eCommerce Fraud Knowledge Guide

Push Payment Fraud Complete Guide for Merchants

This featured video was created using artificial intelligence. The article, however, was written and edited by actual payment experts.

How to Identify Push Payment Fraud Before It’s Too Late

New technologies present new opportunities for businesses to reach customers and conduct transactions. So-called “push” payments, or buyer-initiated purchases, are one example.

Of course, whenever new technologies and payment options hit the market, fraudsters are always quick to find new ways to take advantage of the situation. Push payments are no exception.

In this post, we'll explain a bit about push payments and how fraudsters are abusing them. We'll also provide some tactics that merchants, banks, and cardholders can use to protect themselves from this emerging threat.

Chapter 1

What is Push Payment Fraud?

Push payment fraud occurs when a bad actor uses social engineering tactics and false pretenses to cause a victim to voluntarily initiate a payment to the fraudster. Unlike traditional fraud, if a scammer steals credentials or takes over an account, a fraudster does not need to access a victim’s account in order to conduct a successful push payment scams. Instead, a bad actor simply needs to manipulate the victim into authorizing a payment.

Read More

Chapter 2

How Push Payment Fraud Works

Bad actors use a combination of social engineering, phishing, and its variants to conduct push payment fraud. In any case, the procedure is similar: the scammer researches a victim, convinces them to send (“push”) a payment, and disappears once they receive the money.

Tactics such as false displays of romance, bogus promises of “too-good-to-be-true” investment returns, or hyperrealistic impersonations of loved ones can cause even the most fraud-aware individuals to fall for push payment scams.

Read More

Chapter 3

Push Payment Fraud Statistics

Push payment scammers siphon billions of dollars out of the real economy every year. In fact, APP fraud losses alone in the US reached an estimated $8.3 billion in 2024, a market where victims remain largely unprotected from these scams. To make matters worse, APP fraud is also becoming an increasingly alarming issue, with dollar losses and incident counts expected to compound at double-digit rates for the next few years.

Exacerbating the acceleration in push payment fraud is the advent of generative AI tools, including large language models (LLMs), AI voice cloning software, and deepfake technologies. When combined with old-fashioned spoofing techniques, these AI tools make push payment scams virtually indistinguishable from requests from genuine recipients.

Read More

Chapter 4

Push Payment Fraud Examples

Push payment fraudsters target both businesses and consumers. When merchants are successfully victimized, losses routinely reach into the hundreds of thousands or millions of dollars, causing anything from disruption to financial devastation for the businesses involved.

Although the sums lost in consumer push payment scams are smaller, even a several thousand dollars can have similarly disruptive effects for individuals. To make matters worse, banks and payments regulators may refuse to make victims whole, prolonging both uncertainty and cash flow issues.

Read More

Chapter 5

How to Identify Push Payment Fraud

Because push payment fraud relies on psychological tricks rather than technical approaches, merchants and consumers will need to pay attention to red flags raised by communication patterns rather than transaction data.

Warning signs like the use of urgency, last-minute changes in payment details, requests for payment via specific peer-to-peer payment platforms, and alleged contact by government officials, banks, law enforcement, and other parties who usually do not contact you over email or the phone should raise immediate red flags.

Read More

Chapter 6

How to Prevent Push Payment Fraud

Merchants who wish to prevent push payment fraud will need to strengthen their staff’s “human firewall.” In practice, this means augmenting fraud awareness training with frequent role-playing scenarios, as well as establishing rigid internal controls that require multiple sign-offs before a transaction can be initiated.

Maintaining a centralized database of vendor information that can be referenced at all times, establishing strict protocols (including three-way matches and backchanneling) for payment verification, and formulating an incident response plan can help merchants harden their businesses against attackers and respond swiftly when they are ever targeted.

Read More

FAQs

faq
faq

What are examples of push payment fraud?

In the US, we generally refer to the tactics employed here according to the methodology, for instance, social engineering tactics, etc. At their core, push payment scams are confidence-based in nature. Any scam that includes that particular “human element” could be considered a form of APP fraud. According to a recent report by ACI Worldwide, it is also one of the most common forms of fraud globally.

To illustrate, consider that these scams can take the shape of invoice scams, home improvement scams, and new account scams.

faq
faq

How do I stop push payment fraud?

The good news is that there aren’t many new practices or technologies merchants should need to implement. Generally, the best defenses are the same best practices that protect against other fraud schemes.

We suggest merchants take time to educate their customers about the risk posed by authorized push payment fraud. This does more than enlighten customers. It also demonstrates that the merchant values their security and wellbeing, which will build positive customer relationships.

faq
faq

Can I get my money back from an authorized push payment?

Authorized push payments are normally irreversible, so it’s difficult to get your money back. However, new rules that went into effect on October 7, 2024, require payment service providers (PSPs) in the UK to reimburse APP fraud victims up to £85,000, so you may be able to recover funds by filing a claim with your bank.

faq
faq

How do push payments work?

A push payment is initiated (or “pushed”) by the sender to the recipient. This stands in contrast to a pull payment, which is initiated (or “pulled”) by the recipient.

faq
faq

Can you block a pre-authorized payment?

Yes. You can block a pre-authorized payment by revoking authorization directly with the recipient company, or by submitting a stop payment order with your bank.

faq
faq

What's the difference between authorized and unauthorized push payment fraud?

Unauthorized fraud occurs when a criminal accesses your account without permission (stolen password, hacked account) and initiates payments. Authorized push payment (APP) fraud occurs when YOU authorize the payment yourself because a scammer tricked you into believing it was legitimate. The critical difference: US federal law protects you from unauthorized fraud, but offers almost no protection for APP fraud.

faq
faq

Can banks detect and stop APP fraud before it happens?

It's very difficult. Traditional fraud detection looks for unauthorized access (wrong location, device, behavior). With APP fraud, YOU initiated the payment using YOUR credentials from YOUR device. To the bank, it looks completely legitimate. Some banks use Confirmation of Payee (verifying payee name matches account) and behavioral analytics (unusual recipient), but most US banks don't have these systems. Real-time payments leave no time for verification.

faq
faq

How do fraudsters use AI to make APP scams more convincing?

AI voice cloning requires only 3-10 seconds of audio to perfectly replicate someone's voice. Fraudsters can call a CFO sounding EXACTLY like the CEO requesting a wire transfer. AI also generates deepfake documents (invoices, IDs), spoofs emails in perfect company style, and analyzes social media to personalize scams. The Federal Reserve and FBI have both warned this technology makes scams virtually undetectable.

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form