Quick Answer
Vendor fraud — fictitious suppliers, overbilling, duplicate payments, and shell company schemes — is the most financially damaging category of procurement fraud in Indian businesses. At Virtual Auditor, we deploy Benford’s Law analysis, duplicate invoice detection algorithms, vendor master data screening, and MCA/GST background verification to identify fraud patterns across accounts payable. Investigations are led by CA V. Viswanathan (FCA, ACS, CFE, IBBI/RV/03/2019/12333). Our forensic reports are structured for admissibility before NCLT, civil courts, and criminal proceedings under Section 420 of the Indian Penal Code and Section 447 of the Companies Act, 2013.
Definition — Vendor Fraud: Any scheme in which a supplier (vendor) — acting alone or in collusion with employees of the purchasing company — obtains payment through deception. This includes fictitious vendor schemes, overbilling, bid rigging, duplicate invoice submission, kickback arrangements, and shell company billing. Under the Companies Act, 2013, Section 447 defines fraud as any act of concealment or deception with intent to gain undue advantage — carrying imprisonment of six months to ten years and a fine.
Definition — Benford’s Law: A mathematical observation (also called the First-Digit Law) that in many naturally occurring datasets, the leading digit is distributed logarithmically — digit 1 appears as the first digit roughly 30.1% of the time, digit 2 about 17.6%, declining to digit 9 at 4.6%. Invoice datasets that deviate significantly from this expected distribution signal potential fabrication or manipulation.
Per the ACFE’s 2024 Report to the Nations, billing schemes (a subset of vendor fraud) account for 22% of all occupational fraud cases and cause a median loss of USD 100,000 per case. In Indian manufacturing, infrastructure, and government contracting sectors, procurement spend often represents 50-70% of total expenditure — making the accounts payable function the single largest fraud risk area.
The risk is compounded in India by several structural factors:
An employee (typically in procurement or accounts payable) creates a fake vendor in the vendor master. Invoices are generated for goods or services never delivered. Payments flow to a bank account controlled by the employee or an accomplice. The vendor entity may be a dormant company, a sole proprietorship with a rented GST number, or a shell company incorporated solely for this purpose.
Detection approach: Cross-reference vendor master against MCA records (via MCA21 portal), GST registration database, PAN verification, and physical address validation. Flag vendors where the registered address matches an employee’s residential address, where the bank account is in a different city from the registered office, or where the entity has no income tax filing history.
A real vendor charges prices above market rates, often splitting the excess with a colluding employee. Alternatively, invoices reflect higher quantities than actually delivered. This scheme is difficult to detect without independent price benchmarking and goods-receipt reconciliation.
Detection approach: Three-way match analysis (purchase order vs. goods receipt note vs. invoice). Price trend analysis across vendors supplying the same item category. Comparison against published commodity indices and market rates.
The same invoice is paid twice — either through deliberate resubmission or through manipulation of different payment channels (one via NEFT, another via cheque). Duplicate payments are common in organisations with poor invoice tracking and multiple payment approval workflows.
Detection approach: Algorithmic duplicate detection testing invoice number, amount, date, and vendor combinations. Fuzzy matching for near-duplicates where invoice numbers are slightly altered (e.g., INV-2025-001 vs. INV/2025/001).
Vendor selection is manipulated to favour a specific supplier in exchange for personal payments to the decision-maker. Bid rigging may involve sharing competitor bid information, tailoring specifications to exclude competitors, or splitting purchases to stay below approval thresholds.
Detection approach: Analysis of bid patterns — if the same vendor wins above a certain percentage of competitive bids, or if losing bids are consistently close to the winning bid. Purchase-splitting analysis to identify transactions deliberately structured below approval limits. Relationship mapping between employees and vendor owners.
The vendor delivers goods of lower specification than invoiced and retains the cost difference. Common in construction materials, raw materials, and IT hardware procurement. Often requires physical inspection to detect.
Detection approach: Analysis of rejection rates, warranty claims, and quality complaints by vendor. Comparison of specification sheets against actual delivery documentation.
Expert Insight — CA V. Viswanathan, CFE
Benford’s Law is the single most powerful initial screening tool in vendor fraud investigation. We apply it to the entire accounts payable dataset before any targeted testing. In our experience across 200+ forensic engagements, Benford’s anomalies correctly identified fraud in over 70% of cases where significant deviations were found. The test takes minutes to run on datasets of millions of transactions — it is the highest-ROI fraud detection technique available.
We extract all accounts payable transactions for the review period (typically 3-5 years) and perform the following tests:
First-Digit Test: Compare the frequency of the first digit (1-9) across all invoice amounts against the expected Benford’s distribution. A chi-square test or Z-test determines statistical significance of deviations. For example, if digit 5 appears as the leading digit in 15% of invoices (expected: 7.9%), this signals a concentration of fabricated invoices in the ₹5,000-₹5,999 or ₹50,000-₹59,999 ranges.
First-Two-Digit Test: More granular — tests the frequency of the first two digits (10-99). This narrows the anomaly to specific amount ranges. If invoices beginning with “48” appear far more frequently than expected, investigation focuses on that specific amount band.
Second-Digit Test: Tests only the second digit (0-9). Useful for detecting psychological pricing patterns — fraudsters often round amounts or use specific second digits habitually.
Summation Test (Mark Nigrini method): Instead of counting transactions, this sums the total rupee value beginning with each first digit. Expected: each first digit should sum to approximately 11.1% of the total. Spikes indicate that large-value transactions are concentrated in specific digit ranges.
Benford’s testing is unreliable for: datasets with assigned numbers (employee IDs, sequential invoice numbers), datasets with built-in minimums or maximums (per diem allowances capped at ₹2,500), and very small datasets (below 500 transactions). We always validate that the dataset is suitable before drawing conclusions.
Shell companies are the delivery mechanism for vendor fraud. Identifying them requires cross-referencing multiple government databases:
We run multi-parameter matching across the accounts payable ledger:
Genuine commercial invoices rarely result in perfectly round numbers because they include tax calculations, odd quantities, and varying unit prices. An unusually high proportion of round-number invoices (₹1,00,000, ₹50,000, ₹25,000) from a specific vendor signals fabrication.
Many organisations have tiered approval limits — for example, invoices below ₹50,000 require only one signature, while those above require two. Fraudsters structure invoices just below approval thresholds. We test for clustering of invoice amounts immediately below each approval limit.
Invoices dated on Sundays, public holidays, or company shutdown periods are anomalous. While not conclusive proof of fraud, they indicate potential backdating or fabrication.
Where vendor fraud involves government procurement or public sector companies, Section 7 (offence relating to public servant being bribed) and Section 8 (offence relating to bribing a public servant) apply. The Lokpal and Lokayuktas Act, 2013 may also be invoked for senior government officials.
At Virtual Auditor, we follow a structured four-phase investigation methodology:
Beyond detection, we recommend the following controls to our clients:
Expert Insight — CA V. Viswanathan, CFE
The most effective vendor fraud prevention is a combination of data analytics and cultural deterrence. When employees know that Benford’s Law testing is run quarterly and that vendor backgrounds are verified systematically, the deterrent effect is substantial. In our experience, companies that implement continuous monitoring see fraud incidence drop by over 60% within the first year. Prevention is always cheaper than investigation — but when fraud has already occurred, early detection through analytics limits the financial damage.
| Service | Scope | Starts From |
|---|---|---|
| Benford’s Law Screening | Full AP ledger analysis, anomaly report | ₹75,000 |
| Duplicate Payment Detection | Full AP ledger, multi-parameter matching | ₹50,000 |
| Shell Company Investigation | Per entity: MCA + GST + PAN + physical verification | ₹50,000 per entity |
| Comprehensive Vendor Forensic | Full analytics + targeted investigation + report | ₹2,00,000 |
| Expert Witness Testimony | NCLT / civil court / criminal court | Separate engagement |
For a custom quote, contact us at Virtual Auditor Pricing or call +91 99622 60333.
Summary
Vendor fraud detection requires a systematic combination of data analytics (Benford’s Law, duplicate detection, round-number analysis) and background verification (MCA, GST, PAN, physical inspection). At Virtual Auditor, forensic vendor investigations are led by CA V. Viswanathan (FCA, ACS, CFE, IBBI/RV/03/2019/12333) and produce reports admissible before NCLT, civil courts, and criminal courts. Legal remedies include FIR under IPC Section 420 and prosecution under Companies Act Section 447. Prevention through continuous monitoring and strong vendor onboarding controls is the most cost-effective strategy. Related reading: Employee Fraud in Indian SMEs: Detection & Prevention.
Vendor fraud involves a supplier — sometimes in collusion with company employees — overbilling, delivering substandard goods, submitting fictitious invoices, or operating as a shell entity. Per ACFE’s 2024 Report to the Nations, billing schemes account for 22% of occupational fraud cases globally. In Indian procurement-heavy sectors (manufacturing, infrastructure, government contracting), vendor fraud is among the top three fraud categories.
Benford’s Law predicts the expected frequency distribution of leading digits in naturally occurring numerical datasets. Invoice amounts, purchase orders, and expense claims should follow this distribution. When fraudsters fabricate or manipulate amounts, the distribution deviates — for example, an unusually high frequency of invoices beginning with 4 or 7 indicates potential manipulation. We apply first-digit, second-digit, and first-two-digit Benford’s tests across the entire accounts payable ledger.
Key red flags include: registered address is a residential premises or virtual office; no website or online presence; GST registration is recent relative to invoice dates; bank account opened shortly before first invoice; common directors or shareholders with the purchasing company; no employees listed in PF/ESI returns; no income tax return history; and the MCA filings show nominal paid-up capital with no real business activity.
Criminal: FIR under Section 420 IPC (cheating and dishonestly inducing delivery of property) and Section 468 IPC (forgery for purpose of cheating). If employees colluded: Section 409 IPC (criminal breach of trust by agent). Civil: Recovery suit under Order VII Rule 1 of CPC. For companies: Section 447 of the Companies Act, 2013 covers fraud with punishment of imprisonment from 6 months to 10 years and a fine not less than the amount involved.
Targeted vendor analysis (single vendor, data analytics + background check): from ₹75,000. Comprehensive accounts payable forensic (Benford’s analysis + duplicate testing + vendor background screening across full ledger): from ₹2,00,000. Shell company deep-dive with MCA/GST/IT verification: from ₹50,000 per entity. Contact Virtual Auditor at +91 99622 60333 or visit our contact page.
Yes. At Virtual Auditor, we perform remote forensic analytics on accounts payable data exported from Tally, SAP, Oracle, or any ERP. Benford’s Law testing, duplicate payment detection, round-number analysis, and vendor master anomaly screening are all data-driven. Physical verification is needed only for site visits to vendor premises during shell company confirmation.
Virtual Auditor — AI-Powered CA & IBBI Registered Valuer Firm
Valuer: V. VISWANATHAN, FCA, ACS, CFE, IBBI/RV/03/2019/12333
Chennai (HQ): G-131, Phase III, Spencer Plaza, Anna Salai, Chennai 600002
Bangalore: 7th Floor, Mahalakshmi Chambers, 29, MG Road, Bangalore 560001
Mumbai: Workafella, Goregaon West, Mumbai 400062
Phone: +91 99622 60333 | Email: support@virtualauditor.in
Book a Free Consultation