Skip to main content

Looking for Valuant? You are in the right place!

Valuant is now Abrigo, giving you a single source to Manage Risk and Drive Growth

Make yourself at home – we hope you enjoy your new web experience.

Looking for DiCOM? You are in the right place!

DiCOM Software is now part of Abrigo, giving you a single source to Manage Risk and Drive Growth. Make yourself at home – we hope you enjoy your new web experience.

Looking for TPG Software? You are in the right place!

TPG Software is now part of Abrigo. You can continue to count on the world-class Investment Accounting software and services you’ve come to expect, plus all that Abrigo has to offer.

Make yourself at home – we hope you enjoy being part of our community.

How financial institutions can stay ahead of rising ACH fraud

Terri Luttrell, CAMS-Audit, CFCS
October 27, 2025
Read Time: 0 min

Combat emerging ACH fraud threats with technology 

The shift toward digital banking and real-time payments has created new opportunities for innovation, but also for fraud. According to Nacha, the Automated Clearing House (ACH) network saw a 6.7% increase in payment volume to 33.6 billion payments in 2024, as well as an 11.6% increase in business-to-business (B2B) ACH payments. This growth, unfortunately, comes with increased risks of fraud.

According to the 2025 AFP Payments Fraud and Control Survey Report, 38% of organizations experienced ACH debit fraud in 2024, and 20% were victims of ACH credit fraud. ACH fraud threats are becoming more sophisticated, posing serious financial, regulatory, and reputational risks. Banks and credit unions need to recognize these risks early and ensure that appropriate controls, staffing, and technology are in place to mitigate them.

Understanding ACH fraud

ACH payments are a vital component of modern banking, providing efficient and cost-effective methods for transferring funds. However, as digital transactions increase in volume and speed, cybercriminals are becoming more opportunistic and more creative. Bad actors are increasingly targeting both business and consumer accounts through a variety of sophisticated methods, many of which can be challenging to detect using outdated monitoring approaches.

Learn more about Nacha's 2026 fraud monitoring rules

Read the whitepaper

Common tactics contributing to rising ACH fraud threats include:

  • Account takeover through phishing or malware: Fraudsters gain unauthorized access to online banking credentials through phishing emails, spoofed websites, or malicious software. Once inside, they can initiate unauthorized ACH transfers from compromised accounts. These takeovers are particularly dangerous because they often involve the legitimate account holder's information, making detection more difficult.
  • Ransomware: While often associated with data breaches, ransomware attacks are increasingly being used as a gateway to financial fraud. Once a system is compromised, fraudsters may divert ACH payroll files, modify payment instructions, or lock down critical banking applications, halting legitimate operations and demanding payment via ACH or wire.
  • Social engineering scams like romance scams: Criminals build fake online relationships to manipulate victims emotionally, often elderly or vulnerable individuals, into sending funds via ACH. These scams rely on trust and typically involve repeated transfers over time, making them harder to identify as fraud from a transaction pattern standpoint.
  • Business email compromise (BEC): Fraudsters infiltrate or spoof a company's email system to pose as executives, vendors, or employees. They then submit fraudulent ACH payment requests to finance teams or account managers, often under the guise of urgent matters. BEC attacks continue to be among the costliest forms of fraud, particularly for small and mid-sized businesses.
  • Synthetic identity fraud: In this scheme, fraudsters combine real and fictitious information to create entirely new identities, often opening accounts and building credit histories over time. These fake identities can then be used to initiate fraudulent ACH transactions, which are especially difficult to detect because the identities often appear legitimate in credit and identity verification systems.
  • Authorized push payment (APP) fraud: In APP schemes, victims are tricked into sending ACH payments to fraudsters under pretenses, such as paying an impersonated vendor, making a down payment on a fake real estate transaction, or responding to a fake invoice. Because payments are often authorized, recovering funds can be difficult, making real-time monitoring and intervention essential.

What makes ACH fraud especially challenging is that it often stems from valid credentials or seemingly authorized activity, allowing it to bypass traditional red flags that might catch fraud.

Why financial institutions must act

Regulators continue to signal that fraud prevention is no longer a best practice; it’s a critical component of a sound AML/CFT compliance program. Both the Financial Crimes Enforcement Network (FinCEN) and the Federal Financial Institutions Examination Council (FFIEC) have reinforced expectations for layered security controls, particularly around high-risk transactions like ACH and wire. The FFIEC’s guidance on authentication and access management calls for anomaly detection and behavior-based monitoring for electronic payments, while FinCEN has named fraud among its top AML/CFT priorities. With the introduction of real-time payment methods like FedNow, institutions must also be prepared to make rapid decisions about the legitimacy of incoming and outgoing transactions—making it even more important that fraud detection tools and processes are integrated into the institution’s broader risk-based compliance strategy.

Core technology for fighting ACH fraud

To combat modern ACH fraud threats effectively, institutions require scalable and intelligent fraud detection tools that surpass static, rules-based systems. Key features that support proactive protection include:

  • Real-time monitoring across payment channels: Institutions should implement solutions that evaluate transactions as they occur, identifying anomalies in ACH activity such as unusual transaction amounts, geographies, or timing.
  • Behavioral analytics and machine learning: Technology that understands normal customer behavior can more accurately flag deviations. This is especially valuable in catching fraud attempts that don't trigger traditional rules.
  • Cross-channel analysis: Fraud rarely confines itself to one payment method. Systems should be able to analyze ACH activity in conjunction with wires, checks, and digital payments to detect broader fraud patterns.
  • Collaboration and escalation tools: The ability to flag suspicious accounts, automate escalations, and collaborate across AML and fraud teams helps reduce investigation time and improve case outcomes.

Building a holistic fraud program

ACH fraud threats don't exist in a vacuum. These threats intersect with broader fraud schemes, regulatory obligations, and customer service expectations. That's why a strong ACH fraud prevention program should be integrated with your institution's overall AML/CFT strategy. For most financial institutions, this means:

Technology alone won't eliminate fraud, but when combined with a well-resourced compliance program, it allows institutions to manage risk more effectively and respond with agility to emerging threats.

Staying ahead of ACH fraud threats

ACH fraud is not slowing down. As payment systems evolve, so do the methods used to exploit them. Criminals are adapting quickly, especially with the growing use of faster payments, leaving financial institutions with less time to detect and respond to suspicious activity. Staying ahead of these threats means more than just updating policies. It requires evaluating whether your current systems, staffing, and monitoring tools are equipped for today’s risks.

Institutions should take a risk-based approach by reviewing fraud detection capabilities, reassessing ACH-related controls, and ensuring teams are supported with the technology and training needed to act quickly.  Being proactive now helps avoid costly disruptions later and reinforces your commitment to protecting your clients and your institution.

About the Author

Terri Luttrell, CAMS-Audit, CFCS

Compliance and Engagement Director
Terri Luttrell is a seasoned AML professional and former director and AML/OFAC officer with over 20 years in the banking industry, working both in medium and large community and commercial banks ranging from $2 billion to $330 billion in asset size.

Full Bio

About Abrigo

Abrigo enables U.S. financial institutions to support their communities through technology that fights financial crime, grows loans and deposits, and optimizes risk. Abrigo's platform centralizes the institution's data, creates a digital user experience, ensures compliance, and delivers efficiency for scale and profitable growth.

Make Big Things Happen.