Money Talks. We Speak Its Language Payment Week

The fight against fraud revs up

Payment Fraud in Focus: How Scams Are Reshaping United States Protections

At Nacha’s annual gathering last month, a presenter asked attendees if they knew someone hit by a payments swindle; nearly the entire audience raised a hand.

Rising Fraud Trends and Human Impact

That scene reflects a broader reality in the United States, where global criminals target shoppers, job seekers, and people pursuing romance, manipulating them into moving money under fabricated stories.

Payment fraud generally refers to the unauthorized or illegal use of payment methods to steal money or goods, whether the activity involves taking over an account, abusing stolen credentials, or tricking someone into sending funds. It often happens through social engineering, phishing, malware, or by exploiting weak authentication and verification steps.

Common forms include credit card fraud, fraud involving Automated Clearing House transfers, wire transfer fraud, check fraud, and account takeover, where criminals gain control of a customer’s login or payment credentials and use them to initiate transactions.

Specific schemes can look like phishing messages that steal payment information, compromised business email requests that pressure employees to reroute funds, romance scams that build trust and then demand money, or fake investment pitches that lure victims into transferring savings. Recent trends are accelerating these tactics through artificial intelligence, increasingly refined social engineering, and the spread of scams across new digital payment platforms that move money quickly and at scale.

The Consumer Federation of America estimated in March that losses total about $119 billion each year, accounting for episodes that never surface publicly because many victims feel too embarrassed to report being duped.

Policy Actions and Fraud Protection

On Thursday, the House Financial Services Committee advanced a unanimous measure designed to shield older Americans from financial abuse, in part by tightening coordination between government agencies and financial institutions to detect and stop schemes.

The proposal also seeks tougher enforcement against perpetrators.

Meanwhile, Nacha is preparing the final stage of a new risk requirement that, for the first time, compels institutions of every size to scrutinize incoming deposits for fraudulent activity. The change began rolling out in March and is set to apply across the network in June.

The standard requires United States banks to watch accounts that receive funds, not just those that originate transfers.

Type of Push-Payment Scam Description Target Victim
Romance lure A relationship pretext is used to persuade someone to send money. Consumers
Bogus investment pitch Victims are pushed to “invest” by transferring funds to a fraudulent destination. Consumers
Compromised business email scheme Email impersonation is used to pressure a payment to a criminal-controlled account. Executives and employees

Banks’ reimbursement decisions can vary by product and circumstance: unauthorized transactions may be refunded under applicable rules and timelines, while authorized transfers made after a customer is manipulated can be harder to reverse, especially once funds have moved through multiple accounts.

Sarah Billings of Pnc said the effort is shifting from just origination to end-to-end oversight: “Tackle it from every angle.”

Technology’s Expanding Role in Scam Tactics

Security dominated discussion at Nacha’s Smarter Faster Payments conference, partly because the threat keeps intensifying with help from artificial intelligence.

  • Email phishing
  • Text message scams
  • Spoofed websites
  • Improved scam message quality via artificial intelligence

Frauds are also spreading across social platforms, prompting some banks, including JPMorgan Chase, to restrict how customers use those channels to move money.

Real-time payment fraud refers to schemes that exploit instant or near-instant payment rails, where money is made available quickly and there is less time to spot suspicious behavior or halt a transfer. Compared with more traditional transactions that can allow longer review windows, speed can amplify the impact of social engineering and account compromise.

Criminal profits are being reinvested to industrialize wrongdoing, expanding toolkits, staffing, and overall scale—and with it, the danger to others.

Fraudsters operate around the clock, and we must match their pace by mobilizing the broader community.

Public-Private Collaboration to Prevent Fraud

In Washington, the issue is drawing new focus. Alongside this week’s bill, the Federal Reserve, the Federal Communications Commission, and the United States Treasury Department convened a public-private roundtable this month to gather input on countering payments abuse.

Effective defenses depend on banks and government agencies sharing signals quickly and acting in concert before stolen funds can be layered through additional accounts.

Those steps follow a March call from the White House to ramp up efforts against fraud and cybercrime.

Businesses most exposed tend to include electronic commerce merchants, financial services firms, and organizations with high transaction volumes or frequent vendor payments, where a single compromised login or persuasive message can trigger rapid losses.

For businesses, the fallout can extend beyond direct financial losses to reputational damage, regulatory penalties, and a lasting hit to customer trust.

Common prevention steps include employee training to spot social engineering, multi-factor authentication for logins and payment changes, transaction monitoring that flags unusual activity, and customer education that reduces the odds that victims authorize a transfer under pressure.

For years, industry leaders have criticized limited information-sharing among banks, while authorities appeared slow to confront a wave battering United States residents.

Now, the growing attention suggests those who have long sounded the alarm may finally gain support to mitigate the damage.

What shall we search for? For example,bitcoin

We are on social media