Sign in Join
  • HOME
  • Sector Updates
    • Compliance Management
    • Onboarding Verification
    • Financial Crime/Fraud Prevention
    • Identification/Background checks
    • AI & Automation
    • Reporting
    • Transaction Monitoring
    • Communications Compliance
    • Risk Management
    • Cybersecurity/Information Security
  • Legislation Updates
    • KYC
    • AML
    • MiFID II
    • AIFMD
    • Basel III
    • PSD2
    • GDPR
    • Other
  • Features
  • Industry Research
  • Events
    • AML & FinCrime Tech Forum
    • AML & FinCrime Tech Forum USA
    • ESG FinTech Summit
    • Global RegTech Summit – Europe
    • Global RegTech Summit – USA
  • RegTech100
  • Market Maps
    • ESG FinTech
  • Newsletter
  • Courses
    • Professional RegTech Certificate
  • About Us
Sign in
Welcome!Log into your account
Forgot your password?
Sign up
Welcome!Register for an account
A password will be e-mailed to you.
Password recovery
Recover your password
Search
  • Sign in
  • Contact
  • LOG IN
  • REGISTER
Welcome! Log into your account
Forgot your password?
Register for an account
A password will be e-mailed to you.
Recover your password
RegTech RegTech RegTech Analyst
  • HOME
  • Sector Updates
    • Compliance Management
    • Onboarding Verification
    • Financial Crime/Fraud Prevention
    • Identification/Background checks
    • AI & Automation
    • Reporting
    • Transaction Monitoring
    • Communications Compliance
    • Risk Management
    • Cybersecurity/Information Security
  • Legislation Updates
    • KYC
    • AML
    • MiFID II
    • AIFMD
    • Basel III
    • PSD2
    • GDPR
    • Other
  • Features
  • Industry Research
  • Events
    • AML & FinCrime Tech Forum
    • AML & FinCrime Tech Forum USA
    • ESG FinTech Summit
    • Global RegTech Summit – Europe
    • Global RegTech Summit – USA
  • RegTech100
  • Market Maps
    • ESG FinTech
  • Newsletter
  • Courses
    • Professional RegTech Certificate
  • About Us
Home Deal Updates Companies Seven quotes that expose how fraud markets really work

Seven quotes that expose how fraud markets really work

February 11, 2026
fraud

Talking to fraud enablers can feel like watching a foreign film with badly translated subtitles. The tone is off, the motivations are murky, and it is rarely clear where the story is heading.

Yet, just as imperfect subtitles never stopped cinephiles from appreciating Les Enfants du paradis, unconventional Telegram channels have not stopped threat intelligence professionals from learning more about fraud, said Resistant AI.

Engaging directly with criminals offers a rare window into how bad actors think, communicate, and operate. Understanding these dynamics brings financial institutions one step closer to disrupting fraud before it scales.

“Don’t worry bro, I will never scam you”

In underground markets, trust still matters. Buying fake documents or verified accounts comes without regulation or consumer protection, relying entirely on negotiation between anonymous actors. Surprisingly, many account farmers deliver on their promises more often than they cheat. This is not altruism but strategy. Farmers want repeat customers and long-term relationships. The more reliable the seller, the more fraud they ultimately enable. Professionalism, in this context, becomes a risk multiplier.

“My partner (tech support) will send you an account, you can ask him all technical questions, he will help”

Fraud enablement has evolved beyond simple transactions. Many farmers now offer full solution engineering, complete with technical support and onboarding walkthroughs. They coach buyers on reducing risk and avoiding detection, not only to protect customers, but to protect their own products from scrutiny. This level of service signals growing sophistication and reinforces the need for defence-in-depth approaches rather than single control checks.

“Account owner don’t have access to him”

One of the most disturbing insights is the use of real identities without the individual’s knowledge. Accounts may be opened using stolen or leaked personal data, with the legitimate person unaware the account even exists. On paper, these accounts appear entirely valid, rendering basic identity checks ineffective. The consequences are severe, from wrongful accusations to regulatory exposure, underscoring that identity theft remains far from a victimless crime.

“It’s not included but when you need just text me, I will provide you from somewhere…but yeah they will not ask”

Farmers show remarkable confidence that platforms will not request additional documentation once an account is verified. This suggests an industry-wide reliance on one-time checks. Whether this confidence is earned or opportunistic, it highlights a weakness: dormant or suspicious accounts may escape further scrutiny, allowing fraud to persist undetected.

“We make many accounts, glad to cooperate”

Scale is central to the threat. Some farmers advertise thousands of offerings across hundreds of platforms, focusing less on industries and more on bypassing onboarding controls. Once a relationship is established, upselling is aggressive, mirroring legitimate customer success teams. This readiness to operate at volume fuels serial fraud and coordinated attacks.

“Made to order, we’ll make it in 1-3 days”

On-demand account creation is increasingly preferred over holding dormant stock. This reduces the risk of pre-emptive closures and reflects a learning, adaptive criminal ecosystem. Farmers willing to dictate turnaround times demonstrate confidence, experience, and intent to operate long-term.

“All private channel files different than site, we can’t share real docs on site”

Finally, conversations reveal the rise of closed “identity markets” trading real documents and liveness assets sourced from data leaks, coercion, or theft. With thousands of identities available for minimal cost, identity verification alone is no longer sufficient. Contextual analysis and deeper behavioural signals are essential.

In conclusion, financial crime intelligence is not just about monitoring markets or collecting data. Embedding within these conversations exposes realities that theory alone cannot. Speaking directly with fraud enablers reveals how quickly criminal practices professionalise, scale, and adapt, reinforcing the urgency for equally adaptive defences.

Find the full post here. 

Read the daily RegTech news

Copyright © 2026 RegTech Analyst

Enjoyed the story? 

Subscribe to our weekly RegTech newsletter and get the latest industry news & research

Copyright © 2018 RegTech Analyst

Investors

The following investor(s) were tagged in this article.

  • TAGS
  • account farming
  • AML
  • cybercrime
  • Digital identity
  • financial crime.
  • FinTech security
  • fraud intelligence
  • Fraud prevention
  • identity theft
  • KYB
  • KYC
  • payments fraud
  • RegTech
  • threat intelligence
Previous articleUK firms dominated European RegTech market in 2025 as regional deal activity held steady
Next articleWhat the SEC’s 2026 priorities mean for compliance teams
dwillis

RELATED ARTICLESMORE FROM AUTHOR

AML
AML

Why enterprises are adopting no-code AML

prediction
Companies

Prediction markets face legal crossroads in 2026

Experian
Companies

Experian acquires AtData to boost fraud defence

Latest Analysis

Companies

Mastercard launches CBDC partner programme

August 21, 2023
Companies

Spending on RegTech expected to reach $130bn by 2025

March 30, 2021
Advisors

FinTech community welcomes UK FinTech review but fear more must be...

February 26, 2021
Cybersecurity/Information Security

Cybersecurity market expected to be worth $199.98bn by 2025

February 25, 2021
AML

270 service deposit addresses drive more than half of cryptocurrency money...

February 17, 2021
  • Term & Conditions
  • Privacy Policy
  • Contact Us
© Copyright © 2021 RegTech Analyst. All rights reserved.
83104
83098

50,000+ RegTech leaders get exclusive industry stories delivered every week

MORE STORIES
Companies

Iron Mountain expands policy management platform ahead of GDPR

April 05, 2018
Companies

IriTech and Gigzi working on iris-based security solution

September 25, 2018