Menu
No fishing warning sign in red circle
How-To GuidesMarch 19, 2026- Fannie

Is This Invoice Real? How to Check Documents for Scams

The Scale of Invoice Fraud

71% of organizations have been hit by payments fraud, and 44.8% of those fraudulent payments originated from invoice or mandate scams, according to the Association for Financial Professionals. ScamVerify™ AI document analysis helps individuals and businesses verify invoices, receipts, and other financial documents against known threat indicators and manipulation patterns.

Invoice fraud works because businesses pay invoices constantly. A single fake invoice slipped into a normal payment cycle can go undetected until the real vendor calls about an unpaid bill, weeks or months later.

How Fake Invoices Work

The Basic Scheme

An attacker sends an invoice that appears to come from a legitimate vendor, supplier, or service provider. The invoice contains altered payment details (a different bank account or payment address) but otherwise matches the format, branding, and terminology the victim expects.

Invoice ElementLegitimateFraudulent
Vendor nameExact matchCorrect or very close
Logo and brandingOriginal filesCopied or recreated
Invoice number formatFollows patternMay break sequence
Bank account/routingVendor's real accountAttacker-controlled account
Contact emailvendor@realcompany.comvendor@realcompany.co or similar
AmountConsistent with historyOften matches expected range

The most sophisticated fake invoices are nearly impossible to distinguish visually from real ones. Attackers research the vendor relationship, match historical invoice amounts, and time the fake invoice to arrive when a real payment is due.

Common Invoice Fraud Variants

Vendor impersonation: The attacker poses as an existing vendor and sends an invoice with updated bank details. The email may reference a "bank change" or "new payment processing system."

Overpayment scam: A fake invoice arrives for more than the expected amount. When the victim contacts the "vendor," they are told the overpayment will be refunded, but first the original amount should be paid to the new account.

Duplicate invoice: A real invoice is intercepted, duplicated with altered payment details, and sent from a spoofed or look-alike email address. The victim pays the fake copy.

Supply chain injection: Attackers compromise a vendor's email system and use it to send invoices with modified payment information from the actual vendor's email address.

Red Flags in Suspicious Invoices

Financial Details

  • Bank account or routing numbers that differ from previous invoices
  • Payment requested to a different entity than the vendor name
  • Wire transfer or cryptocurrency as the only payment option
  • Subtle changes in the payment address

Document Quality

  • Slight differences in logo quality, color, or positioning compared to past invoices
  • Font inconsistencies within the document
  • Misaligned columns or irregular spacing
  • PDF metadata showing a different creation tool than usual

Communication Patterns

  • Urgency language: "Payment overdue," "Immediate action required," "Account will be suspended"
  • Invoice arriving outside normal billing cycles
  • Sender email using a look-alike domain (realcompany.co instead of realcompany.com)
  • Request to change established payment methods

How to Verify an Invoice

Step 1: Compare With Previous Invoices

Pull up the most recent legitimate invoice from the same vendor. Compare every detail: bank account numbers, payment addresses, invoice number sequences, contact information, and formatting.

Step 2: Verify Through Known Channels

Never use contact information from the invoice itself to verify it. Call the vendor using a phone number from your records, their official website, or a previous verified communication. Ask them to confirm the invoice and payment details.

Step 3: Check the Sender Email

Examine the full sender email address, including the domain. Look for subtle misspellings: realcompany.co, realcompany-inc.com, or realcompany.services instead of realcompany.com.

Step 4: Upload to ScamVerify

Upload the invoice to the ScamVerify document checker. The AI analysis extracts text, phone numbers, email addresses, and URLs from the document, then checks each entity against 8 million+ threat records including FTC complaints, URLhaus malicious domains, and ThreatFox indicators.

Step 5: Implement Dual Authorization

For payments above a set threshold, require two people to independently verify and approve the invoice. This single control prevents most invoice fraud because the attacker would need to deceive two separate individuals.

Upload a document to analyze

Upload any PDF, image, or document to check for signs of fraud or manipulation.

Analyze Document

Industry-Specific Targets

Invoice fraud affects every industry, but some are targeted more heavily:

IndustryCommon Fake Invoice TypeWhy It Works
ConstructionMaterials and subcontractor invoicesHigh volume, many vendors
HealthcareMedical supply and equipment invoicesComplex billing, multiple departments
LegalConsulting and filing fee invoicesHigh individual amounts
Real estateInspection, title, and escrow invoicesTime-sensitive closings
Small businessSoftware subscriptions, office suppliesLimited accounting staff

Small businesses are especially vulnerable because they often lack dedicated accounts payable teams and the internal controls that larger organizations use to catch discrepancies.

What to Do If You Paid a Fake Invoice

  1. Contact your bank immediately to attempt to reverse the transfer or initiate a recall
  2. File a police report with your local law enforcement
  3. Report to the FBI's IC3 at ic3.gov if the fraud involved wire transfer
  4. Notify the real vendor so they can alert other customers
  5. Report to the FTC at ReportFraud.ftc.gov
  6. Review all recent invoices from the same vendor for additional fraudulent submissions
  7. Update verification procedures to prevent repeat incidents

Time is critical. Wire transfers can sometimes be reversed if the receiving bank is contacted within 24-48 hours. After that window, recovery becomes extremely difficult.

FAQ

How common is invoice fraud?

The AFP reports that 71% of organizations have experienced payments fraud, with invoice manipulation being the single largest category at 44.8%. The FBI's Internet Crime Complaint Center received billions in reported losses from business email compromise, which frequently involves invoice manipulation.

Can AI detect fake invoices?

AI document analysis can identify many indicators of manipulation, including metadata anomalies, entity mismatches (phone numbers or URLs that appear in threat databases), formatting inconsistencies, and content patterns common to fraudulent documents. ScamVerify's document checker performs this analysis automatically.

What is the difference between invoice fraud and business email compromise?

Invoice fraud is a type of business email compromise (BEC). BEC is the broader category that includes any scheme where attackers impersonate business contacts via email to redirect payments or steal information. Invoice fraud specifically involves sending fake or altered invoices. For more on BEC, read our business email compromise explainer.

Should I verify every invoice?

For small businesses, verifying every invoice against known vendor details is ideal. For larger organizations, implement risk-based verification: verify all first-time vendors, all invoices above a dollar threshold, and any invoice where payment details have changed. Dual authorization for large payments provides an additional layer of protection.

Photo by Mika Baumeister on Unsplash

Check any phone number, website, text, email, document, or QR code for free.

Instant AI analysis backed by millions of federal records and real-time threat data.

Check Now