Secure verifications for every industry
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.

For years, financial institutions operated under a comfortable paradigm: if a customer was defrauded, the loss was theirs to bear, and compliance meant little more than following a checklist. That era is over.
At the centre of today’s fraud epidemic is the Mule Account, a critical component in illicit financial schemes. A mule account is a bank account, often opened in the name of a real, seemingly legitimate person, that is used to receive stolen funds before passing them on to criminals. The account holder may be a willing accomplice, a vulnerable individual who has been deceived into participating, or a victim whose identity has been stolen entirely. Without mule accounts, most payment fraud simply could not happen.
As 2026 approaches, regulators worldwide are holding banks directly responsible for the mule accounts they open. The UK Payment Systems Regulator (PSR), the EU’s Third Payment Services Directive (PSD3), and evolving interpretations of US Regulation E are all moving in the same direction: away from simply checking whether banks followed a process, and toward assigning them direct financial losses when fraud occurs on their watch. Previously, regulators focused on whether a bank had the right procedures in place. Now, they are focused on outcomes and holding institutions financially accountable when those outcomes fail. The question for every institution is no longer “did we follow the rules?”, it is “did we stop the fraud?”
The financial sector is undergoing a structural transition where the cost of "bad compliance" is no longer just a regulatory fine; it is a direct, repeatable operational loss on the P&L.
The reason mule accounts are so hard to catch comes down to how banks currently verify identity. Traditional compliance checks rely on static data (a passport number, an address, a date of birth), information that can be faked, stolen, or manufactured. A fraudster who presents convincing-looking documents passes the check and walks away with a legitimate account.
What the industry increasingly needs is cryptographic proof of identity: a mathematically verifiable confirmation that someone is genuinely who they claim to be, one that cannot be forged or replicated. The difference is significant. Checking static data is like accepting a photocopy of an ID. Cryptographic proof is like having a tamper-proof system verify that ID in real time. The first can be fooled; the second cannot.
This gap explains why two of the most costly fraud types continue to flourish:
In both cases, the principle is the same: prevent the mule account from being opened in the first place, and much of the fraud never happens.
Until recently, when a customer was defrauded through a payment transfer, the receiving bank, the one that opened the mule account, faced no financial penalty. That has changed fundamentally.
The UK Payment Systems Regulator has introduced a 50/50 liability split for APP fraud: when fraud occurs, both the bank that sent the payment and the bank that received it bear half the loss. Previously, the receiving bank had no financial exposure whatsoever. Now, every account your institution opens carries direct financial liability if it turns out to be a mule. This is not a theoretical risk; it is a structural change to how losses are distributed across the banking system.
In the European Union, PSD3 and the Instant Payments Regulation require banks to implement Verification of Payee (VoP), a real-time check confirming that the name on a payment matches the account it is being sent to. If a bank fails to catch an impersonation attempt or a name mismatch, the full cost of that fraud falls on the Payment Service Provider (PSP), the bank, or the financial technology company that processed the payment.
In the United States, the growing sophistication of synthetic identity fraud is prompting regulators to reconsider what counts as an “unauthorised” transfer under Regulation E, the federal rule governing electronic fund transfers. As fabricated identities become harder to distinguish from real ones, the defence of “the customer authorised this transfer” becomes increasingly difficult to sustain when the “customer” was a synthetic identity that the bank itself approved.
Want the full regulatory breakdown across PSR, PSD3 and Reg E, with a cost model you can take straight to the board? Download the 2026 Compliance & Liability Playbook →
Beyond direct fraud losses, the traditional approach to compliance carries a substantial and often underestimated hidden cost, one that comes directly from how identity verification currently works.
Under today's model, companies and institutions are legally required to collect and retain large amounts of customer personal data as part of their Know Your Customer (KYC) and their Know Your Business (KYB) obligations: copies of identity documents, addresses, financial histories, and more. Because each institution collects this data independently and must hold it for regulatory audit purposes, it accumulates in large, centralised databases owned and managed by the bank itself. This creates what is sometimes called the 'centralised model', and it comes with three compounding financial burdens:
Sticking with a centralised architecture isn't just inefficient anymore; it's costing a fortune. For a mid-sized growth company managing 1.5 million records, the Cost of Inaction is estimated to be around $2.22 million annually, not in regulatory fines, but in the accumulated weight of fraud losses, data breach exposure, and compliance overhead. For a large company managing 10 million records, the Cost of Inaction is then estimated to be $7.85 M annually and above.
The strategic response emerging across the industry is a shift to a decentralised identity architecture, a model where identity is verified through mathematical proof rather than data that can be stolen or forged. The practical benefits fall into three areas:
The question is no longer whether to act. It's how fast.
The regulatory direction is set. The financial exposure is quantifiable. The technology to address it exists and can be deployed without replacing existing infrastructure. Institutions that move early will absorb lower costs, carry less liability, and be better positioned when regulators move from guidance to enforcement.
For the full cost model, the step-by-step implementation roadmap, and a competitive comparison of available solutions, download the 2026 Compliance & Liability Playbook.
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.