This story is personal. It literally happened to my brother last week.
Recent Developments
- Fraudsters increasingly use **email account compromise** and **typosquatting** (registering lookalike domains) to intercept or impersonate legitimate supplier communications[2][6].
- A notable legal case involved a law firm whose email was hacked, resulting in payment being redirected to a fraudster’s account. The court examined liability issues, highlighting the complexity of responsibility in such frauds[2].
- Attackers often send follow-up emails shortly after legitimate invoices, claiming bank details have changed, making the scam harder to detect[6].
It's called Invoice Redirection Fraud (or Business Email Compromise), and it is the stealthiest, most devastating attack in the digital world right now. It doesn't require a "virus." It requires patience.
How The Attack Happened
The "Agents*" didn't storm the front door. They slipped in through a window weeks ago.
- The Infiltration: Attackers compromised a supplier's email account (likely via phishing).
- The Surveillance: They didn't steal data. They sat quietly and read the emails. They monitored ongoing conversations about payments and projects.
- The Interception: When a real invoice was due, the criminal struck. They intercepted the legitimate email, edited the PDF invoice to swap the bank details to their own account, and forwarded it on.
Or sometimes, they send a follow-up email from a spoofed address: "Our bank details have changed, please use this account instead."
The Result: Money Gone
The victim (the company) paid a real-looking invoice for real work. They authorized the transfer.
Because the transfer was "authorized" (you typed the numbers yourself), banks treat this as a scam, not theft. It is incredibly hard to reverse.
By the time the supplier calls asking "Where is my money?", the funds have moved through three different accounts and vanished.
How to Prevent "Invoice Swap"
You need two layers of defense: Technical Hardness and Human Process.
1. Technical Hardness (What We Do)
- MFA Everywhere: Multi-Factor Authentication makes it 99% harder for attackers to break into your email to start monitoring.
- Email Authentication (DMARC/SPF): Prevents attackers from spoofing your domain to trick your clients.
- Patching: Keeping systems secure so credentials aren't stolen in the first place.
2. Human Process (What You Must Do)
- Verify by Voice: If a supplier sends new bank details via email, call them. Use a number you know, not the one in the email signature (the hacker changed that too!).
- Dual Approval: For large payments, require two people to sign off.
- Check the Domain: Is it `supplier.com` or `suppIier.com` (with a capital 'i')? The Agents* rely on you being busy and distracted.
The Simple Checklist
Before you pay any invoice today, ask:
- Has this bank account number changed?
- If yes, did I verify it over the phone?
- Does the email tone match their usual style?
The Matrix* is watching your payments. Don't let them redirect your hard-earned revenue.
The Scale of the Problem
Invoice redirection fraud (also called Business Email Compromise or BEC) is not rare. It's epidemic:
- FBI reports: BEC scams caused $2.7 billion in losses in 2022 alone
- Average loss per incident: $120,000 (according to FBI IC3 data)
- Target demographics: Small to medium businesses (50-500 employees) are prime targets
- Success rate: 1 in 5 businesses that receive a BEC email fall victim
- Recovery rate: Less than 5% of funds are recovered
This isn't a theoretical threat. It's happening to real businesses every single day.
How Attackers Execute Invoice Redirection
Attackers use sophisticated methods to make their scams convincing:
Method 1: Email Account Compromise
The most common method involves compromising a supplier's email account:
- Initial breach: Attacker gains access via phishing, weak password, or malware
- Silent monitoring: Attacker reads emails for weeks/months, learning business patterns
- Timing the attack: Waits for invoice payment time
- Interception: Intercepts real invoice, modifies bank details, forwards to victim
- Cover-up: Deletes sent email from supplier's account to hide evidence
Why it works: The email comes from the legitimate supplier's account, so it looks completely authentic.
Method 2: Domain Spoofing
Attackers create fake domains that look almost identical:
- Example: `supplier.com` vs. `suppIier.com` (capital 'i' instead of lowercase 'L')
- Example: `company.com` vs. `cornpany.com` (typo that's easy to miss)
- Example: `supplier-co.com` vs. `supplier.com` (hyphen added)
They send emails from these fake domains with legitimate-looking email addresses and signatures.
Method 3: Display Name Spoofing
Attackers use the real supplier's name but a different email address:
- Display name: "John Smith" (legitimate supplier's name)
- Email address: `[email protected]` (attacker's account)
Many email clients only show the display name, making this attack very effective.
Method 4: Compromised Email Forwarding
Attackers set up email forwarding rules in compromised accounts:
- All emails from the victim company are forwarded to attacker
- Attacker intercepts invoices and sends modified versions
- Original supplier never sees the fraud
Real-World Attack Timeline
Here's how a typical attack unfolds:
Week 1-4: Infiltration
- Attacker sends phishing email to supplier
- Supplier clicks malicious link or downloads malware
- Attacker gains email account credentials
- Attacker logs in and sets up email forwarding
Week 5-12: Surveillance
- Attacker monitors all emails silently
- Learns business relationships, payment schedules, invoice formats
- Identifies high-value targets (large invoices)
- Studies communication patterns and signatures
Week 13: Attack
- Real invoice arrives from supplier
- Attacker intercepts and modifies bank details
- Forwards modified invoice to victim
- Deletes evidence from supplier's account
Week 14+: Discovery
- Victim pays modified invoice
- Money transfers to attacker's account
- Attacker moves money through multiple accounts
- Supplier calls asking where payment is
- Victim realizes fraud, but money is gone
Why This Attack Is So Effective
Invoice redirection fraud works because it exploits human psychology and business processes:
1. Trust in Email
People trust emails from known senders. If an email comes from a supplier you've worked with for years, you don't question it.
2. Time Pressure
Businesses need to pay invoices quickly to maintain relationships. Attackers exploit this urgency.
4. Busy Work Environment
Employees are busy and may not notice subtle changes in email addresses or bank details.
5. Lack of Verification
Most businesses don't verify bank details for every payment, especially for regular suppliers.
6. Authorized Transactions
Because the victim authorizes the payment, banks treat it as a scam, not theft, making recovery nearly impossible.
Detection: How to Spot Invoice Fraud
Watch for these red flags:
Email Red Flags
- Urgent language: "Please pay immediately" or "Urgent payment required"
- Last-minute changes: "Our bank details have changed" or "Please use new account"
- Unusual tone: Email doesn't match supplier's usual communication style
- Suspicious domain: Email address looks slightly different
- No previous context: Email appears out of nowhere without prior conversation
Invoice Red Flags
- Changed bank details: Account number, routing number, or bank name is different
- Modified PDF: Invoice looks edited or tampered with
- Unusual amounts: Invoice amount is higher than expected
- Missing details: Invoice lacks usual information or signatures
Process Red Flags
- No verification call: Supplier didn't call to confirm bank change
- Rushed approval: Pressure to approve payment quickly
- Unusual timing: Invoice arrives at unusual time or day
Prevention: Technical Defenses
Implement these technical measures to prevent invoice fraud:
1. Multi-Factor Authentication (MFA)
What it does: Requires additional verification beyond password (phone code, authenticator app)
Why it matters: Even if attacker gets password, they can't access account without second factor
Implementation: Enable MFA on all email accounts, especially for finance and executive teams
Effectiveness: Prevents 99%+ of account compromise attempts
2. Email Authentication (DMARC/SPF/DKIM)
What it does: Verifies email sender identity, prevents domain spoofing
Why it matters: Makes it much harder for attackers to spoof your domain
Implementation: Configure SPF, DKIM, and DMARC records for your domain
Effectiveness: Prevents 90%+ of domain spoofing attacks
3. Email Security Gateways
What it does: Advanced email filtering that detects BEC attacks
Why it matters: Catches sophisticated attacks that bypass basic filters
Implementation: Use enterprise email security solutions (Microsoft Defender, Proofpoint, etc.)
Effectiveness: Detects 80-90% of BEC attempts before they reach inbox
4. Regular Security Updates
What it does: Patches vulnerabilities that attackers exploit
Why it matters: Prevents initial compromise that leads to email access
Implementation: Keep all systems updated, use managed IT services
Effectiveness: Prevents 70%+ of initial breaches
5. Email Monitoring and Logging
What it does: Tracks email activity, detects suspicious patterns
Why it matters: Identifies compromised accounts early
Implementation: Monitor for unusual login locations, email forwarding rules, sent email patterns
Effectiveness: Detects 60-70% of compromises within days
Prevention: Process Defenses
Technical defenses aren't enough. You need process controls:
1. Payment Verification Process
Required steps:
- Verify all bank detail changes via phone call (use known number, not email signature)
- Require dual approval for payments over threshold (e.g., $5,000)
- Maintain approved vendor list with verified bank details
- Flag any payment to new bank account for extra verification
2. Invoice Verification Checklist
Before paying any invoice, verify:
- ✅ Invoice number matches purchase order
- ✅ Amount matches agreed price
- ✅ Bank details match approved vendor list
- ✅ Email comes from verified supplier domain
- ✅ Payment timing is expected
- ✅ Supplier confirmed via phone if bank details changed
3. Segregation of Duties
Principle: No single person should be able to authorize and process payments
Implementation:
- One person approves invoices
- Different person processes payments
- Third person reconciles accounts
4. Regular Vendor Verification
Process:
- Quarterly verification of all vendor bank details
- Confirm via phone call, not email
- Update approved vendor list
- Flag any changes for extra scrutiny
5. Employee Training
Essential training topics:
- How to spot BEC attacks
- Verification procedures for payments
- What to do if suspicious email received
- Importance of following payment processes
Frequency: Annual training, plus updates when new threats emerge
What to Do If You're a Victim
If you've been scammed, act immediately:
Immediate Actions (First 24 Hours)
- Contact your bank: Report fraud immediately, request payment recall
- Contact recipient bank: If you know which bank received funds, contact them
- File police report: Report to local police and FBI IC3 (ic3.gov)
- Secure accounts: Change all passwords, enable MFA, check for other compromises
- Notify supplier: Inform legitimate supplier their email may be compromised
Recovery Process
Realistic expectations: Less than 5% of funds are recovered. However, quick action improves chances:
- Within 24 hours: 10-15% recovery chance if bank acts quickly
- Within 48 hours: 5-10% recovery chance
- After 48 hours: Less than 5% recovery chance
Legal Options
- Civil lawsuit: May be possible if attacker is identified
- Insurance claim: Check if cyber insurance covers BEC fraud
- Tax deduction: Losses may be deductible (consult tax professional)
The Cost of Invoice Fraud
Beyond the direct financial loss, invoice fraud has significant hidden costs:
Direct Costs
- Lost funds: $10,000-$500,000+ per incident (average $120,000)
- Legal fees: $5,000-$25,000 for recovery attempts
- Forensic investigation: $10,000-$50,000 to determine how breach occurred
- System remediation: $5,000-$20,000 to secure compromised systems
Indirect Costs
- Business disruption: Time spent on recovery, investigation, process changes
- Reputation damage: Loss of trust with suppliers and customers
- Increased insurance: Cyber insurance premiums increase after claim
- Process changes: Cost of implementing new security measures
- Employee time: Hours spent on investigation and recovery
Total Cost Example
For a $50,000 invoice fraud:
- Lost funds: $50,000
- Legal/forensic: $15,000
- System remediation: $10,000
- Business disruption: $5,000
- Total: $80,000+
Prevention costs a fraction of this: $2,000-$5,000 for proper email security and training.
Industry-Specific Risks
Some industries are higher risk for invoice fraud:
Construction and Real Estate
- High-value invoices ($50,000-$500,000+)
- Frequent vendor changes
- Time-sensitive payments
- Risk level: Very High
Manufacturing
- Regular large payments to suppliers
- International suppliers (harder to verify)
- Complex supply chains
- Risk level: High
Professional Services
- Regular client payments
- High-value invoices
- Time-sensitive billing
- Risk level: Medium-High
Best Practices Summary
Protect your business with these essential practices:
Technical Measures
- ✅ Enable MFA on all email accounts
- ✅ Configure DMARC/SPF/DKIM email authentication
- ✅ Use email security gateways
- ✅ Keep all systems updated
- ✅ Monitor email activity for suspicious patterns
Process Measures
- ✅ Verify all bank detail changes via phone
- ✅ Require dual approval for large payments
- ✅ Maintain approved vendor list
- ✅ Use invoice verification checklist
- ✅ Segregate payment duties
- ✅ Train employees regularly
Vendor Management
- ✅ Verify vendor bank details quarterly
- ✅ Use secure vendor portal when possible
- ✅ Establish direct communication channels
- ✅ Require vendors to use email authentication
Our security audit service includes email security assessment and BEC prevention recommendations. Our maintenance plans include email security monitoring and MFA implementation.
Frequently Asked Questions
What is invoice redirection fraud?
Invoice redirection fraud (also called Business Email Compromise or BEC) is a scam where attackers intercept legitimate invoices and modify bank details to redirect payments to their own accounts. Attackers typically compromise a supplier's email account, monitor communications, and then intercept invoices to change payment details. The victim pays what appears to be a legitimate invoice, but the money goes to the attacker instead of the supplier. This is one of the most costly cybercrimes, with the FBI reporting $2.7 billion in losses in 2022 alone. The average loss per incident is $120,000, and less than 5% of funds are recovered.
How do attackers get access to supplier email accounts?
Attackers gain access through multiple methods: Phishing: Sending fake emails that trick users into entering credentials. Weak passwords: Guessing or cracking weak passwords. Malware: Installing keyloggers or credential stealers. Password reuse: Using credentials from previous data breaches. Social engineering: Tricking users into revealing passwords. Unpatched vulnerabilities: Exploiting security flaws in email systems. Once they have access, attackers often set up email forwarding rules to monitor all communications silently. This is why multi-factor authentication (MFA) is critical—it prevents 99%+ of account compromise attempts even if passwords are stolen.
Can I recover money lost to invoice fraud?
Recovery is difficult but possible in some cases: Immediate action: Contact your bank within 24 hours—you have a 10-15% chance of recovery if the bank acts quickly. Recipient bank: If you know which bank received the funds, contact them immediately—they may be able to freeze the account. Police report: File reports with local police and FBI IC3 (ic3.gov)—this is required for insurance claims and may help with recovery. Realistic expectations: Less than 5% of funds are recovered overall. After 48 hours, recovery chances drop to near zero as money moves through multiple accounts. Legal options: Civil lawsuits may be possible if the attacker is identified, but this is rare. Insurance: Check if your cyber insurance covers BEC fraud—this is often the best path to recovery. The key is acting immediately—every hour counts.
How can I verify if an email is really from my supplier?
Use multiple verification methods: Check the email address: Look carefully at the sender's email address—watch for typos, different domains, or display name spoofing. Verify the domain: Check if the domain matches your supplier's known domain exactly. Check email headers: View email headers to see the actual sending server and verify SPF/DKIM authentication. Compare to previous emails: Does the tone, style, and format match previous communications? Phone verification: Call the supplier using a known phone number (not from email signature) to verify. Check for urgency: Be suspicious of urgent payment requests or last-minute changes. Verify bank details: Compare bank details to your approved vendor list. Look for red flags: Unusual language, grammar errors, or requests that don't match normal business processes. When in doubt, always verify via phone using a known number.
What should I do if I receive a suspicious invoice email?
If you receive a suspicious invoice: Don't click anything: Don't click links, download attachments, or reply to the email. Verify independently: Contact the supplier directly using a known phone number or email address (not from the suspicious email). Check your records: Compare the invoice to your purchase orders and previous invoices. Report internally: Notify your IT/security team and finance department. Check bank details: Compare bank details to your approved vendor list—if they're different, it's likely fraud. Look for red flags: Urgent language, last-minute changes, unusual amounts, or modified PDFs. When in doubt, don't pay: It's better to delay a legitimate payment than to pay a fraudulent one. If the invoice is legitimate, the supplier will understand the delay. If it's fraud, you've saved your business thousands of dollars.
How much does it cost to protect against invoice fraud?
Protection costs vary but are far less than the cost of a single incident: Basic protection: $500-$2,000/year for MFA, email authentication, and basic training. Comprehensive protection: $2,000-$5,000/year for advanced email security, monitoring, training, and process improvements. Enterprise protection: $5,000-$15,000/year for full email security suite, dedicated monitoring, and comprehensive training. Compare to fraud cost: Average invoice fraud costs $120,000 per incident, with less than 5% recovery. Even basic protection provides 80%+ risk reduction. ROI: Protection pays for itself if it prevents even one incident every 10-20 years. Most businesses experience multiple attempts, making protection essential. Our security audit service includes email security assessment, and our maintenance plans include email security monitoring and MFA implementation.
Are small businesses at risk for invoice fraud?
Yes, small businesses are actually prime targets: Why small businesses: Often lack sophisticated security, have fewer verification processes, and may be less suspicious of emails. Attack statistics: 50-500 employee businesses are the most targeted size. Average loss: Small businesses lose $25,000-$200,000 per incident on average. Recovery rate: Small businesses recover funds less often than large enterprises. Impact: A single fraud incident can be devastating for a small business, sometimes causing business closure. Protection: Small businesses need protection just as much as large enterprises, but may need more cost-effective solutions. Our maintenance plans are designed for small businesses and include email security at affordable rates. Don't assume you're too small to be targeted—attackers prefer easier targets.
Why We Write About Business Email Compromise (And Why It Matters for Your Website)
You might be wondering: "Why is a website maintenance company writing about business email compromise? This isn't directly about WordPress or Joomla."
But it is directly related. Here's why:
When we give you a heads-up about critical security issues like invoice fraud, we're not just being helpful—we're protecting your privacy and saving all of us time. Here's the reality:
- Your email accounts passwords are valuable to hackers. If your email systems get compromised through business email compromise, attackers don't just steal your personal data—they steal your website passwords, your hosting credentials, your FTP access, and your database passwords. Suddenly, your website is compromised not because of a WordPress vulnerability, but because your email systems were exploited.
- An educated client is easier to serve. When you understand security threats, we speak the same language. You know why we recommend certain security measures. You understand why we push for updates. You see the bigger picture—that website security isn't just about plugins and themes, it's about the entire digital ecosystem you operate in.
- Prevention saves everyone time. If you get hacked because of business email compromise, we have to clean up the mess. That takes time—your time dealing with the breach, our time cleaning and securing your site. By giving you a heads-up about critical issues like this, we're preventing problems before they happen. It's proactive maintenance, not reactive cleanup.
- Your security is our peace of mind. We sleep better knowing our clients are protected. When you're secure, your website is secure. When your website is secure, we don't have to spend hours cleaning up malware, restoring backups, or dealing with blacklist removals. Everyone wins.
This is why we write about business email compromise and other security issues that might seem "unrelated" to website maintenance. They're not unrelated—they're part of the same security ecosystem. Your email accounts is a gateway to your website. Your email is a gateway to your hosting account. Your operating system is the foundation everything runs on.
We're not just maintaining your website. We're maintaining your entire digital presence. And that starts with keeping you informed about threats that could compromise everything.
So when you see us writing about invoice fraud or email compromise, remember: we're protecting your website by protecting you. Because in the end, your security is our security. Your peace of mind is our peace of mind. And an educated client who understands the threats? That's a client we can serve better, faster, and more effectively.