What We Are Seeing
- Lookalike domains registered within the last 30 days (e.g., suppliername-ca.com vs. suppliername.com).
- Compromised supplier mailboxes forwarding entire invoice threads.
- Follow-up phone calls from actors posing as the vendor's finance team to approve the change.
- Payment instructions referencing urgent tax audits or bank migrations.
Detection Checklist
- Check SPF/DKIM/DMARC results and domain age before actioning any banking change.
- Verify account or routing changes using a known phone number, not the one provided in email.
- Review email headers for forwarding rules or sign-ins from unusual geographies.
- Update vendor records with a "no email-only changes" policy.

Immediate Response Steps
- Freeze outstanding payments to the affected vendor until verbal confirmation is obtained.
- Alert your bank's fraud department if money was sent; same-day recalls are sometimes possible.
- Reset credentials for any compromised mailboxes and review sign-in logs.
- Notify the vendor so they can secure their environment and warn other customers.
Preventive Measures
Enable supplier verification workflows inside your ERP or accounting platform. ArchiveX customers can layer WORM-backed email journaling, ensuring forensic trails remain intact for investigations. Train payables staff to escalate unusual payment instructions immediately.

