Email Security: Stopped Invoice Fraud Before Money Moved

At a Glance

Threat

Attack Pattern

Potential Exposure

Nexus ITS Deliverable

Social engineering / invoice fraud with ACH remittance change attempt

Look-alike domains + repeated invoice emails + phone pressure

Approximately $91K if payment diversion had succeeded

Rapid investigation + vendor verification + after-incident report

The Situation

A malicious actor targeted Accounts Payable with a familiar business problem: an ‘outstanding invoice’ and a request to update payment instructions. The goal was straightforward; redirect future payments to a fraudulent bank account by convincing staff to accept new ACH remittance details.

What Made this Attempt Convincing

  • Look-alike domains were registered to mimic a legitimate vendor identity.
  • Invoice emails were sent repeatedly over multiple days to both an AP mailbox and an individual employee.
  • When emails didn’t arrive, the attacker escalated to phone calls to create urgency and steer the user into ‘helping’ with delivery.
  • The initial email content and phone calls did not focus on updated ACH instructions.
  • Late-stage phone calls and emails focused on immediate urgency to update ACH instructions an action that can create ongoing financial exposure if accepted.

The Outcome

Nexus ITS managed email security quarantined the fraudulent invoices before they reached end users, blocking the most dangerous step of the attack: delivery to the inbox. The investigation then confirmed the attempted impersonation and prevented release of quarantined messages. The investigation also led to the discovery of additional phone calls both to the company phone number and personal cell phone.

Why this matters: Invoice fraud is rarely technical. It is procedural. When security controls prevent delivery, attackers often pivot to pressure tactics (calls, urgency, persistence) to bypass process.

How Nexus ITS Responded

  • Treated a quarantine restore request as a security review, not a convenience task.
  • Flagged suspicious indicators and identified multiple related messages using similar look-alike domains.
  • Verified the vendor using independently sourced contact information and confirmed legitimate vs fraudulent domains.
  • Denied restoration of quarantined messages to reduce exposure and user interaction risk.
  • Delivered an after-incident report with timeline, findings, and recommendations.

Results for the Business

  • Fraudulent invoices were blocked before delivery, reducing the likelihood of a payment diversion event.
  • The organization avoided acting on unverified remittance changes during a high-pressure scenario.
  • Leadership received clear documentation to reinforce controls, training, and AP verification standards.

Key Takeaways for Finance and Operations

  • If an invoice email is quarantined or ‘missing,’ assume there is a security reason and use a verified channel to validate the request.
  • Never accept changes to bank details or remittance instructions based on an email thread alone.
  • Implement a simple approval standard: call-back verification + two-person review for payment instruction changes.
  • Quarantine restore requests should route to IT/security review by default.

Recommended Safeguards Nexus ITS Helps Implement

  • Enhanced email filtering for impersonation, domain reputation/age, and suspicious invoice patterns.
  • A ‘no restore without review’ workflow for invoice and payment-change messages.
  • AP verification playbook (call-back scripts, approval steps, and vendor domain allow-listing where appropriate).
  • Short, practical employee training focused on invoice fraud and payment change social engineering.

About Nexus IT Solutions

Nexus ITS helps small and midsize businesses protect critical workflows with managed IT and security services. We focus on practical controls that reduce real financial risk; like invoice fraud, business email compromise, and payment diversion attempts.

Ready to reduce invoice fraud risk? Nexus ITS can start with a short discovery call and then provide a concise action plan focused on the controls that prevent payment-change scams, without jargon or alarmism.

Testimonials
“This is just placeholder text. Don’t be alarmed, this is just here to fill up space since your finalized copy isn’t ready yet. Once we have your content finalized, we’ll replace this placeholder text with your real content. Sometimes it’s nice to put in text just to get an idea of how text will fill in a space on your website.”
testimonial-img

Client’s Name

Description

Additional Case Studies

Not quite convinced yet? That’s okay. Trust is a two-way commitment, and lasting partnerships are built on it.

Text Placeholder 1

This is just placeholder text. Don’t be alarmed, this is just here to fill up space since your finalized copy isn’t ready yet. Once we have your content finalized, we’ll replace this placeholder text with your real content. Sometimes it’s…

Text Placeholder 2

This is just placeholder text. Don’t be alarmed, this is just here to fill up space since your finalized copy isn’t ready yet. Once we have your content finalized, we’ll replace this placeholder text with your real content. Sometimes it’s…

Experience the Nexus ITS Difference

Don't wait any longer to revolutionize your IT experience. Experience the Nexus ITS difference for yourself – schedule a consultation now and discover how our tailored solutions can transform your business operations.

Scroll to Top