Secure Messaging and Payment Instructions in the Art Market

Business email compromise (BEC) and payment diversion remain among the most frequent fraud vectors in high-value art transactions. Clear controls on how payment instructions are shared, validated, and logged reduce settlement risk and provide evidence that the gallery or auction house exercised due care. This article outlines channel choices, validation steps, and documentation practices suited to art-market workflows.

Threat model and references

  • BEC patterns: Attackers monitor or hijack email threads to substitute payee details or insert counterfeit invoices. The FBI’s IC3 alerts on BEC document escalating losses across industries, and art-market settlements - often involving cross-border wires - fit the same profile.
  • Regulatory expectations: AML and fraud controls require that firms know the payee and can evidence instruction provenance. Payment processors and banks may request proof that instructions were authenticated and delivered via controlled channels. Terminology used below (e.g., PEP, SAR) is defined in the Glossary.

Channel selection and configuration

  • Authenticated portals: Use logged-in channels with multi-factor authentication to deliver and acknowledge payment instructions. Avoid unauthenticated email for initial disclosure of bank details.
  • Out-of-band verification: For any change to payee details, require call-back verification to a known number on file, not one provided in the change request.
  • Restricted downloads: Provide instructions as on-screen views with expiring links rather than persistent attachments; watermark or time-limit access where possible.

Validation steps before funds move

  • Payee validation: Confirm the account name matches the verified counterparty or their documented agent. For new agents, ensure authority is evidenced and referenced to the customer profile.
  • Dual control: Require two staff approvals for initial instructions or any change, with logged timestamps and roles.
  • Change management: Treat any alteration to bank details as a high-risk event, triggering re-verification of identity and authority.

Logging and evidence for audits

  • Instruction provenance: Record when instructions were issued, by whom, and through which channel; capture customer acknowledgement timestamps.
  • Linkage to KYC: Associate payment instructions with the verified customer and beneficial owner; flag misalignment (e.g., third-party payers) for enhanced review.
  • Retention discipline: Keep instruction records and acknowledgements for the AML retention period and evidence deletion once the period lapses unless holds apply.

Operational safeguards

  • Template consistency: Standardize instruction templates with mandatory fields (account name, IBAN/SWIFT, bank name, reference) to reduce ambiguity and tampering opportunities.
  • Rate limiting and device checks: Apply rate limiting and device fingerprinting to secure messaging portals to deter brute-force or scripted access attempts.
  • Customer education: Provide a concise notice on how instructions will be delivered and what checks the customer should expect (e.g., no changes without call-back), reducing susceptibility to spoofed messages.
  • Segregated duties: Separate roles for issuing instructions and approving changes to reduce insider risk.

By combining authenticated channels, verification steps, and rigorous logging, Proofenance users can demonstrate that payment instructions were controlled end-to-end. This approach supports safe settlement for collectors and dealers while providing banks and supervisors with a clear trail of how instructions were issued, verified, and acknowledged.

Written By

Tobin Chew

Tobin Chew

I have been both building payment networks, and implementing them for clients, since 2019. I love seeing technology come together to form a functional product which solves a real problem.