Devbrew logo

The Wire Fraud Your Email Filters Miss

Catch BEC attacks at the payment instruction level before funds move, without replacing your email security stack, in 60 days.

7 min read
Joe Kariuki
Joe KariukiFounder

A payment instruction lands at 4:47 PM New York time. It references an existing client, uses the correct SWIFT formatting, and requests a wire to a beneficiary in Southeast Asia. Your compliance team in London starts their shift in 14 hours. By then, the wire has cleared through two correspondent banks. The beneficiary account was opened three weeks ago.

Business email compromise generated $2.77 billion in reported losses across 21,442 complaints in 2024.1 Since the FBI began tracking BEC in 2013, cumulative losses have topped $55.5 billion.2 Cross-border payments companies face elevated risk because their wires move through time zones and correspondent chains where verification gaps are measured in hours.

How BEC exploits payment instruction handoffs

BEC at the wire transfer level works differently than invoice-level fraud. Invoice verification systems catch document manipulation in your AP workflow. Payment instruction fraud targets the wire itself.

Attackers study your operational patterns. They know when your compliance team is between shifts. They know which corridors process with minimal human review. They know that callback protocols require reaching someone at the originating company, and that during a 12-hour time zone gap, no one picks up.

The fix is AI that operates at the payment instruction layer. Instead of analyzing email headers or invoice documents, the system learns your normal payment behaviors: who authorizes payments, to which beneficiaries, at what amounts, and at what times. When a wire instruction deviates from these patterns, it gets flagged for enhanced verification regardless of how authentic the email appears. The verification happens before funds enter the correspondent banking chain.

What payment instruction verification looks like

A production system runs five layers of analysis on every wire instruction before it clears:

Behavioral profiling by corridor. The system builds baselines for every sender-beneficiary-corridor combination. A USD-to-PHP wire behaves differently from a USD-to-GBP wire. Typical amounts, frequency, time-of-day patterns, and beneficiary account tenure all factor into the baseline.

NLP analysis of payment instructions. Free-text fields in SWIFT MT103 messages contain signals. The system parses beneficiary names, addresses, and reference fields for anomalies: name variations that do not match the beneficiary's historical profile, addresses inconsistent with the stated corridor, reference fields that deviate from the sender's normal patterns.

Beneficiary reputation scoring. Every beneficiary account receives a risk score based on account age, transaction history across your platform, and network signals. A new account receiving a first-time wire from a high-value sender scores differently from a five-year relationship.

Time zone-aware anomaly detection. The system elevates risk during hours when your human review coverage is thin. A wire initiated at 2 AM local time that bypasses the normal approval chain gets flagged automatically.

Real-time hold or escalation. High-risk instructions get held with specific evidence for human review. Low-risk instructions clear without friction. The decision happens in seconds, before the wire enters the correspondent chain.

Where cross-border teams get this wrong

Treating wire verification as an email security problem. Email filters catch compromised inboxes. They do not examine the payment instruction itself for behavioral anomalies. When the instruction comes from a verified sender through a verified system, email security has already passed it. The vulnerability is downstream. This mirrors the pattern in how rule-based detection fails: static controls cannot adapt to threats operating within your trust boundaries.

Applying uniform review thresholds across all corridors. A $50,000 wire to London and a $50,000 wire to a high-risk corridor carry fundamentally different risk profiles. Flat thresholds either over-review safe corridors or under-review risky ones, creating the same false positive drain that exhausts operations teams.

Relying on callback verification that only works during business hours. Attackers time their instructions for the gap between shifts. When your callback protocol requires reaching someone in a different time zone, the verification window closes before anyone picks up.

What the numbers show

Those $2.77 billion in reported BEC losses make it the second costliest cybercrime category the FBI tracks, behind only investment fraud.1 Cumulative losses since 2013 have reached $55.5 billion across 305,000 reported incidents.2 These figures represent only what gets reported. Actual losses are higher.

The math for your operation is straightforward. The average reported BEC loss is approximately $129,000 per incident.1 If your team processes 500 cross-border wires daily and catches one fraudulent instruction per month that would have otherwise cleared, you prevent over $1.5 million in annual losses. Payment instruction verification pays for itself with a single prevented incident.

Why most teams can't build this internally

Correspondent banking data is fragmented. Building behavioral profiles requires normalizing data from SWIFT messages, bank portals, and payment platforms that use different schemas and field conventions. The data engineering alone takes months before a model sees its first wire.

Beneficiary reputation scoring requires network-level data. A single company's transaction history covers too narrow a slice to score beneficiary risk accurately. You need patterns across a broader payment network, which requires infrastructure most teams do not have.

The real-time constraint makes this harder. The scoring decision must happen before the wire enters the correspondent banking chain. That is a different latency requirement than batch-processed fraud review. And the models need continuous retraining as attack patterns shift. Total cybercrime losses rose 33% year over year in 2024.1 The threat surface is expanding faster than manual processes can adapt.

What you can do in the next 60 days

Weeks 1-2: Map your wire approval coverage by time zone. Chart which hours your compliance or operations team is actively reviewing wire instructions versus when wires auto-clear. Identify windows where coverage drops to zero. These are your highest-risk hours.

Weeks 3-4: Audit your top 10 corridors for beneficiary anomalies. Pull 90 days of wire data and flag beneficiary accounts that received first-time wires, accounts opened within 60 days of the first wire, and any corridor where beneficiary details changed between transactions.

Weeks 5-6: Calculate your BEC exposure. Take your daily wire volume, multiply by the FBI's average BEC loss of $129,000 per incident, and estimate how many fraudulent instructions your current controls would miss during off-hours. This is your baseline risk number.

Weeks 7-8: Evaluate real-time scoring feasibility. Determine whether your current infrastructure can support sub-second decisions at wire authorization. If it cannot, that gap defines the engineering scope for any AI-based solution.

How Devbrew builds wire-level fraud intelligence

Devbrew builds AI-powered payment instruction verification systems for cross-border payments companies. We handle behavioral profiling, NLP-based instruction analysis, beneficiary reputation scoring, and time zone-aware anomaly detection. The system integrates with your existing wire processing workflow without requiring a platform rebuild.

Every model is trained on your corridors, your beneficiary patterns, and your operational rhythms. Detection accuracy improves as your wire volume grows because the system builds deeper context about what normal looks like across your specific payment network.

Understand where your wire operations are exposed

If cross-border wire fraud is on your risk register, a short conversation can help you map where your current controls leave gaps and where AI creates meaningful impact in your payment stack. We will discuss the challenges you are facing, explore potential solutions, and outline next steps. You will leave with clarity on your exposure, direction, and whether Devbrew can help.

Email me at joe@devbrew.ai or book a 30-minute call.

Footnotes

  1. FBI Internet Crime Complaint Center, "2024 Internet Crime Report." https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf 2 3 4

  2. FBI Internet Crime Complaint Center, "Business Email Compromise: The $55 Billion Scam." https://www.ic3.gov/PSA/2024/PSA240911 2

Let’s explore your AI roadmap

We help payments teams build production AI that reduces losses, improves speed, and strengthens margins. Reach out and we can help you get started.