Fraud attempts are on the rise.

Know the common types of business fraud

Still the top attack method, now increasingly targeting ACH credits. Fraudsters impersonate vendors or executives to redirect payments. Emails often look legitimate and attackers use urgency or authority to bypass normal verification.

Driven by phishing, malware, credential stuffing and enabling unauthorized ACH transfers. Once criminals gain access, they initiate ACH transactions that appear authorized. Fraudsters will often combine account takeover attempts with social engineering techniques by calling victims and posing as a representative from their bank and then requesting the employee provide their password or one-time passcode.

Attackers manipulate victims into willingly sending money via ACH, often by posing as a supplier, internal department or bank representative.

Criminals compromise systems to alter ACH payroll files or lock operations.

Criminals use AI-generated voice or video to impersonate executives during calls or video meetings, authorizing fraudulent ACH transfers. This threat continues to emerge as deepfake technology becomes more accessible and convincing.

Expected to grow significantly, leveraging AI and stolen data to create fake identities using real and fabricated data to open accounts and initiate ACH transactions.

Organized crime groups offering scalable ACH fraud kits and infrastructure to other fraudsters, presenting increased sophistication and additional fraud pressure.

How to prevent ACH fraud

To better protect against falling victim to some of the more common fraud schemes, the following recommendations and best practices should be considered: