Stop Payment Fraud: A Comprehensive Callback Playbook for Invoice & Bank-Detail Changes
21 Sept 2025
When money is about to move—especially after an email asking you to update bank details or pay a new account—you have one job: slow down and verify using a callback you control. This simple playbook turns a risky moment into a safe one.
Bottom line: Never trust payment-change instructions received by email alone. Call a known contact using a number from your records (not the email) and confirm, line by line.
The Growing Threat of Payment Fraud
Why Small Businesses Are Targets
Payment fraud is one of the fastest-growing cyber threats for small businesses because:
High Success Rate:
- 70% of businesses experience attempted payment fraud
- Average loss: €35,000 per successful attack
- Recovery rate: Only 30% of funds are recovered
- Attack frequency: Increasing by 40% year-over-year
Why It Works So Well:
- Trust exploitation: Attackers use familiar vendor names
- Urgency tactics: Create pressure to act immediately
- Email compromise: Business Email Compromise (BEC) is common
- Low technical barriers: No malware required
Common Attack Vectors:
- Compromised email accounts: Attackers access business emails
- Vendor impersonation: Fake emails from known suppliers
- Invoice manipulation: Altered PDFs and attachments
- Domain spoofing: Similar-looking email addresses
- Social engineering: Psychological manipulation tactics
The Callback Playbook (10 minutes)
Step 1: Pause & Document (60 seconds)
Before touching your finance system, take immediate action to preserve evidence.
What to Document:
- Screenshot the email (including headers if possible)
- Save the original message (don’t delete)
- Note the timestamp of when you received it
- Identify the sender (display name and email address)
- Check for attachments (save them for analysis)
Why This Matters:
- Evidence preservation: Helps banks and insurers investigate
- Timeline documentation: Establishes when the attack occurred
- Pattern recognition: Helps identify similar future attacks
- Legal requirements: May be needed for fraud reports
Step 2: Find the Known Contact Information
Use trusted sources for contact information, not the potentially compromised email.
Reliable Sources:
- Vendor contracts: Official agreements with contact details
- Previous invoices: Use contact information from past invoices
- CRM system: Verified vendor contact records
- Company website: Official contact pages
- Business cards: Physical cards from in-person meetings
What to Avoid:
- Phone numbers in the email: May be fraudulent
- Links in the email: May lead to fake websites
- Reply-to addresses: May be spoofed
- Attachments: May contain malware or fake information
Step 3: Call Back and Verify
Make the verification call using the known contact information.
Verification Script:
"Hi [Contact Name], this is [Your Name] from [Your Company].
I received an email requesting a change to your banking details.
I want to verify this information with you directly.
The change request is:
- Beneficiary name: [Read from email]
- Bank name: [Read from email]
- Branch location: [Read from email]
- Sort code/ABA/BIC/SWIFT: [Read from email]
- Account/IBAN: [Read from email]
- Invoice number(s): [Read from email]
- Total amount: [Read from email]
Can you please confirm each of these details is correct?"
Verification Best Practices:
- Read each item exactly from the email
- Ask for verbal confirmation of each detail
- Note any discrepancies immediately
- Stop immediately if they hesitate or refuse to verify
- Document the conversation (date, time, person spoken to)
Step 4: Dual-Control (Maker-Checker)
Implement two-person approval for all financial changes.
Dual-Control Requirements:
- Maker: Person who initiates the payment
- Checker: Person who reviews and approves
- Different roles: Different people with different responsibilities
- Documentation: Both parties sign off on the change
Implementation Options:
- Owner + Bookkeeper: Most common for small businesses
- Manager + Staff: For larger organizations
- Two Trusted Advisors: For solo founders
- Accountant + Owner: For financial oversight
Approval Process:
- Maker prepares the payment
- Checker reviews all details
- Both parties confirm verification
- Documentation is signed and dated
- Payment is processed
Step 5: Update Safely with Audit Trail
If confirmed, update the vendor record with proper documentation.
Update Procedures:
- Update vendor record in accounting system
- Add audit note: “Verified by phone with [Name] on [Date]”
- Include verification details: Who you spoke to, when, what was confirmed
- Store screenshots: In finance folder with date stamps
- Update payment methods: Only after verification complete
Audit Trail Elements:
- Verification method: Phone callback
- Contact person: Name and title
- Verification date and time
- Approver name and signature
- Screenshot evidence
- Change details: Before and after comparison
Step 6: First-Payment Micro-Check (Optional)
For large or sensitive payments, implement additional verification.
Micro-Payment Process:
- Small test payment: Send €10-€50 first
- Confirm receipt: Call vendor to confirm receipt
- Verify amount: Confirm exact amount received
- Release balance: Send remaining payment after confirmation
When to Use Micro-Payments:
- Large payments: Over €5,000
- New vendors: First-time payments
- International payments: Cross-border transactions
- Sensitive industries: Healthcare, legal, financial services
Step 7: Post-Change Monitoring
Implement ongoing monitoring to detect future issues.
Monitoring Activities:
- Alert system: Set up notifications for bank detail changes
- Regular reviews: Check vendor records monthly
- Anomaly detection: Flag unusual patterns
- Audit trails: Review verification documentation
Alert Configuration:
- Bank detail changes: Immediate notification
- New vendor additions: Review required
- Payment method changes: Verification needed
- Unusual amounts: Flag for review
Red Flags to Treat as “Stop Signs”
Communication Red Flags
- Urgent tone: “Must act immediately,” “Time-sensitive”
- Confidential requests: “Do not discuss with anyone”
- Authority pressure: “CFO approved,” “Management approved”
- Unusual timing: Outside normal business hours
- Emotional manipulation: “We’ll lose the client if delayed”
Technical Red Flags
- Email domain changes: company.co vs. company.com
- Reply-to addresses: Different from sender address
- Attachment only: No text in email body
- Poor formatting: Grammar errors, inconsistent branding
- Unusual requests: Changes to established payment methods
Business Process Red Flags
- New banking country: Different from previous invoices
- Slightly changed details: Minor variations in names or addresses
- PDF-only invoices: No email body, just attachment
- Last-minute changes: Urgent payment requests
- Multiple changes: Several changes in short time
Psychological Red Flags
- Fear tactics: “Account will be suspended”
- Greed appeals: “Special discount if paid immediately”
- Helpfulness requests: “Help us update our systems”
- Authority exploitation: “CEO requires immediate action”
- Confidentiality demands: “Keep this confidential”
Advanced Fraud Detection
Email Header Analysis
Learn to read email headers to identify potential fraud.
What to Check:
- Return-Path: Where the email actually came from
- Authentication-Results: SPF, DKIM, DMARC results
- IP Address: Geographic location of sender
- Message-ID: Unique identifier for the email
Header Analysis Tools:
- MXToolbox: Email header analysis
- Google Admin Console: Gmail header analysis
- Microsoft 365: Message header analysis
- Email Header Analyzer: Third-party tools
Domain Verification
Check if the sender domain is legitimate.
Domain Verification Steps:
- WHOIS lookup: Check domain registration details
- Website verification: Visit official website
- Social media: Check official social media profiles
- Business directories: Verify business registration
Red Flags in Domains:
- Recently registered: Domain created in last 30 days
- Hidden registration: Privacy protection enabled
- Misspellings: Common typos in legitimate domains
- Unusual TLDs: Uncommon top-level domains
Incident Response for Payment Fraud
Immediate Actions (First 5 Minutes)
- Stop the payment: Do not process the payment
- Document everything: Save emails, screenshots, headers
- Notify management: Inform leadership immediately
- Contact bank: Report suspected fraud
- Secure systems: Lock email accounts if compromised
Short-Term Response (First 24 Hours)
- Freeze accounts: Bank accounts and email accounts
- Investigate breach: Determine scope of compromise
- Report to authorities: File police report if needed
- Contact insurer: Report potential claim
- Review security: Identify vulnerabilities
Long-Term Response (First Week)
- Implement stronger controls: Add additional verification steps
- Train staff: Use incident as learning opportunity
- Update procedures: Strengthen payment processes
- Monitor for related attacks: Watch for follow-up attempts
- Document lessons learned: Improve future prevention
Comprehensive Defense Checklist
Pre-Payment Verification
- Pause before processing any payment changes
- Screenshot the request for evidence
- Find known contact information
- Call back using known phone number
- Verify all details verbally
- Implement dual-control approval
- Document verification process
Red Flag Detection
- Check for urgency in email tone
- Verify email domain authenticity
- Review sender details for consistency
- Check for unusual payment methods
- Look for psychological manipulation tactics
- Verify attachment authenticity
- Assess timing of request
Post-Payment Security
- Update vendor records with audit notes
- Store evidence in secure location
- Monitor for unusual activity
- Review payment patterns
- Alert stakeholders of changes
- Conduct regular security reviews
- Update procedures based on lessons learned
Advanced Protection Strategies
Technical Controls
Implement technology to prevent payment fraud.
Email Security:
- Advanced filtering: Block suspicious emails
- Domain verification: Check sender authenticity
- Attachment scanning: Scan for malware
- Link analysis: Check link destinations
Financial System Security:
- Multi-factor authentication: Require MFA for financial systems
- Access controls: Limit who can make payments
- Audit logging: Track all financial changes
- Transaction monitoring: Flag unusual transactions
Vendor Management:
- Vendor verification: Verify new vendors thoroughly
- Regular reviews: Periodic vendor security assessments
- Standardized processes: Consistent verification procedures
- Risk assessment: Classify vendors by risk level
Process Controls
Implement robust business processes for financial security.
Segregation of Duties:
- Maker-checker model: Two-person approval required
- Role-based access: Limit access based on job function
- Approval workflows: Multiple approval levels for different amounts
- Exception handling: Clear process for unusual requests
Documentation Requirements:
- Audit trails: Complete documentation for all changes
- Verification records: Keep records of all verifications
- Policy documentation: Written procedures for all processes
- Training records: Document all security training
Key Takeaways
Remember These Rules
- Always verify payment changes by phone on known numbers
- Never trust email alone for financial changes
- Use dual-control for all payment changes
- Document everything for audit and investigation
- Train staff regularly on fraud prevention
Your Action Plan
Our cybersecurity compliance kits include payment security procedures, staff training on fraud prevention, and audit-ready policy templates for your team.
- Implement callback playbook for all payment changes
- Train all staff on payment fraud awareness
- Set up dual-control approval processes
- Configure email security filtering and monitoring
- Implement vendor verification procedures
- Regular security reviews and updates
Success Metrics
- Zero successful payment fraud attempts
- All payment changes verified by phone
- Dual-control compliance for all sensitive payments
- Staff awareness of fraud techniques
- Documentation complete for all payment changes
- Financial losses from fraud eliminated
Compliance and Legal Considerations
Financial Regulations
- PCI DSS: Payment Card Industry Data Security Standard
- SOX: Sarbanes-Oxley Act for financial reporting
- AML: Anti-Money Laundering regulations
- KYC: Know Your Customer requirements
Data Protection
- GDPR: Article 32 - Security of processing
- Data breach notification: 72-hour reporting requirement
- Documentation: Maintain records of security measures
- Staff training: Regular security awareness training
Insurance Requirements
- Cyber insurance: May require specific fraud prevention measures
- Documentation: Evidence of security procedures
- Reporting: Timely reporting of security incidents
- Claims process: Proper documentation for claims
Download Your Free Cyber Security Training Kit
Need ready-to-use checklists and simple team training?
👉 Download the Free Cyber Security Training Kit
Related Resources
Internal Links:
- How to Spot Social Engineering in Messages and Meetings
- What Happens After a Phishing Click?
- The True Cost of a Breach for SMBs
External Resources:
- UK Action Fraud: Invoice fraud guidance
- FBI Business Email Compromise: BEC prevention
- Federal Trade Commission: Business email compromise
- National Cyber Security Centre: Payment fraud prevention
Estimated Reading Time: 20 minutes
Aligned With: PCI DSS, SOX, GDPR Article 32
Target Audience: Small business owners, office managers, financial staff
Learning Objectives: Prevent payment fraud, implement callback verification, protect business finances
🎣 Complete Phishing Protection Kit
Get our phishing awareness training slides, staff quizzes, and prevention checklists. Everything you need to protect your team from email attacks.