Skip links

The $37M Email: Why Pre-Payment Verification Beats Recovery

Pre-Payment Verification: Stop Supplier Fraud at the Wire

On 14 August 2019, the European subsidiary of Toyota Boshoku Corporation — a $13 billion auto-parts manufacturer in the Toyota Group — wired roughly 4 billion yen, or $37 million, to a bank account controlled by criminals.

The instructions came by email. The instructions looked legitimate. The team in Belgium followed them. By the time the company realised the directions were fraudulent, the money was gone.

Toyota Boshoku disclosed the loss in a press release dated 6 September 2019. The release used careful language: "we are devoting our utmost efforts to procedures for securing and recovering the leaked funds." Translation: we are trying to get the money back, and we are not certain we can.

That sentence is the entire problem with post-payment recovery.

This article is for the corporate AP, treasury, and compliance leaders who pay suppliers across borders. It walks through why post-payment recovery is the wrong plan for B2B payment fraud, what the math actually looks like on a single misdirected wire, and what supplier verification needs to do — before the wire leaves the account — to make the next $37 million stay in your account.

1. The Case Toyota's Finance Team Will Never Live Down

The Toyota Boshoku case is worth opening with because every detail of it is public record. The press release. The amount. The date. The mechanism. There is no need to invent a hypothetical when the largest documented BEC loss at a Toyota Group subsidiary is sitting in a 2019 Tokyo Stock Exchange filing.

What's instructive is what the case reveals about how the fraud actually works.

Toyota Boshoku is large. The company's annual sales sit in the tens of billions of dollars. A $37 million wire transfer from a European subsidiary, in that context, is not the kind of round-number outlier that stops a finance team in its tracks. It looks like a normal vendor payment from a company that runs normal vendor payments at scale.

That is exactly why it worked. Vendor imposter fraud — a category of business email compromise (BEC) where the attacker poses as a known supplier rather than an internal executive — is built on volume cover. The attacker needs the payment to look like one of dozens going out that week. The bigger the company, the easier it is to hide a single fraudulent wire inside the rhythm of legitimate ones.

The pattern

The Toyota Boshoku attackers did not need to fool a sceptic. They needed to fool someone who was busy, processing a large volume of payments, and looking for reasons to keep the queue moving. Most AP teams describe their workday in exactly those terms.

And the most damning detail: the company "became aware that the directions were fraudulent shortly after the leakage." Detection happened. It happened too late.

2. Why Recovery Is the Wrong Plan

Most corporates' fraud playbook for wire fraud and accounts payable fraud is implicit, not explicit. It runs like this: trust the payment instructions, send the money, and rely on the bank, the legal team, and law enforcement to recover funds if something goes wrong.

The problem is that this playbook only works inside an extremely narrow time window — and the data shows most cases never recover.

The FBI Recovery Asset Team's actual numbers

The FBI's Internet Crime Complaint Center (IC3) operates a Recovery Asset Team (RAT) for exactly this scenario. When a US victim reports a fraudulent wire transfer, the RAT initiates the Financial Fraud Kill Chain — a process designed to freeze fraudulent funds before they are moved out of the recipient bank.

The IC3's 2024 Annual Report makes the published metrics clear:

Metric 2024 figure
RAT recovery attempts3,020 complaints
Total amount attempted to be recovered$848.4 million
Funds frozen — domestic transfers$469.1 million across 2,651 cases
Funds frozen — international transfers$92.5 million across 369 cases
Total funds frozen$561.6 million
Success rate (attempts that resulted in any freeze)66%

That 66% figure is the headline number, but two qualifiers matter. First, "frozen" is not the same as "returned." Frozen funds enter a legal process; many are eventually recovered, but recovery is rarely complete and never instant. Second, the 66% rate applies only to cases reported to IC3 quickly enough for the kill chain to operate. The clock starts running the moment the wire leaves your account.

The cross-border problem

The international subset of the RAT data is the more relevant one for any corporate paying suppliers outside the US. In 2024, the RAT attempted recovery on 369 international cases and froze $92.5 million. That is a meaningful sum, but it sits inside a much larger pool of cross-border payment fraud where no recovery is even attempted, because the routing makes it impossible.

UK Finance's 2025 fraud report adds the corroborating data point: international payments rose from 6 per cent to 11 per cent of UK authorised push payment fraud losses in 2024 — almost doubling in a single year. The reason cited by UK Finance: criminals are routing payments to corridors where mandatory reimbursement does not apply.

Cross-border reality

Every additional jurisdiction the funds pass through adds friction to recovery. Mutual legal assistance treaties are slow. Correspondent banking relationships are uneven. Local privacy law can prevent the disclosure your lawyers need. By the time a fraudulent wire to a Vietnamese, Brazilian, or Nigerian account clears two correspondent hops, the FBI's 66% number is no longer the relevant statistic.

3. The Cost of One Misdirected $250K Wire to Vietnam

This section uses a hypothetical scenario to make the recovery economics visible. The setup: a UK manufacturer pays its long-standing Vietnamese contract supplier $250,000 monthly. The fraudster sends a "we've changed banks" email impersonating the supplier's CFO. The email is convincing, the new IBAN is legitimate (a real bank in Hanoi), and the AP team processes the payment on the standard four-day SLA.

By Day 4 the wire has settled. By Day 5 the AP team gets a phone call from the real supplier asking where their money is.

The recovery clock

Time elapsed State of the funds Realistic recovery probability
0–24 hoursFunds in receiving account, bank not notifiedHighest — IC3 RAT can act if reported immediately
24–72 hoursBank notified, freeze possible if account still has balanceMaterially lower — depends on local bank cooperation
3–7 daysFunds typically already moved through layered accountsRecovery shifts to legal proceedings
1–4 weeksInternational mutual legal assistance requiredRecovery rare; typically pennies on the dollar
1+ monthsFunds laundered through crypto, mules, or shell companiesEffectively zero

The visible cost vs the real cost

The visible cost is the $250,000. The real cost, on a single incident at a mid-sized corporate, is materially higher:

Cost line Indicative range Notes
Direct loss$250,000The original wire
Replacement payment to the real supplier$250,000The supplier still needs to be paid; the original loss does not erase the obligation
Legal fees (recovery attempt)$15,000 – $80,000External counsel in two jurisdictions, typical range
Investigation & forensic costs$10,000 – $40,000Internal time + external forensic accountant if required
SOX / audit remediation$20,000 – $100,000+If the loss triggers a material weakness finding in internal controls
Insurance premium increase5–15% on next renewalIf the claim is filed against cyber-crime cover
Operational disruption2–5 daysAP team time, treasury attention, internal communications
Total exposure on a single $250K incident$545K – $720K+Before any reputational or supplier-relationship cost
2.2x – 2.9x

The real cost of a single misdirected supplier wire, as a multiple of the original loss. Even with partial recovery of the principal, the secondary costs alone run two to three times the visible loss.

And the math is asymmetric. Pre-payment verification, even at enterprise pricing, costs cents per transaction. A single avoided $250,000 incident pays for several years of verification across an entire vendor base.

4. Pre-Payment vs Post-Payment: Where the Math Actually Breaks

The clearest way to see the gap is to lay out what each posture costs and what each one delivers.

Dimension Post-payment recovery Pre-payment verification
Cost per transaction$0 (until something goes wrong)Cents per check
Cost per fraud incident$545K+ on a $250K wire (see Section 3)$0 — the wire is blocked before settlement
Operates againstFunds already in motionFunds before they leave the account
Success rate (US, BEC, reported quickly)66% (FBI IC3 RAT, 2024)Depends on coverage — often above 95%
Success rate (cross-border)Materially lower than 66%Same as domestic — verification is corridor-agnostic
Audit defensibilityReactive — explains what went wrong afterProactive — documents the control that prevented it
Operational disruption per incident2–5 days minimumNone — sub-second response
Insurance impactPremium rises after a claimOften a premium discount for documented controls

The honest summary: post-payment recovery makes financial sense only if you assume fraud is rare, recoverable, and inexpensive to investigate. The Toyota Boshoku case shows it can be none of those three at the same time.

5. What Pre-Payment Verification Actually Means

"Pre-payment verification" gets used loosely. To make the conversation operational, here is what it has to do — at minimum — to count.

It runs before the wire is sent, not after

This sounds obvious. It is not how most AP teams operate today. Trustpair's January 2026 survey of 250 senior US finance executives found that 48 per cent still rely on manual checks like callbacks or email confirmations as their primary verification method. Manual checks are pre-payment in name, not in design — they slow the payment but rarely prevent the fraud, because the fraudster usually controls the channel the callback is made through.

It verifies the entity, not just the account

VoP, Confirmation of Payee, and Nacha's account validation rules confirm that an IBAN is real and that the name on the account matches what was submitted. None of them confirm that the named entity is a real, registered, active legal company that matches the supplier on the buyer's master record. That extra layer is what stops shell-company onboarding and account-takeover fraud — both of which pass name-match checks every time.

It works in every country your suppliers are in

The cross-border gap is the biggest weakness in current corporate verification posture. Domestic regimes — UK CoP, EU VoP, US Nacha — cover the rails they cover and nothing else. A pre-payment verification posture that works in 20 EU states but breaks the moment you pay a supplier in Vietnam is not a posture. It is a partial control.

It runs continuously, not just at onboarding

The Toyota Boshoku scenario describes a fraud that succeeded against a relationship the company had with a real, legitimate supplier. The supplier's onboarding had been done years earlier. Vendor imposter fraud — the largest growing fraud category in the AFP's 2025 survey — is built on the gap between onboarding and payment. Continuous vendor verification closes that gap.

The four-part definition

Pre-payment verification is verification that runs before settlement, validates the entity as well as the account, works across borders, and updates continuously. Anything missing one of these four properties is not pre-payment verification — it is a control with a sales tag.

6. The Four-Question Gate

Translate the four-part definition into operational language and you get a four-question gate every supplier payment should pass before it leaves the account.

  1. Does the IBAN exist and accept payments? IBAN format validation, country code, MOD-97 check, bank lookup. This is the floor.
  2. Does the named account-holder match the supplier we believe we are paying? Name-vs-IBAN matching, with fuzzy matching for legitimate variations (trading names, abbreviations, transliteration).
  3. Is the supplier a real, registered, active legal entity matching our master record? Government registry confirmation: registration status, legal name, tax ID, incorporation date, directors, ultimate beneficial owners.
  4. Has anything changed since we last verified them? Continuous monitoring, with webhook alerts on registration changes, ownership changes, or account-status changes.

Question 1 catches typos and dead accounts. Question 2 catches name mismatches and many lower-sophistication BEC attempts. Question 3 catches shell companies and dissolved entities — the patterns VoP cannot reach. Question 4 catches the Toyota Boshoku pattern — fraud against a previously legitimate, currently compromised relationship.

Each question is necessary. None of them is sufficient on its own.

7. How MonitorPay Implements the Gate

MonitorPay was built around exactly this four-question gate. A single API call, a single response payload, all four questions answered in under one second.

Gate question What MonitorPay returns
1. Does the IBAN exist and accept payments?IBAN structure validation, MOD-97 check, bank name and BIC lookup, SEPA/non-SEPA classification
2. Does the named holder match the supplier?Fuzzy name matching with confidence scoring, transliteration support across Latin, Greek, Cyrillic, and Arabic alphabets
3. Is the supplier a real, registered legal entity?Government-registry confirmation in 200+ countries: registration status, tax ID/EIN/VAT, directors, shareholders, UBO, group structure
4. Has anything changed since last verification?Continuous monitoring with webhook alerts on registration status, account ownership, and corporate structure changes

Coverage extends across 49+ countries with direct bank verification and 200+ government registries for entity intelligence. The same API call that handles a SEPA payment to Munich also handles a wire to Hanoi, Brasília, or Lagos. No regulatory boundary; no separate integration per market.

Stop the next $37M wire before it leaves your account.

One API call. Four-question gate. Sub-second response. Coverage in 49+ countries.

Request a Demo →

8. The Cultural Shift — Security Over Immediacy

The hardest part of the transition from post-payment recovery to pre-payment verification is not technical. It is cultural.

AP and treasury teams are measured on speed. Late payments damage supplier relationships, hold up production, and trigger contractual penalties. The pressure to clear the payment queue is real, and it is in direct tension with any control that adds latency.

The honest answer is that the tension dissolves once verification runs in sub-second time. A four-day callback to a supplier is friction. A 400-millisecond API call inside the existing payment workflow is not friction — it is part of the workflow. Most corporates that have made the shift report that AP throughput improved after deployment, not before, because the verification removed the manual second-pair-of-eyes review that used to slow large payments.

The cultural language that travels best inside finance organisations is simple: a deliberate, verified payment is always better than a rushed, unverified one. The metric that matters is not "payments per hour." It is "payments per hour where every payment cleared a four-question gate." Once that metric replaces the first one, the rest of the transition follows.

The CFO's question

The single most useful question a CFO can ask their AP head this quarter: "What percentage of the supplier payments we sent last month passed an automated verification gate before settlement?" If the answer is anything below 100 per cent, the rest of the conversation writes itself.

9. What This Means in Practice

Three changes to make in your AP playbook this quarter:

Replace callbacks with API verification

Callbacks were a useful control twenty years ago. They are a vulnerability now — the fraudster usually controls the channel the callback is made through. Replace them with a single pre-payment API check that runs against government registries, not against a phone number on a supplier's invoice.

Treat the cross-border gap as a known weakness

If your supplier base is global, your verification posture has to be global. UK CoP and EU VoP cover the rails they cover. The fraud is moving to the rails they don't. Document the gap, then close it with a verification provider that operates outside those regimes. Corporate treasury and AP teams typically find the integration cost is recovered after a single avoided incident.

Make recovery your last line of defence, not your first

Recovery still has a role. The FBI IC3 RAT is genuinely useful in the narrow window where it operates. But if recovery is your primary fraud control, you have already accepted a 34 per cent annual loss rate on every fraud incident — even before the secondary costs are added. That is not a control. That is an unfunded liability.

The $37 million Toyota Boshoku lost in 2019 is a public number. Most B2B fraud is not. Every CFO making the math on whether pre-payment verification is worth the integration cost should ask the inverse question: how many $37 millions does the company need to be wrong about, before the integration cost looks small?

Frequently Asked Questions

What is pre-payment verification?

Pre-payment verification is the practice of validating a supplier's bank account, legal entity, and identity before a payment is settled — not after. It runs in real time during the payment authorisation flow, blocks misdirected wires before funds leave the account, and avoids the need to rely on post-payment recovery.

How is pre-payment verification different from a manual callback?

Manual callbacks rely on the AP team contacting the supplier through a known phone number to confirm payment instructions. The fraud pattern this is meant to catch — vendor imposter fraud — typically involves the fraudster controlling the channel the callback is made through. Automated pre-payment verification queries government registries and bank infrastructure directly, so the fraudster cannot control the data source.

What is the FBI's recovery rate for BEC fraud?

According to the FBI's 2024 Internet Crime Complaint Center annual report, the IC3 Recovery Asset Team attempted recovery on 3,020 complaints totalling $848.4 million in 2024 and froze $561.6 million — a 66 per cent success rate when measured by attempts that resulted in any freeze. The rate applies only to cases reported quickly enough for the kill chain to operate, and "frozen" funds still go through legal proceedings before any return.

Does the FBI's recovery rate apply to international wires?

Partially. The IC3 RAT extended to international transactions in April 2024. In 2024 the international subset was 369 cases with $92.5 million frozen — a much smaller pool than domestic. Recovery on cross-border wires is materially harder because of mutual legal assistance treaty requirements, correspondent banking complexity, and local privacy law in the receiving jurisdiction.

What is the real cost of a misdirected supplier wire?

The visible cost is the original payment amount. The total cost typically runs 2 to 3 times higher once you add: the replacement payment to the legitimate supplier (the original obligation does not disappear), legal fees for recovery in two jurisdictions, internal investigation, possible SOX or internal-controls remediation, insurance premium impact, and operational disruption.

Why isn't recovery a sufficient fraud control?

Three reasons. First, the FBI IC3 recovery rate is 66 per cent only for cases reported within hours; the rate falls sharply after 72 hours and most cross-border cases are reported later than that. Second, "frozen" is not "returned" — frozen funds enter legal proceedings that take months or years. Third, secondary costs (legal, audit, operational) accumulate independent of whether the principal is recovered, so even successful recoveries leave the corporate materially worse off.

What does pre-payment verification actually check?

A complete pre-payment check answers four questions: (1) does the IBAN exist and accept payments? (2) does the named account-holder match the supplier we believe we are paying? (3) is the supplier a real, registered, active legal entity matching our master record? (4) has anything changed since we last verified them? Each question covers a different fraud pattern; all four are necessary.

How does pre-payment verification affect AP throughput?

Modern pre-payment verification APIs return results in sub-second time and integrate into existing payment workflows. Most corporates that have made the transition report higher AP throughput after deployment, not lower, because the API verification replaces the manual second-pair-of-eyes review process that previously slowed large payments.

What documented case studies exist for B2B BEC fraud?

Several large cases are matter of public record. Toyota Boshoku Corporation's European subsidiary lost approximately $37 million in August 2019 to a BEC scam, disclosed in a 6 September 2019 press release. Facebook and Google were collectively defrauded of more than $100 million between 2013 and 2015 in a fake-vendor scheme that was prosecuted in US federal court. Ubiquiti Networks disclosed a $46.7 million BEC loss in 2015. The pattern across cases is consistent: large company, real-looking instructions, payment cleared before fraud was detected.

How much does pre-payment verification cost compared to a fraud incident?

Verification typically costs cents per check at enterprise volumes. A single avoided incident — using the worked example in this article, a $250,000 wire with $545,000 to $720,000 in total exposure — pays for several years of verification across an entire supplier base. The economics favour verification by an order of magnitude even before insurance and audit benefits are factored in.