fdic

FDIC-Insured - Backed by the full faith and credit of the U.S. Government

Proactive ways to fight vendor fraud

January 10, 2023

Whether private or public, business or government, all establishments are at risk for fraudulent business email compromise activity. Learn what steps you can take to avoid potential negative outcomes.

 

Times of disruption are often ripe for fraud activity. When your vendors’ emails have been compromised, a fraudster can pose as your trusted partner and send a fraudulent payment request. This is known as business email compromise (BEC), and it’s recently been seeing an increase in the news and in our communities. Below, you’ll find two examples of this activity and a curated, concise list of considerations to help you meet this challenge head on.
 

Example 1: A corporation’s vendor requests a change to their payment account information

A large corporation received an email from a trusted vendor to change their payment account information. The corporation authorized a six-figure wire transfer, believing it was a legitimate request from their vendor. When the corporation and the actual vendor discovered the fraudulent payment nearly a month later, the funds were unrecoverable.

 

Example 2: A university’s contractor requests a modification to their payment schedule

In a publicly reported case, a university entered into contract for construction services. A fraudster posed as their contractor and requested a modification to the payment account for a payment of nearly $2 million. University employees followed instructions to verify the account modification prior to sending payment.

However, the university had been deceived into contacting the fraudster for verification through the compromised email. The payment transferred. Days later, the university realized the construction company never received the funds and contacted law enforcement.

 

Four controls to help prevent vendor fraud

While threats may continue to persist, a concise plan and educated staff can deter fraudulent activity. Use these recommendations to help protect your organization.

  1. Email policies and training: Educate employees about common tactics related to social engineering (e.g., phishing, smishing, and vishing) along understanding common ways to identify associated red flags such as variations in domain name, email address and links along with a sense of urgency or suspicious attachments. 
  2. Vendor account management: Record the individuals who will act as the primary contacts for the vendor and will be responsible for verifying any changes to account information. Regularly confirm the accuracy of this contact information. 
  3. Dual approval for vendor payments: Use a second set of eyes on payments and supporting documentation to allow for further scrutiny of the authenticity of the instructions. Also, consider setting risk-based dollar thresholds for dual approvals. 
  4. Vendor payment notification for large payments: Identify criteria for high-value or high-risk payments. Include a follow-up with your primary vendor contact to make sure they received the funds. Review your current policies and controls for email use, vendor management, and accounts payable.
     

Time can make the difference when dealing with BEC. If you believe your organization is a victim of BEC, contact your bank representative immediately to attempt to recover the funds.

 

At U.S. Bank, your privacy and security are our priority. We’re constantly enhancing our systems to protect your data while providing seamless technology experiences.

 

Read more on the topics of cybersecurity and how to protect your organization from fraud.

 

Related content

Liquidity management: A renewed focus for European funds

Cryptocurrency custody 6 frequently asked questions

5 questions you should ask your custodian about outsourcing

How to choose the right custodian for your managed assets

3 tips to maintain flexibility in supply chain management

Insource or outsource? 10 considerations

10 ways a global custodian can support your growth

The benefits of a full-service warehouse custodian

Webinar: Cash management strategies for higher education

Solutions banks can offer during the COVID-19 pandemic

Turn risk into opportunity with supply chain finance

Webinar: What’s new in international payments?

Best practices on securing cardholder data

Webinar: Managing foreign exchange risk in unpredictable markets

Hospitals face cybersecurity risks in surprising new ways

Webinar: Robotic process automation

Tactical Treasury: Fraud prevention is a never-ending task

Post-pandemic fraud prevention lessons for local governments

Webinar: Empower your AP automation with strategic intelligence

Webinar: Building digital bridges for treasury optimization

Webinar: Recording of the Central Securities Depository Regulation and Pivot

Evaluating interest rate risk creating risk management strategy

Authenticating cardholder data reduce e-commerce fraud

Webinar: Digitize your AP processes to optimize results

Risk management strategies for foreign exchange hedging

Webinar: AP automation—solve payment challenges with an invoice-to-pay solution

What is CSDR, and how will you be affected?

Webinar: CRE technology trends

Webinar: The future of digital onboarding for U.S. Bank clients

Webinar: Driving innovation to impact treasury management

Webinar: CRE treasury leader roundtable

Proactive ways to fight vendor fraud

Webinar: Redefine your business with technology

Webinar: Economic, political and policy insights

4 tips for protecting your business against Coronavirus-related scams

The latest on cybersecurity: Mobile fraud and privacy concerns

Webinar: The impact of innovation on processing receivables

5 Ways to protect your government agency from payment fraud

Redefining beneficial ownership in the Cayman Islands

Cayman Islands’ Private Funds Law: What you need to know

The latest on cybersecurity: Vulnerability testing and third-party software

Webinar: International payments

5 steps you should take after a major data breach

Fight the battle against payments fraud

Cybercrisis management: Are you ready to respond?

Complying with changes in fund regulations

The cyber insurance question: Additional protection beyond prevention

Protecting your business from fraud

The password: Enhancing security and usability

Avoiding the pitfalls of warehouse lending

Fraud prevention checklist

Why KYC — for organizations

Cybersecurity – Protecting client data through industry best practices

Business risk management for owners of small companies

Government agency credit card programs and PCI compliance

BEC: Recognize a scam

How to improve your business network security

Webinar: Approaching international payment strategies in today’s unpredictable markets.

White Castle optimizes payment transactions

Higher education strategies for e-payment migration, fighting fraud

Webinar: A closer look at U.S. Bank AP Optimizer

How to improve digital payments security for your health system

Increase working capital with Commercial Card Optimization

Automate accounts payable to optimize revenue and payments

5 winning strategies for managing liquidity in volatile times

The surprising truth about corporate cards

The future of financial leadership: More strategy, fewer spreadsheets

3 timeless tips to reduce corporate payments fraud

Alternative investments: How to track returns and meet your goals

Protecting cash balances with sweep vehicles

Manufacturing: 6 supply chain optimization strategies

Webinar: CRE Digital Transformation – Balancing Digitization with cybersecurity risk

Webinar: Fraud prevention and mitigation for government agencies

Small business growth: 6 strategies for scaling your business

Healthcare marketing: How to promote your medical practice

How to keep your assets safe

4 strategies for coping with market volatility

Learn to spot and protect yourself from common student scams

4 ways to outsmart your smart device

Webinar: Protect yourself or your loved ones from elder fraud

Keep your finances safe and secure: Essential tips for preventing check fraud

How to spot an online scam

Webinar: How to fight off fraud

Webinar: How to stay safe from cyberfraud

Money muling 101: Recognizing and avoiding this increasingly common scam

What is financial fraud?

Learn how to spot scams related to COVID-19

Dear Money Mentor: What is cryptocurrency?

How you can prevent identity theft

How-to guide: What to do if your identity is stolen

The mobile app to download before summer vacation

Webinar: Mobile banking tips for smarter and safer online banking

Start of disclosure content

Loan approval is subject to credit approval and program guidelines. Not all loan programs are available in all states for all loan amounts. Interest rate and program terms are subject to change without notice. Mortgage, home equity and credit products are offered by U.S. Bank National Association. Deposit products are offered by U.S. Bank National Association. Member FDIC.