Current Fraud Threats

Threats and fraud can be perpetuated through cyberattacks, business email compromise (BEC), email account compromise (EAC), ransomware, account takeover, social engineering, and even vendor impersonation fraud.

Protect Your Organization From Fraud

Threats and fraud can be perpetuated through cyberattacks, business email compromise (BEC), email account compromise (EAC), ransomware, account takeover, social engineering, synthetic fraud, and even vendor impersonation fraud. While these threats are not about a direct compromise of the ACH Network or other payment systems, they exploit vulnerabilities or gaps in processes or procedures. Nacha is committed to helping financial institutions, businesses, other organizations, and consumers protect themselves and prevent fraudulent activity. Download Nacha's "Protecting Against Cyber Fraud" booklet.

Protect Yourself From Fraud

Many consumers use third-party payment apps, also called person-to-person or peer-to-peer (P2P) and mobile wallet applications to pay for goods or services and to send money to friends and family. With the rise in the use of digital payments, the number of scams designed to defraud consumers has also increased. Read this Message from the Office of the Comptroller of the Currency (OCC) to help identify a potential scam and spot fraud before becoming a victim. (July 2022)