Demo  Arrow | GitHub | Docs | API reference | Contact | Resources
tirreno - Open-source security framework Home Use cases How it works Pricing About
Arrow Download

tirreno » .com/bat » When your platform becomes the laundering machine






Resources

tirreno
.com/bat




When your platform becomes the laundering machine

January 12, 2026 · 4 min read

A fraudster creates a vacation rental listing on your platform. The property may or may not exist. The nightly rate is higher than comparable listings in the area. A series of bookings arrive from accounts with thin histories and disposable email addresses. The bookings are paid with stolen credit cards or funds that need to be moved through a legitimate-looking channel. Your platform processes the payments, takes its cut, and pays the rest to the host. From an operational perspective, everything looks normal: a listing, a booking, a payout. There is no complaint and no obvious victim.

Your platform just start facilitated money laundering.

This is not a hypothetical edge case. Vacation rental platforms, marketplaces, and any platform that connects buyers with sellers and processes payments between them are attractive laundering channels. The volume of legitimate transactions provides cover. The speed of digital payments moves funds quickly. And the platform sitting in the middle bears the regulatory and reputational risk when the operation is eventually uncovered.

Most e-commerce platforms are not held to the same formal AML requirements as banks. But banking partners, payment processors, and regulators pay increasing attention to platforms as laundering channels. A business that cannot demonstrate it was monitoring for these patterns faces scrutiny that is difficult and expensive to respond to after the fact.

What platform laundering actually looks like

The vacation rental scenario illustrates the general pattern, but it applies across platform types.

The core mechanism is simple: a fraudster controls both sides of a transaction. They create a listing (a rental, a product, a service) and then generate bookings or purchases against it using stolen payment methods or funds that need laundering. The platform processes the transaction as legitimate commerce. The payout goes to the fraudster. The transaction record shows a normal sale.

The sophistication varies. In the simplest version, one person controls both the host and the guest accounts, using different devices and connections to avoid obvious linkage. In more organized operations, separate individuals handle the listing side and the booking side, coordinating through external channels. The platform sees what appears to be independent parties conducting normal business.

What makes this different from straightforward payment fraud is the absence of a complaint. In credit card fraud, the cardholder disputes the charge. In account takeover, the legitimate user notices and reports it. In platform laundering, the fraudster on the booking side has no reason to complain, and the fraudster on the listing side is receiving the payout they intended. The platform has no victim-initiated signal to trigger investigation. Detection has to come from behavioral monitoring.

The signals are in your data

Platform laundering leaves behavioral traces that are visible when you monitor accounts across time and across relationships.

Listing anomalies. A rental listed at a price significantly above comparable listings in the same area is consistent with inflated pricing designed to move more money per transaction. A listing that receives bookings immediately after creation, with no browsing or comparison traffic preceding the bookings, deviates from how legitimate guests find and evaluate listings. A host account that creates a listing and receives its first booking within hours, from a guest account created the same week, is a pattern worth scoring.

Registration quality on both sides. The accounts involved in laundering operations tend to have weak digital footprints. Disposable email addresses, recently registered domains, and connections through infrastructure associated with fraud operations are all visible at registration. When both the host and the guest accounts show these signals, the combination is stronger than either signal alone.

Cross-account linkage. This is the most telling signal. Laundering requires the fraudster to control accounts on both sides of the transaction. Even when they use different devices and connections, operational patterns leak through: shared IP addresses at some point in the account lifecycle, session timing that correlates, behavioral rhythms that are too similar across accounts that should be independent. A guest account and a host account that have never appeared on the same device but were both created from the same datacenter IP range within the same hour are not necessarily independent.

Behavioral baseline deviation. A host account with months of normal activity that suddenly changes its pricing, receives a burst of bookings from new accounts, and requests rapid payout is deviating from its established pattern. A guest account that has browsed casually for weeks and then makes a series of high-value bookings in quick succession with no browsing between them is behaving differently from its baseline.

Payout patterns. Accounts that push for the fastest available payout method, accounts that change their payout details shortly before a burst of incoming transactions, and accounts where the payout destination has characteristics inconsistent with the account's stated location are all worth scoring.

None of these signals proves laundering on its own. A legitimate host can price above market. A new guest can book immediately after registering. But when registration quality, cross-account linkage, listing anomalies, and behavioral deviation combine, the picture becomes clear enough to warrant investigation.

Why this monitoring needs to run on your infrastructure

The data required to detect platform laundering is the most sensitive data your business holds. Customer identities, transaction histories, payout details, and the behavioral profiles that connect them all. This is the complete picture of how your customers use your platform.

SaaS monitoring tools require you to send all of this to external infrastructure, continuously. Every booking, every session, every account change flows to a vendor's systems. The vendor accumulates behavioral profiles of your customers as a condition of monitoring them.

Self-hosted monitoring keeps the data where it belongs. The behavioral profiles, the cross-account linkage analysis, and the detection results stay in your database. The detection logic is open source and readable.

Getting started

Install. Deploy a tirreno instance for your platform. The administration guide covers setup and configuration.

Send both sides of your transactions. Send events to tirreno for host and guest account activity: registrations, logins, listing creation, bookings, account changes, and payout requests.

Apply the fraud_prevention preset. Open the rules page, activate the preset, and browse the activity page. Look for accounts with overlapping device fingerprints, hosts receiving bookings exclusively from weak-footprint accounts, and accounts whose behavioral baseline has shifted recently.

Tune for your platform. Adjust rule weights to reflect your platform's normal patterns. A marketplace with high seller turnover has different baseline expectations than a vacation rental platform with established hosts. Set review and blacklist thresholds based on what the data shows you.

Download at tirreno.com/download.







tirreno

Security framework

Use cases

How it works

Pricing

About

Download

Live demo

GitHub

Dockerhub

Documentation

Resource center

Learn

Account takeovers

Insider threat detection

Login & activity monitoring

Field audit trails

API abuse

Bonus abuse

Chargeback management

Fake accounts

Threat hunting

Transaction abuse

HIPAA monitoring

tirreno is an open-source security
framework that embeds protection
against threats, fraud and abuse
right into your product.

General team@tirreno.com
Support ping@tirreno.com
Security atdt@tirreno.com

Terms & conditions
Privacy policy
Imprint | Contact

Rue Galilée 7
1400 Yverdon-les-Bains
Switzerland Switzerland

©2026, tirreno. tirreno© is a trademark of Tirreno Technologies Sàrl. All rights reserved.

Valid HTML 4.01 (1999 specification)



Open-source security framework