🏠 Scam Guide · 2026 · Everywhere

Real-Estate Wire Fraud: 5 Variants and the Verified-Callback Rule That Stops Them

$500M stolen from U.S. homebuyers in 2024 (CertifID / FBI IC3). Median loss: $70,000. The scammer has been reading the closing email thread for weeks. Real Reddit victim stories, verified federal sources, and the one rule that defeats every variant.

💬 Channels: Email · Closing day · Vendor invoices 📅 Updated April 2026 📑 5 variants documented ⭐ Reddit-sourced & FBI/ALTA-verified
5 High Risk
📖 13 min read

📌 The 30-Second Version

Real-estate wire fraud is a Business Email Compromise (BEC) attack timed to a property closing. A scammer compromises an email account in the deal — closing attorney, title company, agent, lender, or buyer — and quietly reads the thread for weeks. Two days before closing, they impersonate the compromised party and send a polished email with new wiring instructions. The buyer wires hundreds of thousands to the wrong account. The FBI attributed $174M in 2024 real-estate cyber-fraud losses; CertifID estimates real-estate wire fraud accounted for $500M of all 2024 IC3 losses, with median loss $70,000. Recovery requires reporting in the first 24-72 hours.

⚡ Quick Safety Rules

🪞 Is this wire instruction real? — 30-second self-check

Run before clicking "send" on any wire over $1,000 connected to a real-estate transaction. Two or more "yes" answers and you stop and call.

  1. Did the wiring instructions arrive by email rather than being handed to you in person?
  2. Are these "updated" or "revised" instructions that came after the original ones — especially close to closing day?
  3. Does the receiving bank name not match the title company or law firm exactly?
  4. Has the email asked you to confirm only by replying to the email, rather than calling a verified number?

2+ yes: Stop. Call the verified callback number from your transaction file. → Skip to What to Do

Jump to a Variant

  1. High The Last-Minute Wire-Instruction Swap (the canonical variant)
  2. High Email-Editing Man-in-the-Middle ("They're Editing Our Emails")
  3. High Spoofed Callback Number (defeats the call-to-verify rule)
  4. High Vendor BEC Invoice Swap (business-side variant)
  5. High M365 Account Takeover Cascade (the supply-chain attack)

The Anatomy of a $335,000 Wire

The post is on r/fatFIRE, headlined "Boomer parents bamboozled — wire fraud at real estate closing." The author's parents wired $335,000 on a Tuesday, believing the funds were going to the title company. They discovered two days later, at closing, that the money was gone. Wells Fargo had been called. The FBI had been called. The poster's question to Reddit: "Do they lawyer up? What are the chances of them getting any of this money back?"

The top reply, from a real-estate professional: "I work in real estate. We make every client sign a form about wire fraud before closing. Every reputable attorney and title company I deal with has email footers and/or documents about this issue. The scammers compromise the email chain and follow the emails." The compromise had happened weeks earlier. By closing day, the scammer knew exactly when to inject the fake instructions.

The thread is one of dozens. The script underneath is a single Business Email Compromise pattern. [r/fatFIRE · 544 upvotes as of Apr 2026]

What This Scam Actually Is

Real-estate wire fraud is a specific application of Business Email Compromise (BEC) — the highest-dollar fraud category in the FBI's 2024 IC3 report. The FBI attributed "$2.77 billion across 21,442 reported incidents" to BEC overall; cumulative BEC losses since 2015 have "skyrocketed by more than 1025%, totaling $17.1 billion over the last decade." Real estate is the dominant individual-consumer vertical inside BEC because property transactions involve large one-time wires to unfamiliar bank accounts on a known timeline.

Mechanically, the script has four phases:

  1. Initial compromise. The scammer takes over an email account belonging to one party in the deal — most often the closing attorney's paralegal or the title company's escrow officer. The compromise is typically a phishing email weeks or months before any specific deal, and the attacker may sit dormant in the inbox for months.
  2. Reconnaissance. Once a real-estate transaction shows up in the compromised inbox, the attacker reads every email in the thread — closing date, wire amount, parties' names, communication cadence, language style, signature blocks. They learn enough to convincingly impersonate the compromised party.
  3. Injection. Two or three days before closing, the attacker sends a polished email from the compromised account (or a near-identical lookalike domain) with new wiring instructions. The email matches prior tone and signatures perfectly because the attacker has read months of correspondence.
  4. Wire-out and disappearance. The buyer wires the closing funds to the scammer's account. Within hours the funds are forwarded to a second account, then a third, often international. By closing day — when everyone realizes the title company never received the money — the trail is cold.

The script is effective because every detail looks correct: the email comes from the right address, in the right tone, at the right time, with the right amount. The only red flag is that the bank account is new — and if the buyer doesn't think to call and verify, the fraud completes. CertifID's 2024 State of Wire Fraud Report found "22% of fraudulent communication appears to come from the victim's real estate agent" and that "one in two surveyed consumers professed to being insufficiently aware of real estate fraud risks prior to closing."

🔑 The single defense that defeats every variant — the verified-callback rule

At the very start of the transaction, write down the title company's main switchboard number and your closing attorney's office number from each firm's official website. Not from an email. Not from a business card someone handed you. From the firm's website. Keep that paper number with your transaction file.

Before initiating ANY wire, call that paper number and verbally confirm the wiring instructions with someone you've spoken to before. Read the routing and account numbers back digit-by-digit. Confirm the receiving bank name matches the firm. The r/RealEstate community top reply on the canonical $400K Silicon Valley case (417 upvotes): "Confirming the wire instructions with the title company, on the phone or in person, is essential." This rule defeats every variant on this page. The five variants below are different ways the scammer tries to circumvent it.

The script is one. The five masks it wears are below.

The 5 Variants

Variant #1
The Last-Minute Wire-Instruction Swap
⚠️ High
💬 Channel: Email from a compromised closing-attorney, paralegal, or title-company escrow account, two to three days before closing day. Subject line is benign ("Wiring instructions update," "Final closing details").

An email from the closing attorney's known address arrives 48 hours before closing with "updated" wiring instructions. The email matches every prior email perfectly because the scammer has been in the attorney's inbox for weeks. The buyer wires the closing funds to a different bank than the one originally provided.

A first-time homebuyer in r/FirstTimeHomeBuyer ("Wire Fraud is No Joke," 742 upvotes) describes the textbook case. Her closing agent had warned about wire fraud explicitly. Two days before closing, an email arrived from the agent's address, with the agent's photo, signature, and contact info. The email said the closing wire instructions had been updated; please use the new bank account. The buyer almost wired it. She paused only because her husband had asked her to call the agent before sending any wire. She called. The agent had not sent the email.

A second case, on r/RealEstate ("wire fraud $100k+," 692 upvotes), describes the same pattern from the opposite outcome. The author had asked his real estate attorney's paralegal whether he could pay closing costs by cashier's check; the paralegal (whose email was compromised) replied that they preferred wire and attached a PDF of which bank to wire funds to. The PDF was a lookalike. By the time the author's bank caught the discrepancy, the wire had cleared. The defense the thread surfaces, top reply with 323 upvotes: "Wow. That's a lot more advanced than all the scams I'm used to." The advance is in the patience — by closing day the attacker has read every prior email and writes in the paralegal's exact voice.

The defense is procedural rather than auditory. The polished email cannot be distinguished from a real one in 30 seconds; that is the design. The single decision rule that breaks the funnel: any "updated" or "revised" wiring instructions received by email are treated as suspect by default and verified by callback to the firm's known main number — not the number in the email — before the wire is sent. ALTA's 2024 State of Wire Fraud Study reports "the average title insurance fraud and forgery claim costs over $143,000."

Red Flags

  • Wiring instructions arrive in an email rather than being handed to you on paper at the office
  • An "updated" or "revised" version of instructions arrives close to closing day, after the original instructions
  • Receiving bank name on the instructions does not match the title company or law firm name exactly
  • Email asks you to confirm by replying to the email rather than calling a phone number you've used before
  • Subject line creates closing-day urgency ("urgent," "final," "must be completed today")

How to Avoid

  • Apply the verified-callback rule to every wire over $1,000: call the firm's main number from their website and confirm verbally before sending.
  • If your attorney will accept a cashier's check, use one. The check is delivered in person, eliminating the wire-interception window.
  • Read account and routing numbers back to the verified contact digit-by-digit. A single transposed digit between the legitimate and fraudulent account is a common attacker trick.
  • Do not respond to "updated" wiring instruction emails by reply. Pick up the phone. Use a number you already have.
  • Tell your closing attorney upfront that you will be calling to verify any wire — make it explicit so the timing isn't surprising on the day.
"I work in real estate. We make every client sign a form about wire fraud before closing. Every reputable attorney and title company I deal with has email footers and/or documents about this issue. The scammers compromise the email chain and follow the emails, then send very real looking emails right at closing." r/fatFIRE top reply, on the $335K parents-loss case (905 upvotes)

The basic email-injection variant assumes the scammer can read prior emails and impersonate them. The next variant goes further — actively rewriting messages mid-conversation.

Variant #2
Email-Editing Man-in-the-Middle ("They're Editing Our Emails")
⚠️ High
💬 Channel: An ongoing email thread between buyer, seller, agent, and attorney where one party's account is compromised. The attacker silently modifies messages mid-conversation, changing details before they reach the recipient.

More sophisticated than a one-shot fake email. The attacker is logged into the compromised account in real time, intercepting incoming messages, modifying details (bank account, signature), and forwarding the altered version. Both parties believe they are corresponding directly. The attacker is editing the conversation as it happens.

The r/RealEstate thread "REALTOR WIRE FRAUD ALERT: They're editing our emails" (267 upvotes) describes a deal where the buyer noticed something subtly wrong on a third or fourth round of email correspondence about closing details. Account numbers in earlier emails the agent had supposedly sent didn't match the agent's current memory. The agent insisted she had sent specific instructions; the buyer's inbox showed different instructions. They eventually realized that someone had compromised the agent's email account, was reading every outbound email before it left, and editing wiring details before forwarding the modified message.

This variant is harder to detect because there is no single "fake email" — every email looks authentic, comes from the real address, in the real tone. The attacker's edits are surgical: change a single account number, leave everything else intact. From either party's perspective, the conversation is normal until the wire fails. The top community comment on this thread (284 upvotes) describes a defense one buyer used: "When we bought our current house in 2023, I had to physically go to the title office and pick up a piece of paper with the wiring instructions on it because of scams like this one. We were told repeatedly that any instructions sent by email were invalid."

The defense remains the verified-callback rule, applied with extra discipline: do not rely on email for any single fact about wiring details, even if the same fact is repeated across multiple emails. Pick up the phone. Confirm verbally. The man-in-the-middle attacker cannot edit a phone call. CertifID's 2024 report notes that "fraudsters have become increasingly skilled at leveraging public records, breaching broker and title agency systems, and deploying AI-enabled tactics to impersonate real estate professionals" — meaning email-only verification is no longer sufficient on either side.

Red Flags

  • Wiring details in your inbox don't match what the other party remembers having sent
  • Subtle inconsistencies across the email thread — one email says X, another says Y, both apparently from the same sender
  • The other party's email signature has slightly different formatting than usual (font weight, line spacing) — a sign the attacker is reformatting messages
  • Replies arrive at unusual hours for the sender's time zone, or at unusually fast/slow cadence
  • The other party seems unaware of details they should know from prior emails — because their original messages were edited before delivery

How to Avoid

  • Treat email as untrusted for any specific dollar amount, account number, or bank name. Verify all numerical details by phone callback.
  • Pick up wiring instructions in person at the title company's office whenever possible — printed paper handed across a desk.
  • If you suspect mid-conversation editing, call all parties on numbers you've used before and ask each to read back their version of the agreed details.
  • For high-value transactions, escrow services (Earnnest, Plaid Pay-by-Bank, or title-company-integrated platforms) bypass the wiring-instruction email entirely.
  • Report any suspected email compromise immediately to the affected party so they can investigate their account, change passwords, and enable MFA. The longer the attacker remains in the inbox, the more deals are exposed.

The first two variants assume the buyer trusts email and can be tricked into wiring to a fake account. The next variant attacks the defense itself — the verification call.

Variant #3
Spoofed Callback Number (defeats the call-to-verify rule)
⚠️ High
💬 Channel: Email from compromised real-estate agent or title-company account containing fraudulent wiring instructions plus a "call to verify" phone number. The phone number is the scammer's, not the firm's.

The buyer follows best practice and calls to verify wiring instructions. But the phone number on the email is the attacker's — not the firm's. The verification call goes to the scammer, who confirms the fake instructions in a professional voice. The buyer wires the funds, having "verified" them.

A title-company employee on r/RealEstate ("Home buyer scammed out of $400,000 down payment") describes the case directly: "We had a case where the agent's email got hacked. The bad actor put their number down as the title company's number to call and confirm." (156 upvotes). The buyer did everything right — the email instructed them to call to verify, they called, they got a professional voice that confirmed the wiring details. Every box was checked. The defense had been weaponized.

This is the most insidious variant because it specifically targets buyers who have learned the verified-callback rule but execute it incorrectly — calling the number provided in the email instead of a number obtained independently. CertifID's 2024 report measured "$500 million" of all 2024 IC3 losses attributable to real-estate wire fraud, much of it from victims who believed they had verified. The Silicon Valley executive who lost $400,000 in mid-2024 (CNBC, July 2024) had checked the email signature, checked the domain, and called the number on the email. The number went to a call center the scammer operated.

The defense is the version of the verified-callback rule that uses a number obtained independently of the deal. The phone number must come from the title company's or law firm's main website — not from any email, document, or business card delivered through the deal channel. Write the number down on day one. Tape it to the inside of the transaction folder. Use that number, no other. If the email says "call to verify at this number," the email number is the scam.

Red Flags

  • Email instructs you to call a specific number to verify the wiring instructions — but the number is presented in the email, not from your transaction file
  • Phone number on email signature differs from the firm's main switchboard number on their website
  • Caller you reach answers as the firm but doesn't know specific deal details that the real firm would know
  • Verification call routes through an unfamiliar IVR ("press 1 for closings") that you haven't encountered in prior calls to the firm
  • Caller gets impatient or pressures you to wire quickly — real escrow officers give you time to confirm details

How to Avoid

  • Get the firm's main switchboard number from their official website on day one of the transaction. Save it on paper. That is the only number you will use to verify wires.
  • If the email provides a "verification number," ignore it. Call the website number instead. Ask for the closing officer by name.
  • If the closing officer's direct line was given to you in person at a meeting, that is also acceptable. A direct line emailed to you mid-transaction is not.
  • Test the website number with a low-stakes call early in the transaction (e.g., a clarifying question about closing). Confirm you reach the same firm.
  • If you suspect the email number is fraudulent, do not call it — even to "see what they say." It identifies you as a target and may accelerate the script.

The first three variants target homebuyers and individual consumers. The next two scale the same script up to businesses, where the dollar amounts grow and the email accounts under attack are larger.

Variant #4
Vendor BEC Invoice Swap (business-side variant)
⚠️ High
💬 Channel: Compromised vendor email account at a small or mid-sized business. The scammer modifies legitimate incoming invoices — same vendor, same amount, same line items — but with new bank-account routing and updated payment instructions.

A business's accounts-payable team receives invoices from a known vendor. The scammer has compromised the vendor's email account, deletes the real invoices on arrival, then resends spoofed copies with the same content but updated bank-account info. The business pays — to the scammer's account. Losses are typically $50K to $500K per incident.

The r/Scams thread "Business email was hacked, 200K lost" describes the canonical case (58 upvotes). The author's company received invoices from regular vendors via a shared business inbox. The scammer compromised that inbox, deleted real invoices on arrival, and resent spoofed versions with the vendor's name, the right amounts, and the right line items — but with new payment-routing details. The accounts-payable team did the ACH transfers as usual. By the time the real vendor called asking why their invoices had not been paid, $200,000 was gone.

This variant scales BEC from individual closings to business operations. It is the same script — compromised email account, patient reconnaissance, surgical modification of legitimate communications — applied to the AP function instead of the homebuyer wire. The FBI's 2024 IC3 PSA on Business Email Compromise updated the cumulative losses to "The $55 Billion Scam" globally between 2013 and 2023. Vendor-payment fraud is the most-reported sub-category for businesses.

Defense at the business level is procedural and infrastructural. Mandate dual approval for any vendor banking-detail change. Require a callback to the vendor's known phone number — not a number on the new invoice — for any change to payment instructions. Most companies that ship cyber insurance discover after a loss that their policy required these procedures and now exclude the loss because the procedure wasn't followed. The r/Scams top reply on the $200K case (65 upvotes): "If your business has cyber insurance it may be covered." A second top reply: "Call police. Call a lawyer. Call police."

Red Flags

  • An existing vendor sends an invoice with banking details that differ from what's on file in your AP system
  • The vendor "updated" their payment information mid-relationship without prior notification through a non-email channel
  • Invoices arrive faster or in a different format than the vendor's usual cadence
  • The vendor's email signature, phone number, or logo has subtle differences from prior emails
  • Real invoices from the vendor stop arriving — the scammer has been intercepting and deleting the genuine ones

How to Avoid

  • Mandate dual approval and a callback to the vendor's known number for any banking-detail change. No exceptions.
  • Maintain a vendor master file with payment-routing details on a separate system from email — locked down so only finance leads can edit.
  • Run quarterly vendor audits — call each significant vendor on their known number and confirm current banking details still match your records.
  • Carry cyber insurance that covers BEC vendor-impersonation losses and ensure your processes meet the policy's procedural requirements.
  • For high-value vendor relationships, use a payment platform (Bill.com, Tipalti) that maintains banking details inside the platform and won't accept email-based changes.

The vendor-invoice variant compromises one party in a chain of transactions. The final variant compromises a high-privilege account that opens the door to many transactions at once.

Variant #5
M365 Account Takeover Cascade (the supply-chain attack)
⚠️ High
💬 Channel: A VP- or executive-level Microsoft 365 (or Google Workspace) account is compromised at a real-estate firm, title company, or vendor. The attacker uses that account to send malicious internal messages to dozens of employees and external partners simultaneously.

Higher-stakes than a single-account compromise. Once the attacker has a privileged exec's M365 credentials, they can blast malicious OneDrive/SharePoint share links to all internal users plus external clients. Each clicked link harvests another credential. The cascade can produce dozens of compromised accounts inside hours, multiplying the wire-fraud surface area exponentially.

The r/sysadmin thread "Had my first real email compromise incident this week" (186 upvotes) walks through the cascade in detail. A VP-level M365 account at a 250-mailbox SMB got compromised. The attacker used the VP's account to send malicious OneDrive/SharePoint sharing links to 82 internal users plus a wider list of external partners. Each link routed to a fake login page. Recipients who entered credentials were themselves compromised, expanding the attack laterally. By the time IT detected the activity, the attacker was inside multiple accounts and had begun monitoring active deals for wire-fraud opportunities.

This variant matters for real estate because title companies, real-estate brokerages, and law firms typically run on M365 or Google Workspace and have weak Conditional Access policies. A single compromised exec account becomes a launchpad for monitoring every deal across the firm. Multiple sources cite this as the entry point for the most damaging wire-fraud cases — losses aren't limited to one buyer; they're distributed across every deal that account had access to. The r/sysadmin top reply (107 upvotes) emphasized the defensive controls: "CA can be set up to force MFA on risky signs, or require a password, all kinds of things. Look into these at a minimum. You can also utilize Defender for Cloud Apps with CA to set up a session policy."

Defense at this level is purely IT-procedural. Every M365 / Google Workspace account at a firm handling real-estate transactions must have phishing-resistant MFA (FIDO2 hardware keys or Windows Hello), Conditional Access policies that block legacy authentication, and Defender for Cloud Apps (or equivalent) session monitoring. Buyers cannot defend against this variant directly — but they should ask their closing attorney and title company what their M365 hardening looks like before transferring large sums. ALTA's 2024 study found "nearly all title companies surveyed (91%) currently provide or plan to provide education and resources to train employees on fraud," but training alone doesn't prevent credential-phishing attacks; technical controls are required.

Red Flags

  • An exec or partner-level account at the firm sends out unexpected "shared file" or "review document" links to multiple recipients at once
  • Login prompts on those links route to a Microsoft-branded page on a non-microsoft.com domain
  • The exec's recent emails show signs of automation (identical phrasing, unusual hours, blast distribution)
  • External partners report receiving suspicious emails appearing to come from your firm — they noticed before you did
  • Sudden changes in M365 sign-in patterns (new countries, unusual times, MFA prompts firing more frequently)

How to Avoid

  • Mandate phishing-resistant MFA (FIDO2 hardware keys, Windows Hello, or Apple Passkeys) on every account at the firm, especially privileged ones.
  • Configure Conditional Access policies to block legacy authentication, require compliant device, and force MFA on any "risky sign-in" detection.
  • Deploy Defender for Cloud Apps (or equivalent) with session policies that monitor for malicious file-sharing patterns and forwarding rule creation.
  • Run quarterly account audits — review forwarding rules, OAuth grants, and inbox rules across all privileged accounts to find dormant compromises.
  • For buyers and clients: ask your closing firm what their M365/Google Workspace hardening looks like, what percentage of staff have FIDO2 keys, and when their last security audit was. The answer is informative.

The Numbers (and Where They Come From)

Every figure below is from a primary source with the verbatim quote on file in our research log. Where a stat is an industry estimate rather than agency-reported, the source card is shaded differently.

$2.77B
FBI IC3 2024 BEC losses across 21,442 reported incidents — more than 17% of the $16.6B total cyber-fraud losses for the year. Real-estate is the dominant individual-consumer vertical inside BEC.
Source: FBI IC3 2024 Annual Report · ✓ verified
$174M
FBI IC3 2024 cyber-fraud losses specifically in the real-estate sector. ALTA's State of Wire Fraud 2024 also reports the average title-insurance fraud and forgery claim costs $143,000+.
$500M
CertifID's 2024 estimate of real-estate wire fraud's share of all 2024 FBI IC3 losses ($12.5B total). 1 in 10 Americans targeted; 1 in 20 lose money. Median consumer loss: $70,000.
Source: CertifID 2024 State of Wire Fraud · ⚠ industry estimate
+1,025%
Cumulative growth in BEC losses since 2015 (FBI IC3 first reporting year). Total BEC losses to U.S. victims since 2015: $17.1B. Real estate is the fastest-growing sub-category in 2023-2024.
Source: FBI IC3 (decade view) · ⚠ growth estimate

Two additional facts worth knowing. ALTA's 2024 study found that "in 2023, 28% of title insurance companies experienced at least one seller impersonation fraud attempt, and in April 2024 alone, two in 10 title companies experienced attempts." CertifID's consumer survey found that "22% of fraudulent communication appears to come from the victim's real estate agent" — meaning the most-trusted contact in many transactions is also a frequent compromise target.

📌 Why the industry hasn't fixed this

Real-estate wire fraud has been documented in trade press since the early 2010s. The defenses are well known: MFA on email accounts, verified-callback rules, secure document portals instead of email attachments, escrow-integrated payment platforms. So why is the problem getting worse?

Three structural reasons. First: every transaction involves multiple firms (buyer's agent, seller's agent, title company, lender, attorneys), each running their own email infrastructure. The weakest link in any deal is the attack surface. Even firms with hardened M365 are exposed when their counterparties run on consumer Gmail. Second: real-estate transactions are episodic and high-stakes, which means consumers go through the process rarely (most adults buy 0-3 houses in a lifetime) and don't accumulate fraud-pattern recognition the way they would for repetitive transactions. Third: the industry's professional liability (E&O) coverage handles individual losses without forcing structural reform, and title insurance covers the title-defect side rather than the wire-interception side.

The r/RealEstate community comment that captures the frustration (104 upvotes): "This has been happening for many years now. The fact that the industry has not done anything to prevent this is ridiculously shitty." ALTA's 2024 announcement of new best-practices on wire verification is the strongest industry response to date — but adoption is voluntary, and consumers still need to defend themselves transaction by transaction.

Recovery Reality (and the 24-72 Hour Window)

Recovery from real-estate wire fraud is possible but rare, and the window is narrow. The CFPB's mortgage-closing-scam guidance is direct: "Filing within 24 hours, but no more than 72 hours, provides the best chance of recovery." If the wire has not yet cleared at the receiving bank, your originating bank can sometimes recall it. After 72 hours the funds are typically wired out internationally and recovery becomes very rare.

The FBI's Financial Fraud Kill Chain is the formal recovery protocol — it's a coordinated effort between the FBI, the originating bank, and the receiving bank to reverse a fraudulent wire that has not yet been withdrawn. To activate it, the victim must file at ic3.gov within the first 72 hours and contact the FBI field office for amounts over $50,000. Most successful recoveries happen in the first 48 hours.

Beyond the bank, several civil paths exist. If the closing attorney's or title company's email account was compromised, their professional liability (E&O) insurance may apply — but pursuing this requires civil litigation and the burden is on the buyer to demonstrate the firm's negligence in protecting its email systems. Some buyers carry their own cyber insurance (increasingly recommended for high-value home purchases). ALTA introduced a seller-impersonation endorsement in 2024 that covers some seller-side fraud but does not cover the more common buyer-side closing wire losses.

The blunt summary: the 24-72 hour window is everything. Beyond that, expect to need litigation, insurance, and patience for what is rarely full recovery.

If You're a Buyer About to Close — The Checklist

  1. Day 1 of the transaction: Get the title company's main switchboard number from their official website. Get your closing attorney's office number from their firm website. Write both on paper. Tape to the inside of your transaction folder.
  2. Two weeks before closing: Ask your closing attorney whether they will accept a cashier's check instead of a wire. If yes, plan to use one — it eliminates the wire-interception window entirely.
  3. Three days before closing: If you receive any "updated" or "revised" wiring instructions, treat them as suspect by default. Call the verified number from your transaction folder before doing anything.
  4. Wire day: Call the verified number, ask for the closing officer by name, read the routing and account numbers back digit-by-digit, confirm the receiving bank name matches the firm. Only after that, send the wire.
  5. If anything goes wrong: The next 24 hours determine whether recovery is possible. Call your bank's fraud line within hours, request a wire recall, file at ic3.gov, contact your local FBI field office for amounts over $50K. Don't wait.

🆘 What to Do If You've Wired the Wrong Account

📞 Call Bank Fraud Line First

Within hours of suspecting fraud — not the next business day. Most U.S. banks have 24/7 fraud lines on the back of your debit card. Request a wire recall and ask specifically about the FBI Financial Fraud Kill Chain protocol.

📋 File at IC3 within 72h

File at ic3.gov as soon as the bank is notified. The FBI uses IC3 filings to coordinate the Kill Chain protocol with receiving banks. Filing inside 24-72 hours is the only window in which recovery is realistically possible.

🏛 Local FBI Field Office

For amounts over $50,000, call your local FBI field office directly in addition to filing at IC3. The faster the FBI is involved, the more pressure they can put on receiving banks. Office numbers are at fbi.gov/contact-us.

📑 Title Company E&O

Notify the title company and your closing attorney immediately. If their email systems were compromised, their professional liability (E&O) insurance may apply. Document everything in writing.

🛡 FTC + State AG

FTC: reportfraud.ftc.gov. State AG: search "[your state] attorney general consumer protection." These feed federal enforcement priorities and may activate state-level victim-restitution funds in some jurisdictions.

💼 Cyber Insurance (if any)

If you carry cyber insurance — or your closing firm does — file the claim within the policy's notification window (often 48-72 hours). Document every email, wire receipt, and chat transcript before deleting anything.

If You're Reporting Outside the United States

Real-estate BEC targets English-speaking property buyers across the entire Anglosphere. Reporting paths exist in every major jurisdiction.

Frequently Asked Questions

Real-estate wire fraud is a Business Email Compromise (BEC) attack timed to a property closing. Scammers compromise an email account in the deal — closing attorney, title company, real estate agent, lender, or buyer — then send fake wiring instructions at the moment closing funds are about to move. The buyer wires hundreds of thousands of dollars to the scammer's account instead of the title company's. The FBI attributed $174M in 2024 cyber-fraud losses to the real estate sector; CertifID estimates real-estate wire fraud accounted for $500M of all 2024 IC3 losses, with median consumer loss exceeding $70,000.
They've been reading your email for weeks. The scammer compromises the email account of one party in the deal — most often the closing attorney's paralegal or the title company's escrow officer — then quietly monitors the deal's email thread. They learn the closing date, the wire amount, the parties' names, and the cadence. Two days before closing, they impersonate the compromised party and send a polished email with new wiring instructions. The email looks identical to prior emails because they have read all of them. ALTA's 2024 study found 28% of title insurance companies experienced at least one seller-impersonation attempt in 2023.
The verified-callback rule. At the very start of the transaction — before any compromise can happen — write down the title company's main switchboard number and your closing attorney's office number from the firm's official website. Keep that paper number with the transaction file. Before sending ANY wire, call THAT number and verbally confirm the wiring instructions with someone you've spoken to before. Never use a number provided in an email, even if the email looks legitimate. r/RealEstate consensus: "Confirming the wire instructions with the title company, on the phone or in person, is essential." This single rule defeats every variant on this page.
Sometimes — but only if you act inside the first 24-72 hours. The CFPB recommends contacting your bank or wire-transfer company immediately and asking for a wire recall: "Filing within 24 hours, but no more than 72 hours, provides the best chance of recovery." If the wire has not yet cleared at the receiving bank, your originating bank can sometimes recall it. After 72 hours the funds are typically wired out internationally and recovery becomes very rare. The FBI's Internet Crime Complaint Center (IC3) at ic3.gov has occasional success with the Financial Fraud Kill Chain protocol for victims who report fast. Beyond that window, recovery depends on cyber insurance (if the buyer or business had it) or civil litigation against the compromised party's E&O coverage.
Report to (1) your originating bank's fraud line within hours — request a wire recall, (2) the FBI's Internet Crime Complaint Center at ic3.gov within 24-72 hours — they coordinate the Financial Fraud Kill Chain protocol with the receiving bank, (3) your local FBI field office (especially for amounts over $50K), (4) your state attorney general's consumer-protection unit, (5) the title company's E&O insurance carrier and your real estate attorney, and (6) the FTC at reportfraud.ftc.gov. Save every email, wire receipt, and chat transcript before you delete anything — the FBI needs full headers to trace the compromised account.
Most often, the closing attorney's paralegal or the title company's escrow officer. These are the accounts that handle wire instructions for many simultaneous deals, run on standard cloud-email services (M365, Google Workspace), and may have weaker MFA enforcement than executive accounts. CertifID's 2024 State of Wire Fraud report found 22% of fraudulent communication appears to come from the victim's real estate agent — meaning the agent's email is also a frequent compromise target. The buyer's own email is compromised in a smaller share of cases. Defense is symmetric: every party in the deal needs MFA on their email account, and every party needs to use the verified-callback rule for any wire instruction received by email.
Generally no. Standard title insurance covers defects in the title (liens, ownership disputes), not pre-closing wire fraud where the buyer sent funds to the wrong account. ALTA introduced a seller-impersonation endorsement in 2024 that covers some seller-side fraud, but buyer-side closing wire losses are usually excluded. If the title company or closing attorney was negligent in protecting their email systems, their professional liability (E&O) insurance may apply — but pursuing that requires a civil suit. The cleaner protection is for buyers to wire only after a verified phone callback to the title company's known number, and for everyone in the deal to carry cyber insurance.
Growing fast. The FBI's 2024 IC3 report shows BEC losses since 2015 have "skyrocketed by more than 1025%, totaling $17.1 billion over the last decade." The 2024 r/RealEstate community thread referencing a real-estate conference noted the problem is "up 25% in 2024." CertifID's consumer survey found that 1 in 10 Americans are now targeted for real-estate fraud and 1 in 20 suffer losses, with median loss exceeding $70,000. Increased adoption of AI-generated phishing emails, voice cloning of closing officers, and sophisticated email-thread injection (where the attacker reads months of correspondence before striking) is driving the growth.

📚 Source Threads (Reddit, 2024–2026)

The first-time-buyer near-miss

"Wire Fraud is No Joke" — r/FirstTimeHomeBuyer, 742 upvotes (as of Apr 2026). Closing-agent email compromise spotted in time because the buyer paused to call before wiring.

The $100K+ paralegal compromise

"wire fraud $100k+" — r/RealEstate, 692 upvotes. Real-estate attorney's paralegal email compromised; lookalike PDF with new banking details delivered at closing.

The $335K parents-loss case

"Boomer parents bamboozled - wire fraud at real estate closing" — r/fatFIRE, 544 upvotes. The canonical large-loss case. Top reply walks through the email-chain compromise mechanism.

The $400K Silicon Valley case

"Home buyer scammed out of $400,000 down payment" — r/RealEstate, 465 upvotes. CNBC-reported case. Top reply explains spoofed callback number variant.

The email-editing attack

"REALTOR WIRE FRAUD ALERT: They're editing our emails" — r/RealEstate, 267 upvotes. Real-time man-in-the-middle email modification — same address, same tone, edited details.

The vendor BEC case

"Business email was hacked, 200K lost" — r/Scams, 58 upvotes. Compromised business inbox; scammer deleted real invoices and spoofed copies with new payment-routing.

Related Reading

Real-estate wire fraud shares operational infrastructure with other BEC and impersonation attacks documented on tabiji. Internal: the Everywhere hub; AI Voice-Clone Scams (the cloned-CFO and cloned-closing-officer call is now a routine secondary attack alongside email compromise); Pig-Butchering (different victim profile, same email-thread-monitoring patience pattern). External authorities: the FBI IC3 2024 Annual Report; the FBI BEC PSA — "The $55 Billion Scam"; ALTA's State of Wire Fraud 2024; CertifID's 2024 State of Wire Fraud Report; the CFPB mortgage closing scam advisory.

📖 Coming Soon

A field-guide to the scams happening everywhere — phone, text, online, in person.

tabiji's tourist-scam atlases cover 17 countries. The next book is different — it covers the scams that don't care where you live: real-estate wire fraud, AI voice clones, pig-butchering, fake job offers, recovery scams, and dozens more. Same research method (FBI / FTC / OFAC sources cross-referenced with thousands of Reddit victim threads). Same $4.99 Kindle price.

  • 30+ scams documented across phone, text, online, and in-person channels
  • The script, the red flags, and the exit lines that end each conversation
  • Family-intervention scripts for elderly relatives in active scams
  • U.S. and international reporting paths (IC3, FTC, Action Fraud, CAFC, Scamwatch)