Payment diversion is the end goal of most vendor fraud schemes. Whether through Business Email Compromise (BEC), vendor impersonation, or internal fraud, the objective is the same: redirect legitimate payments to accounts controlled by fraudsters. Prevention requires understanding the attack vectors and implementing systematic controls.
Understanding Payment Diversion
Payment diversion occurs when payments intended for legitimate vendors are redirected to fraudulent accounts. This can happen through:
External Attacks
- BEC: Fraudsters impersonate vendors via email
- Vendor impersonation: Fake invoices from lookalike domains
- Account takeover: Compromised vendor email accounts
Internal Threats
- Collusion: Employees working with external fraudsters
- Ghost vendors: Fictitious vendors created by insiders
- Payment manipulation: Changing payment details before processing
Process Exploitation
- Weak verification: Changes processed without adequate verification
- Manual overrides: Controls bypassed for urgent payments
- Documentation gaps: Missing evidence of verification
The Attack Surface
Payment diversion attacks exploit multiple touchpoints:
Invoice Receipt
- Fraudulent invoices enter through email
- Lookalike domains bypass spam filters
- Compromised accounts send legitimate-looking requests
Vendor Data
- Changes to banking information
- New payment addresses
- Updated contact information
Payment Processing
- Manual entry of payment details
- Overrides of automated controls
- Rush payment requests
Verification
- Callbacks using fraudulent contact information
- Incomplete verification procedures
- Undocumented approvals
Prevention Framework
Effective payment diversion prevention addresses all attack vectors:
1. Establish Vendor Truth
Create a verified baseline for every vendor:
- Known bank accounts
- Authorized sender domains
- Verified contact information
- Historical payment patterns
Without a baseline, you cannot detect changes. Without detection, you cannot prevent diversion.
2. Detect Changes Automatically
Compare every invoice against verified records:
- Bank account numbers
- Routing numbers
- Remittance addresses
- Sender email domains
Manual review alone cannot catch sophisticated attacks. Automated detection provides consistent, thorough coverage.
3. Verify Through Trusted Channels
When changes are detected:
- Use contact information from your verified records
- Never use contact details from the suspicious invoice
- Verify through multiple channels when possible
- Document verification thoroughly
4. Implement Payment Controls
Build verification into the payment process:
- Hold payments on flagged invoices
- Require additional approval for high-risk transactions
- Implement dual authorization for bank changes
- Separate invoice receipt from payment processing
5. Monitor and Audit
Continuously assess control effectiveness:
- Track detection rates
- Review verification documentation
- Audit payment processes
- Monitor for bypass attempts
High-Risk Scenarios
Certain situations require heightened scrutiny:
New Vendors
- No historical baseline
- Verify thoroughly before first payment
- Build confidence through multiple transactions
Bank Changes
- Most common diversion vector
- Verify through known channels
- Document verification completely
Rush Payments
- Urgency is a red flag
- Apply standard controls regardless
- Document any exceptions
Large Payments
- Higher reward for fraudsters
- Enhanced verification requirements
- Multiple approval layers
International Payments
- More difficult to recover
- Additional verification steps
- Enhanced documentation
Building Defense in Depth
No single control prevents all payment diversion. Effective prevention uses multiple layers:
Layer 1: Detection
- Automated comparison against verified records
- Flag changes before payment processing
Layer 2: Verification
- Consistent verification workflows
- Trusted contact information
- Documented outcomes
Layer 3: Authorization
- Approval requirements for flagged payments
- Separation of duties
- Documented approvals
Layer 4: Monitoring
- Audit trails for all changes
- Detection of bypass attempts
- Regular control assessments
Recovery Considerations
Despite best efforts, some fraud may succeed. Improve recovery chances by:
- Detecting quickly: Faster detection increases recovery likelihood
- Documenting thoroughly: Evidence supports recovery efforts
- Reporting promptly: Notify banks and authorities immediately
- Preserving evidence: Maintain all related communications
Implementation Priorities
Organizations should prioritize based on risk:
- Immediate: Implement bank change detection and verification
- Short-term: Establish vendor baselines for high-volume vendors
- Medium-term: Expand coverage to all vendors
- Ongoing: Enhance controls based on emerging threats
Measuring Effectiveness
Track prevention program effectiveness through:
- Detection rate: Percentage of changes caught before payment
- Verification compliance: Percentage of changes properly verified
- Control coverage: Percentage of payments subject to controls
- Incident rate: Successful diversion attempts over time
Payment diversion is preventable through systematic controls. Organizations that implement detection, verification, and authorization controls significantly reduce their exposure to vendor fraud.