The ACH network processed 30 billion transactions of $77 trillion in 2023. With the growing adoption of ACH transfers, especially for B2B payments, businesses must be aware of fraudsters attempting to exploit the network. ACH frauds are a rampant problem in today’s financial landscape.
To help your business prevent such frauds, we’ll help you understand how the ACH network works, how fraudulent transactions occur, and how to combat them.
ACH transfers are bank-to-bank electronic transfers through the Automated Clearing House (ACH) network. Governed by the National Automated Clearing House Association (NACHA), ACH transfers are processed in batches, wherein banks send payments and withdrawals to the central clearing house and are finally transferred to the recipient bank only after authorization.
The ACH network supports two types of transactions: direct deposit and direct payment. The payer initiates direct deposits to a receiving bank, whereas the recipient initiates direct costs to request funds.
ACH transfers only require a bank account number and a routing number. This makes the ACH network vulnerable, as anyone can initiate fraudulent transactions if they can get this information. When frauds are committed by intercepting ACH transactions, they are known as ACH frauds.
The most common and typical examples of ACH fraud are as follows -
National Automated Clearing House Association (NACHA) holds the merchants and financial institutions processing transactions liable for unauthorized transactions.
If an unauthorized transaction is received, the financial institution may face liability or legal action if they allow the individual customer to utilize funds before they are cleared. If the financial institution originates an unauthorized transaction, it must return funds to the sender if a challenge against the transaction is received within a 60-day window.
The absence of an effective ACH fraud prevention system impacts a business in a large number of ways:
Utilizing software to automate accounts payable processes helps prevent fraud. Segregation of duties, comprehensive invoice audit trails, and 3-way match of invoices against purchase orders and goods receiving notes in such software flag outliers and anomalies in spend. While it is possible to run all the above checks manually as well, the benefits of AP automation make the processes more efficient. It increases the probability of fraud being prevented and caught on time. Software like ClearTech also identifies duplicate transactions and spiked invoices before processing.
ACH (Automated Clearing House) transactions are electronic fund transfers between banks. ACH transactions can be of two types - ACH debits, where funds are pulled out of an account, and ACH credit, where funds are pushed into an account.
Initiation of an ACH transaction only requires a bank account and a routing number. This makes ACH prone to fraudulent transactions where criminals obtain bank credentials and initiate unauthorized transactions. However, despite this, ACH has a lower rate of fraud than credit card transactions.
Unauthorized transactions are fraudulent debit or credit transfers through the ACH network. Fraudsters initiate transactions to transfer funds for personal gain, either in a lump sum or recurring payments.
If an authorized ACH transaction is reported within 60 days of the settlement date, the bank must credit the individual’s account with the transaction amount. The bank can also return the transaction to the originator bank.
AP automation software provides multiple layers of protection against fraud. Comprehensive audit trails and segregating duties ensure that the banking information of suppliers remains sacrosanct. Further, end-to-end integration and encryption of ACH instructions and banking information safeguards against human tampering.