{"id":31906,"date":"2026-05-12T08:16:25","date_gmt":"2026-05-12T02:46:25","guid":{"rendered":"https:\/\/carajput.com\/blog\/?p=31906"},"modified":"2026-05-12T08:17:59","modified_gmt":"2026-05-12T02:47:59","slug":"fraud-advisory-for-auditors-on-govt-schemes-dormant-a-cs","status":"publish","type":"post","link":"https:\/\/carajput.com\/blog\/fraud-advisory-for-auditors-on-govt-schemes-dormant-a-cs\/","title":{"rendered":"Fraud Advisory for Auditors on Govt Schemes &#038; Dormant A\/cs"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Page Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-6a02af1e7d818\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-6a02af1e7d818\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/carajput.com\/blog\/fraud-advisory-for-auditors-on-govt-schemes-dormant-a-cs\/#Key_Risk_Areas_Identified_for_Auditors_on_Govt_Schemes_Dormant_Acs_Fraud_activity_controlling_area\" title=\"Key Risk Areas Identified for Auditors on Govt. Schemes &amp; Dormant A\/cs Fraud activity controlling area \">Key Risk Areas Identified for Auditors on Govt. Schemes &amp; Dormant A\/cs Fraud activity controlling area <\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/carajput.com\/blog\/fraud-advisory-for-auditors-on-govt-schemes-dormant-a-cs\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<figure id=\"attachment_9140\" aria-describedby=\"caption-attachment-9140\" style=\"width: 781px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-9140\" src=\"https:\/\/carajput.com\/blog\/wp-content\/uploads\/2020\/09\/images-6.jpg\" alt=\"www.carajput.com; Tax Audit\" width=\"781\" height=\"479\" \/><figcaption id=\"caption-attachment-9140\" class=\"wp-caption-text\"><strong style=\"color: #000080; font-size: 16px;\">Strengthening Audit Vigilance: Key Takeaways from Fraud Advisory on Government Schemes &amp; Dormant Accounts<\/strong><\/figcaption><\/figure>\n<p>In today\u2019s evolving financial ecosystem, fraud risks are becoming increasingly sophisticated, particularly in areas involving government-sponsored schemes and dormant bank accounts. A recent advisory issued by the Fraud Risk Management Cell, supported by observations from <span data-subtree=\"aimfl,mfl\" data-copy-service-computed-style=\"font-family: &quot;Google Sans&quot;, Arial, sans-serif; font-size: 16px; font-weight: 500; margin: 0px; text-decoration: none; border-bottom: 0px rgb(0, 29, 53);\">the <\/span><span data-sfc-root=\"c\" data-wiz-uids=\"AIZ3ve_a\" data-sfc-cb=\"\" data-copy-service-computed-style=\"font-family: &quot;Google Sans&quot;, Arial, sans-serif; font-size: 16px; font-weight: 500; margin: 0px; text-decoration: none; border-bottom: 0px rgb(0, 29, 53);\">National Bank for Agriculture and Rural Development (NABARD),<\/span>\u00a0highlights critical gaps in audit mechanisms and outlines essential steps for strengthening controls. This blog breaks down the advisory and provides practical insights for auditors, banking professionals, and risk managers.<\/p>\n<p>The advisory stems from the detection of serious irregularities, including loans sanctioned on the basis of forged quotations and invoices, diversion\/misutilization of funds under government schemes, unauthorized transactions in dormant accounts, and misuse of biometric authentication and system access.<\/p>\n<p>Alarmingly, <span data-subtree=\"aimfl,mfl\" data-copy-service-computed-style=\"font-family: &quot;Google Sans&quot;, Arial, sans-serif; font-size: 16px; font-weight: 500; margin: 0px; text-decoration: none; border-bottom: 0px rgb(0, 29, 53);\">The <\/span><span data-sfc-root=\"c\" data-wiz-uids=\"AIZ3ve_a\" data-sfc-cb=\"\" data-copy-service-computed-style=\"font-family: &quot;Google Sans&quot;, Arial, sans-serif; font-size: 16px; font-weight: 500; margin: 0px; text-decoration: none; border-bottom: 0px rgb(0, 29, 53);\">National Bank for Agriculture and Rural Development (NABARD)<\/span>\u00a0observed that such frauds went undetected during previous concurrent and internal audits, raising serious concerns about the effectiveness of current audit frameworks<\/p>\n<p>Auditors must Conduct surprise physical verifications of financed units. Use data analytics to detect transaction anomalies. Cross-check invoices with third-party confirmations. Strengthen review of dormant account reactivations, monitor staff behavior patterns and system usage logs and ensure strict adherence to maker-checker controls<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Key_Risk_Areas_Identified_for_Auditors_on_Govt_Schemes_Dormant_Acs_Fraud_activity_controlling_area\"><\/span><span style=\"color: #000080;\"><strong>Key Risk Areas Identified for Auditors on Govt. Schemes &amp; Dormant A\/cs Fraud activity controlling area <\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>1. Government Sponsored Scheme Loans : Fraudulent practices in loan disbursement were a major concern. Audit focus areas:<\/p>\n<ul>\n<li>Verification of genuineness of quotations\/invoices<\/li>\n<li>Physical verification of financed assets<\/li>\n<li>Ensuring end-use of funds matches sanctioned purpose<\/li>\n<li>Reviewing sanction, disbursement, and post-disbursement monitoring<\/li>\n<\/ul>\n<p>Documentation alone is no longer sufficient\u2014ground-level verification is critical.<\/p>\n<p>2. Dormant \/ Inoperative Accounts: Dormant accounts have emerged as a major vulnerability. Audit checks include:<\/p>\n<ul>\n<li>Scrutiny of account activation process<\/li>\n<li>Review of unusual transactions post-activation<\/li>\n<li>Verification of customer consent and KYC compliance<\/li>\n<\/ul>\n<p>Dormant accounts are often exploited due to lower scrutiny and weakened monitoring.<\/p>\n<p>3. User Login &amp; System Access Controls: The advisory highlights risks linked to internal system misuse. Critical areas:<\/p>\n<ul>\n<li>Examination of staff login activity<\/li>\n<li>Detection of unauthorized system access<\/li>\n<li>Monitoring login attempts and suspicious activity<\/li>\n<li>Ensuring proper user enable\/disable controls in CBS<\/li>\n<\/ul>\n<p>Fraud is not always external\u2014internal system vulnerabilities and user misuse are equally significant.<\/p>\n<p>4. Internal Control &amp; Supervisory Mechanism: Weak internal controls enable fraud to go unnoticed. Key audit checks:<\/p>\n<ul>\n<li>Transactions processed using IDs of absent or transferred employees<\/li>\n<li>Compliance with maker-checker system<\/li>\n<li>Adequate supervisory review mechanisms<\/li>\n<\/ul>\n<p>Control failures often indicate systemic weaknesses rather than isolated incidents.<\/p>\n<p>5. Early Warning Signals : Detection must shift from reactive to proactive. Indicators to monitor:<\/p>\n<ul>\n<li>Exceptional or override transactions<\/li>\n<li>Repetitive transactions handled by the same staff member<\/li>\n<li>Lack of job role rotation<\/li>\n<li>Inter-branch transactions that appear abnormal<\/li>\n<li>Patterns suggesting fund diversion or high-value unexplained withdrawals<\/li>\n<\/ul>\n<p>Early detection relies heavily on pattern recognition and behavioral analysis.<\/p>\n<p>The advisory clearly shifts expectations from auditors. Move beyond checklist-based audits to risk-based, investigative audits. Ensure real-time reporting of suspicious activities instead of post-facto reporting. Strengthen documentation verification with physical validation. Focus on technology-driven fraud indicators, and importantly, auditors are instructed to report suspicious activities immediately, without waiting for audit completion.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><span style=\"color: #000080;\"><strong>Conclusion<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>This advisory serves as a wake-up call for the auditing and banking fraternity. The evolving nature of fraud demands a shift from traditional compliance-based audits to proactive, intelligence-driven risk assessment. Fraud prevention is no longer just about controls. it\u2019s about vigilance, verification, and timely action. By implementing these measures, banks and auditors can significantly improve their ability to detect, prevent, and mitigate fraud risks, thereby safeguarding financial integrity and public trust.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s evolving financial ecosystem, fraud risks are becoming increasingly sophisticated, particularly in areas involving government-sponsored schemes and dormant bank accounts. A recent advisory issued by the Fraud Risk Management Cell, supported by observations from the National Bank for Agriculture and Rural Development (NABARD),\u00a0highlights critical gaps in audit mechanisms and outlines essential steps for strengthening &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10211],"tags":[10463],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/posts\/31906"}],"collection":[{"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/comments?post=31906"}],"version-history":[{"count":2,"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/posts\/31906\/revisions"}],"predecessor-version":[{"id":31908,"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/posts\/31906\/revisions\/31908"}],"wp:attachment":[{"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/media?parent=31906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/categories?post=31906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carajput.com\/blog\/wp-json\/wp\/v2\/tags?post=31906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}