Even with digital payments on the rise, paper checks still move billions of dollars every year. Fraudsters know it. From chemically washed checks and forged endorsements to counterfeit cashier’s checks, bad actors exploit every loophole before banks, account holders, or law enforcement catches on. Let’s take a deeper look at check fraud: what qualifies as check fraud, what are the most common fake check scam schemes, and who ultimately bears the financial and legal risk and then lay out steps for detection, prevention, and recovery in the event you fall prey to check fraud.
Lukas Grigas
May 28, 2025
Check fraud is the deliberate theft, alteration, duplication, forgery, deposit, or cash-out of a check to obtain funds the account holder never approved. Banks report such events on suspicious activity reports (SARs) under the “check fraud” category, which covers washed, counterfeit, and forged-signature items.
Even the overall use of checks has been is in decline, regulators and industry groups agree the problem is accelerating:
Check fraud works through a series of steps, beginning with crooks stealing raw checks straight from the mail stream. The U.S. Government Accountability Office reports that armed robberies of letter carriers have soared in recent years as bad actors hunt for the universal “arrow keys” that open every blue collection box on a route.
With the envelopes in hand, thieves move to the manipulation stage. FinCEN’s 2024 FTA shows that in mail-theft cases the favorite trick is still alteration (aka “check washing”) — 44% of reports involved scrubbing out the name of the payee or amount before rewriting the fields. Counterfeiting ranks second: a stolen check is scanned and printed onto blank stock, creating a number of copies that carry a genuine account and routing number.
Next comes deposit and cash-out. Criminals open or rent “mule” accounts and feed the washed checks through remote-deposit-capture apps. Those apps accept basic low quality (200-dpi) images, so crude printouts often slip past. Once the funds hit the mule account, money vanishes quickly via ATM withdrawals or crypto off-ramps.
Types of check fraud include various techniques, with new methods emerging as technology advances. The following list presents some common, though not all-inclusive, examples of how criminals carry out check fraud.
Paperhanging is when a crook opens an ordinary checking account, writes checks far above the balance, pockets the cash (or moves it elsewhere), then vanishes before the items clear. Because banks still grant one- to two-day “float” before final settlement, the checks spend like real money in that window. Once the bank tries to post them, the account is already closed or empty.
Check kiting is a scheme executed by a fraudster who links two or more live bank accounts. It works something like this: first, a crook writes an unfunded check from account A and deposits it into account B to create a temporary, “phantom” balance. Before that check can bounce, they deposit another bad check (this time from account B) back into account A, and the repeat the cycle.This rolling float makes both ledgers appear solvent long enough for the fraudster to withdraw real cash. Although modern same-day clearing has greatly reduced when the linked accounts reside at different banks or in different states.
Check theft is the act of stealing filled-out checks from mailboxes, office trays, or courier pouches. Thieves then deposit the stolen checks unchanged by posing as the payee or through an ATM, where front-side details get only automated scrutiny. FinCEN tied the current spike in check fraud directly to mail theft, noting more than 250,000 consumer complaints in 2023 and 717 robberies of letter carriers in 2022–23.
Check alteration, also known as check washing, is the process of using common solvents to change a check’s information. Criminals rinse the ink from the payee or amount lines of a stolen check, air-dry it, and rewrite the fields. Because the magnetic-ink code at the foot of the document never changes, bank scanners accept the item as authentic.
Check forgery involves a thief forging the drawer’s signature to redirect funds, or faking the payee’s endorsement on the back to cash a check not written to them.
Identity check theft occurs when criminals use a single blank or canceled check — which reveals personally identifiable information (a name, address, routing number, and account number). Crooks combine those details with fake ID to open “drop” accounts or order new checkbooks in the victim’s name, then write what look like normal checks until the true account holder or bank flags the activity.
Check counterfeiting is when fraudsters start by stealing or intercepting a real check — often from your mailbox or a company’s outgoing mail. They scan it to capture the magnetic routing and account numbers then print dozens of near-perfect copies on blank check stock. On each copy, they’ll change the payee name or inflate the amount. Because the routing information is genuine, banks will initially accept deposits at ATMs or teller windows. By the time the bank spots the fake and pulls back the funds, the criminal has already pocketed the money.
Cashier’s check fraud involves four steps. First, a fraudster mails a bank-guaranteed check that appears genuine. Next, the recipient deposits it and temporarily gains access to the funds. Then the scammer requests a “refund” of an overpayment by wire transfer or gift card. Finally, once the issuing bank flags the check as counterfeit, the deposit is reversed and the account is debited for the full amount plus fees.
Mobile check fraud, also known as double presentment, exploits remote-deposit-capture apps that credit funds from a smartphone photo within minutes. Fraudsters image-deposit a stolen check and then rush the physical document to an ATM — or another bank — before duplicate detection systems sync and flag suspicious activity. If timed well, both deposits clear and the cash is drained before either institution reverses the overlap. Bank analysts flag double presentment as the fastest-growing mobile-deposit abuse.
The most common type of check fraud is check alteration – better known as “check washing.” According to the FinCEN’s nationwide review of mail-theft cases, 44% of stolen checks were chemically washed and rewritten before they were ever deposited, making alteration the leading manipulation by a wide margin.
Fake check scams typically target accounts filled with cash and people who still rely on paper checks. That narrows the bull’s-eye to three main groups.
The legal consequences of check fraud include criminal prosecution and civil liability – and the two play out quite differently.
At the criminal prosecution level, the dividing line is the amount and the venue. Large or organized schemes usually land in federal court. A conviction there carries up to 30 years in prison and a fine of $1M as outlined in section 1344 of the UCC.
Smaller cases remain with state prosecutors, but most states elevate forged, altered, or counterfeit checks to a felony once the face value clears a modest threshold (for example $950 in California).
Unfortunately, a criminal conviction does not decide who ultimately eats the monetary loss. That’s governed by the Uniform Commercial Code and by each bank’s account contract. When a thief alters the amount or forges the drawer’s signature on your check, the bank that paid it must reimburse you — provided you flag the problem quickly. Section 4-406 of the UCC lets a bank cut off refunds if the customer waits more than 30 days after the statement is made available to report the unauthorized item.
The rule works in reverse when someone deposits a counterfeit or an entirely fake check into your account. Every credit you see from a paper check deposit is provisional; if the check later proves to be fake, the bank reverses the entry and you owe the money back. The Federal Trade Commission warns that this is exactly how “overpayment” and “prize-winning” scams drain victims: Once you have refunded part of that provisional credit to the scammer, the loss is yours when the counterfeit is returned.
The investigation of check-fraud usually begins at a bank’s back office. The moment a customer disputes a check, whether it’s because the amount is wrong, the payee looks unfamiliar, or a mailed payment never arrives, the bank must open an inquiry. Federal rules require the bank to provisionally credit the account while it verifies the claim. If the signature proves to be fake or the amount altered, the check is declared “not properly payable” and the provisional credit becomes final.
When an internal review shows criminal intent, the bank files a suspicious activity report. Those SARs go to FinCEN, where analysts flag patterns — such as clusters of altered business checks or repeated deposits at the same ATM.
From FinCEN the case often shifts to law enforcement. If the check moved through the postal system — as most do — the U.S. Postal Inspection Service steps in. Postal inspectors tap surveillance footage from blue collection boxes, trace stolen “arrow keys,” and match handwriting or printer artifacts on seized checks. If SAR data points to organized crime, federal law enforcement such as the FBI or Secret Service step in.
For victims, speed matters. The sooner authorities are informed, the better the chances of catching the culprits. From first dispute to closed investigation, a routine, single-item case can wrap up in a month. Organised crime rings that span multiple banks and states take much longer.
Real-world check fraud examples illustrate how varied tactics for check fraud can be and how high stakes are. Here are some notable cases.
A Salt Lake City indictment describes three defendants who scanned stolen U.S. Treasury checks, printed counterfeits on blank stock, deposited the paper across several banks, then funneled the proceeds through mule accounts before wiring the money overseas. In less than three years, they moved more than $3 million.
Mike Smith mailed his routine $2,987 mortgage check from his rural mailbox. Thieves stole the envelope, erased the payee and amount with solvents, readressed it to a stranger, and cashed it. Smith discovered the fraud only when his lender called about a missed payment. Local deputies confirmed the check had been washed. The bank refunded Smith but opened a case with postal inspectors. The incident is part of at least 13 forged-check reports in New Hanover County.
Between 2018 and 2023, Valentino Colic, 34, met private car sellers on Facebook Marketplace and Craigslist, handed over cashier’s checks printed on home equipment, drove the vehicles away, then flipped them before the victims’ banks marked the check as “no funds.” Court records show more than $1.7 million in worthless checks issued to over 100 individual sellers across five states. Colic was sentenced on March 27, 2025, to 12 years in federal prison.
The leader of a Washington-area network admitted stealing more than 700 checks worth over $5 million, recruiting account mules online, and laundering the cash through shell companies that paid for luxury cars and designer goods. U.S. Postal inspectors, the Secret Service, and the IRS linked the deposits by matching dozens of counterfeit items. A federal judge handed down a nine-year sentence.
If you’re a victim of check fraud, follow the steps below to limit losses and any further exposure.
To report check fraud, you’ll have to turn to federal and state agencies. File reports with all law enforcement agencies to maximise your chance of reimbursement.
Submit these reports on the same day you alert your bank. Agencies share data in real time, making it easier to intercept accounts and charge offenders before funds disappear.
To help you avoid check fraud, we’ve prepared practical steps you can take. Banking and government experts recommend a multi-faceted approach to avoid becoming a victim of check fraud:
Consider using Informed Delivery (a free USPS service that emails you images of incoming mail) so you can verify if important mail (like a check) is expected and note if it doesn’t arrive.
For sensitive mail, you might also use security/tinted envelopes to make it harder to see or fish out checks
Never pre-sign blank checks, and avoid writing personal details (like your phone , driver’s license, or Social Security number) on the checks, such info can help identify thieves if the check falls into the wrong hands.
You might also consider using electronic bill pay through your bank. The bank mails a check on your behalf or pays the bill electronically, removing your personal check from the equation.
If a check you mailed hasn’t reached the recipient within a reasonable time, follow up with them and don’t ignore a delay, it might have been stolen in transit.
Many victims only discover fraud weeks later when a bank statement arrives. By then, the trail is cold. Timely detection can greatly improve the chance of recovery.
Common scam scenarios include mystery shopper jobs, prize winnings, charity donations, or online purchases where the buyer “accidentally” sends too much. In all these cases, the check will bounce. The FTC’s rule of thumb: If someone you don’t personally know sends you a check and asks for any form of send-back payment, don’t do it.
When selling online or via classifieds, be wary of any check payment larger than the price, it’s usually a red flag. For businesses, consider instituting a waiting period to verify high-value checks from new clients or unknown parties before delivering goods or services.
Positive Pay is a service where you provide your bank with the details of the checks you issue (check number, amount, payee), and the bank will only pay checks that match. This can stop criminals who attempt to cash counterfeit or altered checks in your or your company’s name. Likewise, many banks offer alerts for large check payments, the ability to set daily withdrawal limits, or dual authorization for issuing checks above a threshold. Make use of these services if available. They add layers of defense.
The American Bankers Association advises victims to obtain copies of any fraudulent checks from the bank (for evidence) and then file reports with law enforcement and the Postal Inspection Service.
NordProtect continuously searches breach archives and performs dark web monitoring for any appearance of your personal identifiers and sends an alert the moment your data shows up somewhere it shouldn’t. It also provides online fraud insurance coverage, so you can protect yourself from scams.
At the same time, if you’re also worried about related threats like credit card fraud, the NordProtect credit monitoring feature flags new inquiries or account openings tied to your identity, so you can stop check-based identity scams before they take hold. If fraud does occur, NordProtect’s recovery specialists can help you through placing formal alerts, filing disputes with banks and credit bureaus, and reclaiming your money. This layered defense ensures that if check fraud turns into identity theft, you’re already protected.
By following these tips and staying informed, you can significantly reduce the risk of falling victim to check fraud. The overarching advice is to treat a paper check with the same caution you would treat cash. That might mean phasing out paper checks in favor of more secure payment methods. However, if you do use checks, being proactive is your best defense. Check fraud may be on the rise, but with awareness and practice, you can stay one step ahead.
Lukas is a digital security and privacy enthusiast with a passion for playing around with language. As an in-house writer at Nord Security, Lukas focuses on making the complex subject of cybersecurity simple and easy to understand.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.