SMBCyberHub - Cybersecurity Compliance Kits for Small Business SMBCyberHub Home

Stop Payment Fraud: A Comprehensive Callback Playbook for Invoice & Bank-Detail Changes

21 Sept 2025

When money is about to move—especially after an email asking you to update bank details or pay a new account—you have one job: slow down and verify using a callback you control. This simple playbook turns a risky moment into a safe one.

Bottom line: Never trust payment-change instructions received by email alone. Call a known contact using a number from your records (not the email) and confirm, line by line.

The Growing Threat of Payment Fraud

Why Small Businesses Are Targets

Payment fraud is one of the fastest-growing cyber threats for small businesses because:

High Success Rate:

  • 70% of businesses experience attempted payment fraud
  • Average loss: €35,000 per successful attack
  • Recovery rate: Only 30% of funds are recovered
  • Attack frequency: Increasing by 40% year-over-year

Why It Works So Well:

  • Trust exploitation: Attackers use familiar vendor names
  • Urgency tactics: Create pressure to act immediately
  • Email compromise: Business Email Compromise (BEC) is common
  • Low technical barriers: No malware required

Common Attack Vectors:

  • Compromised email accounts: Attackers access business emails
  • Vendor impersonation: Fake emails from known suppliers
  • Invoice manipulation: Altered PDFs and attachments
  • Domain spoofing: Similar-looking email addresses
  • Social engineering: Psychological manipulation tactics

The Callback Playbook (10 minutes)

Step 1: Pause & Document (60 seconds)

Before touching your finance system, take immediate action to preserve evidence.

What to Document:

  • Screenshot the email (including headers if possible)
  • Save the original message (don’t delete)
  • Note the timestamp of when you received it
  • Identify the sender (display name and email address)
  • Check for attachments (save them for analysis)

Why This Matters:

  • Evidence preservation: Helps banks and insurers investigate
  • Timeline documentation: Establishes when the attack occurred
  • Pattern recognition: Helps identify similar future attacks
  • Legal requirements: May be needed for fraud reports

Step 2: Find the Known Contact Information

Use trusted sources for contact information, not the potentially compromised email.

Reliable Sources:

  • Vendor contracts: Official agreements with contact details
  • Previous invoices: Use contact information from past invoices
  • CRM system: Verified vendor contact records
  • Company website: Official contact pages
  • Business cards: Physical cards from in-person meetings

What to Avoid:

  • Phone numbers in the email: May be fraudulent
  • Links in the email: May lead to fake websites
  • Reply-to addresses: May be spoofed
  • Attachments: May contain malware or fake information

Step 3: Call Back and Verify

Make the verification call using the known contact information.

Verification Script:

"Hi [Contact Name], this is [Your Name] from [Your Company]. 
I received an email requesting a change to your banking details.
I want to verify this information with you directly.

The change request is:
- Beneficiary name: [Read from email]
- Bank name: [Read from email]
- Branch location: [Read from email]
- Sort code/ABA/BIC/SWIFT: [Read from email]
- Account/IBAN: [Read from email]
- Invoice number(s): [Read from email]
- Total amount: [Read from email]

Can you please confirm each of these details is correct?"

Verification Best Practices:

  • Read each item exactly from the email
  • Ask for verbal confirmation of each detail
  • Note any discrepancies immediately
  • Stop immediately if they hesitate or refuse to verify
  • Document the conversation (date, time, person spoken to)

Step 4: Dual-Control (Maker-Checker)

Implement two-person approval for all financial changes.

Dual-Control Requirements:

  • Maker: Person who initiates the payment
  • Checker: Person who reviews and approves
  • Different roles: Different people with different responsibilities
  • Documentation: Both parties sign off on the change

Implementation Options:

  • Owner + Bookkeeper: Most common for small businesses
  • Manager + Staff: For larger organizations
  • Two Trusted Advisors: For solo founders
  • Accountant + Owner: For financial oversight

Approval Process:

  1. Maker prepares the payment
  2. Checker reviews all details
  3. Both parties confirm verification
  4. Documentation is signed and dated
  5. Payment is processed

Step 5: Update Safely with Audit Trail

If confirmed, update the vendor record with proper documentation.

Update Procedures:

  • Update vendor record in accounting system
  • Add audit note: “Verified by phone with [Name] on [Date]”
  • Include verification details: Who you spoke to, when, what was confirmed
  • Store screenshots: In finance folder with date stamps
  • Update payment methods: Only after verification complete

Audit Trail Elements:

  • Verification method: Phone callback
  • Contact person: Name and title
  • Verification date and time
  • Approver name and signature
  • Screenshot evidence
  • Change details: Before and after comparison

Step 6: First-Payment Micro-Check (Optional)

For large or sensitive payments, implement additional verification.

Micro-Payment Process:

  • Small test payment: Send €10-€50 first
  • Confirm receipt: Call vendor to confirm receipt
  • Verify amount: Confirm exact amount received
  • Release balance: Send remaining payment after confirmation

When to Use Micro-Payments:

  • Large payments: Over €5,000
  • New vendors: First-time payments
  • International payments: Cross-border transactions
  • Sensitive industries: Healthcare, legal, financial services

Step 7: Post-Change Monitoring

Implement ongoing monitoring to detect future issues.

Monitoring Activities:

  • Alert system: Set up notifications for bank detail changes
  • Regular reviews: Check vendor records monthly
  • Anomaly detection: Flag unusual patterns
  • Audit trails: Review verification documentation

Alert Configuration:

  • Bank detail changes: Immediate notification
  • New vendor additions: Review required
  • Payment method changes: Verification needed
  • Unusual amounts: Flag for review

Red Flags to Treat as “Stop Signs”

Communication Red Flags

  • Urgent tone: “Must act immediately,” “Time-sensitive”
  • Confidential requests: “Do not discuss with anyone”
  • Authority pressure: “CFO approved,” “Management approved”
  • Unusual timing: Outside normal business hours
  • Emotional manipulation: “We’ll lose the client if delayed”

Technical Red Flags

  • Email domain changes: company.co vs. company.com
  • Reply-to addresses: Different from sender address
  • Attachment only: No text in email body
  • Poor formatting: Grammar errors, inconsistent branding
  • Unusual requests: Changes to established payment methods

Business Process Red Flags

  • New banking country: Different from previous invoices
  • Slightly changed details: Minor variations in names or addresses
  • PDF-only invoices: No email body, just attachment
  • Last-minute changes: Urgent payment requests
  • Multiple changes: Several changes in short time

Psychological Red Flags

  • Fear tactics: “Account will be suspended”
  • Greed appeals: “Special discount if paid immediately”
  • Helpfulness requests: “Help us update our systems”
  • Authority exploitation: “CEO requires immediate action”
  • Confidentiality demands: “Keep this confidential”

Advanced Fraud Detection

Email Header Analysis

Learn to read email headers to identify potential fraud.

What to Check:

  • Return-Path: Where the email actually came from
  • Authentication-Results: SPF, DKIM, DMARC results
  • IP Address: Geographic location of sender
  • Message-ID: Unique identifier for the email

Header Analysis Tools:

  • MXToolbox: Email header analysis
  • Google Admin Console: Gmail header analysis
  • Microsoft 365: Message header analysis
  • Email Header Analyzer: Third-party tools

Domain Verification

Check if the sender domain is legitimate.

Domain Verification Steps:

  • WHOIS lookup: Check domain registration details
  • Website verification: Visit official website
  • Social media: Check official social media profiles
  • Business directories: Verify business registration

Red Flags in Domains:

  • Recently registered: Domain created in last 30 days
  • Hidden registration: Privacy protection enabled
  • Misspellings: Common typos in legitimate domains
  • Unusual TLDs: Uncommon top-level domains

Incident Response for Payment Fraud

Immediate Actions (First 5 Minutes)

  1. Stop the payment: Do not process the payment
  2. Document everything: Save emails, screenshots, headers
  3. Notify management: Inform leadership immediately
  4. Contact bank: Report suspected fraud
  5. Secure systems: Lock email accounts if compromised

Short-Term Response (First 24 Hours)

  1. Freeze accounts: Bank accounts and email accounts
  2. Investigate breach: Determine scope of compromise
  3. Report to authorities: File police report if needed
  4. Contact insurer: Report potential claim
  5. Review security: Identify vulnerabilities

Long-Term Response (First Week)

  1. Implement stronger controls: Add additional verification steps
  2. Train staff: Use incident as learning opportunity
  3. Update procedures: Strengthen payment processes
  4. Monitor for related attacks: Watch for follow-up attempts
  5. Document lessons learned: Improve future prevention

Comprehensive Defense Checklist

Pre-Payment Verification

  • Pause before processing any payment changes
  • Screenshot the request for evidence
  • Find known contact information
  • Call back using known phone number
  • Verify all details verbally
  • Implement dual-control approval
  • Document verification process

Red Flag Detection

  • Check for urgency in email tone
  • Verify email domain authenticity
  • Review sender details for consistency
  • Check for unusual payment methods
  • Look for psychological manipulation tactics
  • Verify attachment authenticity
  • Assess timing of request

Post-Payment Security

  • Update vendor records with audit notes
  • Store evidence in secure location
  • Monitor for unusual activity
  • Review payment patterns
  • Alert stakeholders of changes
  • Conduct regular security reviews
  • Update procedures based on lessons learned

Advanced Protection Strategies

Technical Controls

Implement technology to prevent payment fraud.

Email Security:

  • Advanced filtering: Block suspicious emails
  • Domain verification: Check sender authenticity
  • Attachment scanning: Scan for malware
  • Link analysis: Check link destinations

Financial System Security:

  • Multi-factor authentication: Require MFA for financial systems
  • Access controls: Limit who can make payments
  • Audit logging: Track all financial changes
  • Transaction monitoring: Flag unusual transactions

Vendor Management:

  • Vendor verification: Verify new vendors thoroughly
  • Regular reviews: Periodic vendor security assessments
  • Standardized processes: Consistent verification procedures
  • Risk assessment: Classify vendors by risk level

Process Controls

Implement robust business processes for financial security.

Segregation of Duties:

  • Maker-checker model: Two-person approval required
  • Role-based access: Limit access based on job function
  • Approval workflows: Multiple approval levels for different amounts
  • Exception handling: Clear process for unusual requests

Documentation Requirements:

  • Audit trails: Complete documentation for all changes
  • Verification records: Keep records of all verifications
  • Policy documentation: Written procedures for all processes
  • Training records: Document all security training

Key Takeaways

Remember These Rules

  1. Always verify payment changes by phone on known numbers
  2. Never trust email alone for financial changes
  3. Use dual-control for all payment changes
  4. Document everything for audit and investigation
  5. Train staff regularly on fraud prevention

Your Action Plan

Our cybersecurity compliance kits include payment security procedures, staff training on fraud prevention, and audit-ready policy templates for your team.

  • Implement callback playbook for all payment changes
  • Train all staff on payment fraud awareness
  • Set up dual-control approval processes
  • Configure email security filtering and monitoring
  • Implement vendor verification procedures
  • Regular security reviews and updates

Success Metrics

  • Zero successful payment fraud attempts
  • All payment changes verified by phone
  • Dual-control compliance for all sensitive payments
  • Staff awareness of fraud techniques
  • Documentation complete for all payment changes
  • Financial losses from fraud eliminated

Financial Regulations

  • PCI DSS: Payment Card Industry Data Security Standard
  • SOX: Sarbanes-Oxley Act for financial reporting
  • AML: Anti-Money Laundering regulations
  • KYC: Know Your Customer requirements

Data Protection

  • GDPR: Article 32 - Security of processing
  • Data breach notification: 72-hour reporting requirement
  • Documentation: Maintain records of security measures
  • Staff training: Regular security awareness training

Insurance Requirements

  • Cyber insurance: May require specific fraud prevention measures
  • Documentation: Evidence of security procedures
  • Reporting: Timely reporting of security incidents
  • Claims process: Proper documentation for claims

Download Your Free Cyber Security Training Kit

Need ready-to-use checklists and simple team training?
👉 Download the Free Cyber Security Training Kit


External Resources:

  • UK Action Fraud: Invoice fraud guidance
  • FBI Business Email Compromise: BEC prevention
  • Federal Trade Commission: Business email compromise
  • National Cyber Security Centre: Payment fraud prevention

Estimated Reading Time: 20 minutes
Aligned With: PCI DSS, SOX, GDPR Article 32
Target Audience: Small business owners, office managers, financial staff
Learning Objectives: Prevent payment fraud, implement callback verification, protect business finances

🎣 Complete Phishing Protection Kit

Get our phishing awareness training slides, staff quizzes, and prevention checklists. Everything you need to protect your team from email attacks.