Protect your company’s reputation and revenue from the first time you engage with a supplier and throughout the supplier lifecycle.
Supplier payment fraud is accelerating across U.S. organizations, including small and mid-sized companies with domestic suppliers. Business Email Compromise (BEC), vendor impersonation, and bank account change fraud are increasing in both frequency and sophistication. At the same time, artificial intelligence is enabling fraudsters to scale attacks faster and craft more convincing communications.
Organizations that modernize fraud prevention controls can significantly reduce supplier payment risk and limit financial, operational, and reputational exposure.
For U.S.-based companies engaging domestic suppliers, the risk of fraudulent payment activity is no longer hypothetical.
Fraud trends gathered from industry surveys point to a clear rise in attempted and successful fraud cases targeting procurement and accounts payable functions. This whitepaper demonstrates these trends and links them to broader developments in fraud techniques, including the role of artificial intelligence (AI).
The data and trends cited throughout this report are drawn from industry surveys and third-party fraud research published in 2024–2025.
Why Now?
The mainstream adoption of generative AI has changed the economics of fraud. Attacks that once required time and expertise can now be launched faster, personalized at scale, and executed with fewer resources.
According to the 2025 AFP Payments Fraud and Control Survey:
These patterns indicate that fraud is not only widespread but increasingly directed at traditional supplier payment processes.
Third-party research shows a notable year-over-year increase in vendor fraud:
This trend underscores how attackers prioritize procurement channels where controls are often weakest.
Business Email Compromise remains a dominant threat, with recent data showing the following:
These figures show that BEC is not just a concern for large enterprises; even smaller, down-market firms are frequent targets.
Fraud targeting supplier payments rarely begins with a system breach. Instead, it enters through routine procurement and accounts payable workflows that rely on speed, trust, and manual verification.
Common scenarios include:
These attacks succeed not because teams lack diligence, but because they exploit trusted processes. Procurement and AP teams are expected to move quickly, manage high transaction volumes, and maintain supplier relationships. Fraudsters take advantage of that operational pressure and even a single missed step can result in misdirected funds.
While fraud tactics vary, most supplier payment fraud follows a consistent pattern. Understanding this structure helps organizations identify control gaps before funds are released.
Fraud begins with access to a trusted communication channel or supplier relationship.
This may include:
At this stage, the attacker’s goal is credibility. They establish trust by appearing legitimate within existing procurement or AP workflows.
Once trust is established, the attacker introduces a change designed to redirect payment.
Common manipulation tactics include:
The objective is subtle redirection. In many cases, the change appears routine and aligns with standard business activity.
The final step is payment execution.
Funds are transferred via:
Once payment is released to a fraudulent account, recovery becomes significantly more difficult. The success of the attack often depends on how quickly the fraud is detected.
Most fraud prevention failures occur when controls focus only on one stage of the process. Strong email security without bank validation leaves a gap. Manual callbacks without monitoring supplier changes create another.
Effective fraud prevention requires controls across all three stages: access, manipulation, and execution.
Organizations that understand this pattern are better positioned to interrupt fraud before funds leave the business.
Fraud tactics are evolving alongside advances in artificial intelligence. What once required skilled social engineering and significant manual effort can now be automated, refined, and scaled.
AI is changing supplier payment fraud in measurable ways:
The result is not just more fraud attempts, but more sophisticated ones. As the cost and effort required to execute convincing attacks decline, volume increases. For organizations relying on manual review and human judgment alone, distinguishing legitimate requests from fraudulent ones becomes significantly more difficult.
While fraud attempts continue to rise, many organizations still rely on manual processes to validate supplier information and payment changes.
Industry surveys consistently show that Business Email Compromise (BEC) and payment diversion fraud remain among the most common and costly attack types. Yet traditional verification methods have changed little. Procurement and accounts payable teams often depend on:
These controls were designed for a lower-volume, lower-sophistication threat environment.
Manual verification introduces several structural weaknesses:
As fraud tactics become more scalable and convincing, especially with AI-assisted impersonation, controls that rely primarily on human review and email-based validation are increasingly difficult to defend.
Modern fraud prevention requires verification processes that are independent, automated, and embedded directly into procurement and payment workflows.
Beyond direct financial loss, fraud events carry hidden and reputational costs:
These figures highlight why organizations should view fraud prevention as a strategic priority, not a compliance task.
To reduce exposure to supplier payment fraud and Business Email Compromise (BEC), organizations should move beyond isolated controls and adopt a layered fraud prevention strategy. Effective protection requires addressing fraud across the full supplier lifecycle, from onboarding through payment execution.
Fraud often begins with communication-based deception. Organizations should reduce the likelihood of fraudulent requests reaching procurement and AP teams by strengthening front-end controls, including:
This layer helps stop fraud attempts before they reach financial workflows.
Even with strong email security, fraudulent requests can still reach AP teams. That makes bank account validation a critical control point. Organizations should reduce risk by implementing:
This layer prevents payments from being sent to incorrect or fraudulent accounts.
Fraud risk does not end after onboarding. Supplier records can be manipulated over time, and fraudsters often wait for the right opportunity to strike. Organizations should adopt continuous monitoring practices, including:
This layer ensures supplier data integrity remains protected over time.
Organizations that implement all three layers create a stronger defense against modern fraud tactics. Instead of relying on manual processes and reactive controls, a layered strategy reduces fraud exposure before payments are initiated, approved, and executed.
Fraud targeting supplier payments and BEC attacks is increasing in both frequency and sophistication.
U.S. companies, including those with fewer than 1,000 employees, face significant exposure because many still rely on manual, error-prone processes. With AI lowering the barrier to crafting convincing attacks, organizations that fail to modernize their fraud prevention controls risk financial loss, operational disruption, and reputational damage.
Organizations can reduce supplier payment fraud risk by implementing automated bank account validation, continuous supplier monitoring, and layered fraud controls across procurement and AP workflows.
Explore our ROI calculator, developed in partnership with Forrester, by navigating to the link below and selecting “configure data” on the right-hand side.
