What is Automated Clearing House fraud (ACH fraud)? - Definition from WhatIs.com


Automated Clearing House fraud (ACH fraud)

ACH fraud is the theft of funds through the Automated Clearing House financial transaction network. The ACH network acts as the central clearing facility for all Electronic Fund Transfer (EFT) transactions in the United States, representing a crucial link in the national banking system. Payments linger in the ACH network awaiting clearance for their final banking destination.

Here are a few examples of ACH fraud:

  • The criminal accesses a commercial customer's credentials, generates an ACH file in the originator's name, and quickly withdraws funds before the victim discovers the fraud. 
  • The criminal accesses a retail customer's credentials and sets himself up as an automatic bill pay recipient. 
  • In an insider threat scenario, an employee of the target company or a bank modifies ACH files to steal money.
  • In a variation on check kiting -- a scam in which funds are juggled back and forth between bank accounts at separate banks -- a criminal takes advantage of the time lag in transactions.
  • In a spear phishing scam, an employee with authorization for ACH transactions receives an email that leads him to an infected site, which installs a keylogger to access authentication information. The thief can then impersonate the company's authorized representative and withdraw funds. 

To protect yourself from ACH fraud, the FBI recommends that you watch account balances closely and reconcile the account frequently, use strong passwords and change them often, restrict access to any computer used for ACH transactions, and ensure that firewalls and antivirus software are up-to-date. 

This was last updated in August 2012
Posted by: Margaret Rouse

Related Terms


  • Anonymous

    - Anonymous is a loosely organized hacktivist collective created to promote free speech, unimpeded access to information, and transparency in government and corporate activities. (WhatIs.com)

  • threat actor

    - A threat actor is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- the security of an organization. (WhatIs.com)

  • Alice and Bob

    - Alice and Bob are commonly-used names for participants in security scenarios that involve cryptography. Alice represents Person A and Bob is a placeholder for Person B. (WhatIs.com)


  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Automated Clearing House fraud (ACH fraud)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.