Skip to main content

ACH Fraud

On this page
Prerequisites

Before diving into ACH fraud, understand:

TL;DR
  • ACH fraud = Unauthorized bank debits or fraudulent payment redirects
  • Different from card fraud: returns happen days later, liability rules differ, no chargeback system
  • BEC (Business Email Compromise) is the biggest ACH threat: $2.9B lost in 2023
  • Verification tools (Plaid, MX) help but don't eliminate risk
  • Return windows: 2 days for unauthorized consumer, 1 day for corporate, but fraud claims extend to 60+ days
  • Prevention: verify bank ownership, validate payee identity, implement dual authorization

ACH fraud works differently than card fraud. The timing is slower, the liability is murkier, and the biggest threat doesn't even touch your payment system.

ACH vs. Card Fraud

FactorCard FraudACH Fraud
Real-time authorizationYesNo
Instant decline possibleYesNo (settles first)
Dispute timeline60-120 days2-60 days
Liability frameworkClear (network rules)Murky (Reg E, UCC, NACHA)
Fraud detection toolsMatureLimited
Liability shift availableYes (3DS)No

Types of ACH Fraud

1. Business Email Compromise (BEC)

The biggest ACH threat. $2.9 billion in losses in 2023 (FBI IC3 report).

BEC doesn't hack your payment system. It tricks your employees into making legitimate-looking payments to fraudsters.

BEC VariantHow It Works
Invoice fraudFake or modified vendor invoice with fraudster's bank details
CEO impersonation"Urgent" email from "CEO" requesting wire/ACH payment
Vendor impersonationEmail from compromised vendor requesting updated bank info
Payroll redirectEmployee "requests" direct deposit change to fraudster account
Lawyer impersonationFake attorney requesting payment for confidential matter

Detection signals:

  • Email domain slightly off (acme-inc.com vs. acmeinc.com)
  • Urgency pressure ("must send today")
  • Request to bypass normal approval process
  • New or changed bank account details
  • Request to keep transaction confidential

Prevention:

  • Verify bank changes by phone (using known number, not email signature)
  • Dual authorization for payments above threshold
  • Payment verification callbacks for new vendors
  • Email security (DMARC, SPF, DKIM)
  • Employee training on BEC tactics

2. Unauthorized Account Debits

Someone debits a bank account without authorization. The account holder files a return.

ScenarioHow It Happens
Stolen account credentialsFraudster obtains routing/account numbers
Account takeoverFraudster takes over victim's account, initiates ACH
Subscription abuseCompany continues billing after cancellation
Identity theftFraudster opens account in victim's name

Return codes you'll see:

  • R10: Customer advises unauthorized (consumer)
  • R29: Corporate customer advises not authorized
  • R07: Authorization revoked

3. Return Manipulation

Legitimate customer initiates payment, then claims unauthorized to get money back.

This is ACH's version of "friendly fraud":

  • Customer authorized the payment
  • Customer received goods/services
  • Customer claims "unauthorized" to reverse payment

Challenge: Proving authorization is harder for ACH than cards. No 3DS, no CVV, no signature.

4. Push Payment Fraud

Victim is tricked into sending money to fraudster's account.

Unlike unauthorized debits (pulls), push payments are initiated by the victim, so they're nearly impossible to recover.

ScenarioExample
Romance scamVictim sends money to fake romantic interest
Investment scamVictim invests in fake opportunity
Overpayment scamVictim "refunds" overpayment from fake check

Your exposure: If you're a platform facilitating person-to-person transfers, push payment fraud can hit your reputation and create regulatory scrutiny.


ACH Return Codes That Signal Fraud

Return CodeMeaningFraud Signal?
R01Insufficient fundsUsually not fraud
R02Account closedCould be stolen account
R03No account / unable to locateFake account number
R04Invalid account numberTypo or fake
R07Authorization revokedCustomer cancellation
R08Payment stoppedCustomer dispute
R10Customer advises unauthorizedFraud or friendly fraud
R11Check truncation entry returnError
R29Corporate unauthorizedFraud or friendly fraud

R10 Deep Dive

R10 (Customer Advises Not Authorized) is the ACH equivalent of a fraud chargeback.

Timeline:

  • Consumer can claim unauthorized for 60 days after statement
  • Bank must investigate and provisionally credit within 10 days
  • You see the return 2-3 days after bank initiates

Your options:

  • Accept the return
  • Provide evidence of authorization (difficult without proper documentation)
  • Pursue customer directly (collections, legal)

Prevention: Verify bank account ownership before debiting.


ACH Verification Tools

Bank Account Verification

Tools that confirm account ownership:

ToolWhat It DoesLimitations
PlaidLinks to bank, verifies ownershipCustomer must authenticate
MXSimilar account linkingCustomer must authenticate
YodleeAccount aggregationCustomer must authenticate
Micro-depositsDeposits 2 small amounts, customer verifiesSlow (2-3 days), can be gamed
PrenotesZero-dollar test transactionOnly checks account exists, not ownership

What Verification Does and Doesn't Prove

Verification TypeProvesDoesn't Prove
Plaid/MX account linkAccount exists, customer can log inCustomer owns account (could be ATO)
Micro-deposit verificationAccount exists, someone can see depositsAccount ownership
Name matchName on accountAccount wasn't compromised
Balance checkFunds availableFunds will still be there tomorrow
Verification Limits

No verification tool prevents BEC. BEC fraud uses legitimate, verified accounts belonging to fraudsters. Verification confirms the account is real, not that the payee is legitimate.


Timing Windows and Liability

Consumer ACH (Reg E)

TimeframeConsumer Liability
Report within 2 business daysMax $50
Report within 60 daysMax $500
After 60 daysUnlimited (depends on bank)

For merchants: This means a consumer can claim unauthorized up to 60 days later and you'll see an R10 return.

Corporate ACH (UCC)

Corporate accounts have different rules:

  • No Reg E protection
  • Must report unauthorized by next business day (often)
  • Bank agreements vary significantly

For merchants: Corporate returns are faster (R29), but corporate claims of unauthorized are rarer.

Same-Day ACH

Same-day ACH (SDA) speeds up settlement but also speeds up fraud:

  • Funds move same day
  • Less time to catch fraudulent transactions
  • Returns still take 2+ days

Prevention Strategies

For Inbound Payments (Customers Paying You)

StrategyWhat It Does
Bank account verificationConfirm account exists and customer can access
Name matchingCheck name on account matches customer name
First-payment holdsHold funds for 3-5 days on new accounts
Balance verificationConfirm funds available before shipping
Velocity limitsLimit new account payment amounts

For Outbound Payments (You Paying Others)

StrategyWhat It Does
Dual authorizationTwo approvers for payments above threshold
Callback verificationCall vendor to verify bank changes (use known number)
Payment delay24-48 hour hold on new payee payments
Email securityDMARC, SPF, DKIM to prevent spoofing
TrainingEmployees trained on BEC tactics

BEC-Specific Controls

□ All bank account changes require phone verification
□ Dual authorization for payments > $X
□ 24-hour delay on payments to new accounts
□ Vendor management database (no ad-hoc payments)
□ Email security configured and monitored
□ Regular BEC awareness training
□ Clear escalation path for suspicious requests

Responding to ACH Fraud

When You Receive an R10/R29 Return

□ Identify the transaction and customer
□ Review authorization evidence
□ Check for pattern (same customer, same behavior)
□ Decide: accept return or dispute
□ If disputing: contact your bank with evidence
□ If accepting: blacklist customer, consider collections

When You Discover BEC

□ Immediately contact your bank
□ Request wire recall or ACH return (time-sensitive)
□ Document everything (emails, approvals, timeline)
□ Report to FBI IC3 (ic3.gov)
□ Engage legal if significant amount
□ Review and strengthen controls

Recovery Options

SituationRecovery Chance
Caught within hoursMedium (wire recall may work)
Caught within 1-2 daysLow (funds often moved)
Caught after settlementVery low
Fraudster's account still has fundsBetter (legal action)

Test to Run

ACH fraud prevention audit:

Inbound payments:
□ How do we verify bank account ownership?
□ Do we hold first ACH payments from new customers?
□ What's our R10 rate? Is it trending up?

Outbound payments:
□ Who can add new payees?
□ How do we verify bank account changes?
□ Do we have dual authorization for large payments?
□ When did we last train staff on BEC?

Record answers. If you can't answer these, you have gaps.

Scale Callout

VolumeFocus
Under $100k/mo ACHBasic verification (Plaid or micro-deposits). Manual review of returns.
$100k-$1M/mo ACHAutomated verification. First-payment holds. R10 monitoring.
Over $1M/mo ACHFull verification stack. Balance checks. Velocity limits. Real-time return monitoring.
B2B outbound paymentsBEC controls are critical. Dual auth. Callback verification.

Where This Breaks

  1. BEC bypasses payment controls. BEC tricks employees into making legitimate payments. Your payment fraud detection won't catch it because the payment itself is authorized.

  2. Verification doesn't prove payee identity. Verifying a bank account confirms the account is real. It doesn't confirm the payee is who they claim to be.

  3. Same-day ACH reduces detection time. Faster settlement means less time to catch fraud before funds move.

  4. Corporate accounts have weaker protection. No Reg E means fewer consumer protections. Corporate fraud can be harder to recover.


Next Steps

Accepting ACH payments?

  1. Implement bank verification → Plaid, MX, or micro-deposits
  2. Hold first payments → 3-5 day hold on new accounts
  3. Monitor R10 returns → Track rate and investigate spikes

Making ACH payments?

  1. Implement dual authorization → Two approvers above threshold
  2. Verify bank changes by phone → Never trust email alone
  3. Train on BEC → Quarterly awareness training

Had an ACH fraud incident?

  1. Contact bank immediately → Speed matters for recovery
  2. Report to FBI IC3 → ic3.gov
  3. Review controls → What would have prevented this?