In recent months, alerts from the Santa Rosa Police Department and reporting by The Press Democrat have pointed to a steady rise in fraud cases involving suspicious payment requests, altered invoices, and business-related scams. The language used is often broad—“fraud” or “scam”—but the pattern behind these incidents is much more specific and much more dangerous for local businesses.

What’s happening in Santa Rosa isn’t random. Businesses are being deliberately targeted through vendor impersonation schemes designed to redirect legitimate payments.

What’s Happing

The attack usually starts with a normal business relationship. A company receives an invoice from a vendor they already work with—nothing unusual. But the payment details have been changed.

In some cases, the email looks identical to previous communications. In others, the attacker inserts themselves into an existing thread, replying at just the right moment with updated banking information—something that often slips past standard cybersecurity for small businesses safeguards.

The result is simple:
A legitimate payment gets sent—to the wrong account.

By the time anyone notices, the money is gone.

What’s Actually Going On

This isn’t a generic scam blast. It’s targeted.

Attackers are studying Santa Rosa businesses ahead of time. They’re identifying:

  • Who works with which vendors
  • When payments are likely to be sent
  • How those invoices are typically delivered

This is often done using publicly available information—vendor websites, project announcements, even local business activity. No breach required.

From there, attackers use one of two methods:

1. Email Impersonation
They spoof or closely mimic a vendor’s email domain and send a “payment update.”

2. Account Takeover
They gain access to a real email account—either the vendor or the business—and send messages from inside the conversation.

That second scenario is what makes these attacks especially effective. There are no red flags. The request comes from a real account, referencing real work, at the exact right time.

This is a classic form of business email compromise, but at the local level, it’s often dismissed as simple fraud.

This Isn’t Isolated

According to the Federal Bureau of Investigation, business email compromise and invoice fraud consistently rank among the highest financial loss cybercrimes reported in the U.S.

The Federal Trade Commission also tracks a growing trend of payment redirection scams, especially those involving bank transfers and ACH payments.

What’s happening in Santa Rosa follows the exact same pattern—just localized and easier to overlook.

Why This Matters for Local Businesses

The financial impact is immediate. A single misdirected payment can mean tens or hundreds of thousands of dollars lost.

But the secondary effects are just as damaging:

  • Vendor relationships break down
  • Projects get delayed
  • Internal trust erodes
  • Accounting teams are forced into reactive damage control

And in many cases, businesses don’t realize what happened until it’s too late to recover the funds.

What Businesses Should Do

This isn’t about overhauling your entire security stack. It’s about tightening the specific points these attacks exploit.

Start here:

Verify payment changes verbally
Any request to change banking details should be confirmed using a known, trusted phone number—not the one in the email.

Slow down “urgent” requests
Attackers rely on timing and pressure. A rushed payment is a vulnerable payment.

Lock down email access
Most successful attacks involve compromised email accounts. Strengthening authentication (especially for finance and leadership roles) is critical.

Create a simple approval checkpoint
Even a basic second-level review for payment changes can stop these attacks cold.

Watch for subtle changes
Slight domain misspellings, tone shifts, or unexpected urgency are often the only clues.

Final Thoughts

Santa Rosa businesses aren’t being targeted because they’re weak. They’re being targeted because they’re predictable.

Payments follow patterns. Vendors follow schedules. And attackers are taking advantage of that consistency.

This is where cybersecurity stops being a technical issue and becomes an operational one.

Businesses that treat payment workflows as part of their security strategy—not just accounting—are far less likely to become victims of these attacks.

The reality is, most companies don’t realize there’s a gap in their process until a payment goes missing. By then, recovery is difficult and often incomplete.

If your business regularly sends vendor payments or processes invoices over email, this is the kind of risk worth reviewing proactively—before it turns into a financial loss.