shared-device households from malicious clusters.
Dynamic typologies where criminals adapt quickly to detection patterns.
Regulators increasingly expect institutions to maintain capabilities that identify coordinated account misuse, especially in high-risk sectors such as fintech, gaming, PSPs, VASPs, and online marketplaces.
Governance expectations include:
Strong KYC verification that minimises identity manipulation risks.
Device analytics to detect shared or spoofed devices.
Behavioural monitoring that identifies patterns indicative of account rings.
Periodic risk assessments that explicitly include multi-accounting typologies.
Robust SAR/STR reporting when multi-account activity intersects with suspicious fund movements.
Board-level oversight of fraud and AML convergence risks.
Regulators consider multi-accounting a cross-domain threat involving fraud, AML, and cybersecurity.
Institutions must therefore adopt integrated detection models rather than treating the issue as a siloed fraud problem.
Importance of Addressing Multi-Accounting in AML/CFT Compliance