25% off all training courses Offer ends May 8, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 8, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

HHS-OIG Audit Uncovers Fraud Control Failures Within HHS Grant Payment System

The Department of Health and Human Services Office of Inspector General (HHS-OIG) has recently published the findings of an audit of the HHS’s Program Support Center (PSC) grant payment system. The audit sought to establish whether effective internal controls, policies, and procedures had been implemented for preventing fraudulent transactions, and was conducted in response to $7.8 million in grant funds being fraudulently transferred to criminals’ bank accounts between March 2023 and January 2024. The fraudulent activity related to ten grants awarded to seven HHS recipients.

According to HHS-OIG, malicious actors used fake email addresses for grant recipients to compromise the PSC grant payment system. The bad actors deleted legitimate users, changed contact information, and requested that payments be sent to their own bank accounts. The bad actors were able to divert more than $10 million in grant funds to their own accounts, although the banks rejected some of those transfers, resulting in a net loss to the HHS of $7.8 million.

The HHS-OIG audit looked specifically at the PSC’s internal and cybersecurity controls and IT risk management for the payment system and associated business processes. The audit confirmed that effective controls had not been implemented for preventing fraud and communicating and acting on reports of fraudulent activity. There were also risk management failures and a failure to implement required cybersecurity controls, such as conducting timely vulnerability scans, reviews, and approvals, and mitigating weaknesses.

The payment system is one of the most widely used grant payment systems in the federal government. In 2023 alone, the system processed more than 499,000 transactions totaling more than $860 billion. The payment system is fully automated to receive payment requests, edit payments for accuracy and content, and transmit payments to the Federal Reserve Bank or the Department of the Treasury to deposit funds into the bank accounts of grant recipients.

HHS OIG Exclusions List
What You Need To Know

Get The 6 Essentials Checklist For Compliance Officers

A link to your download will be sent to your email address

Your Privacy Respected

HIPAA Journal Privacy Policy

Grant recipients are able to make changes to their bank account information from within the payment system, and staff at Payment Management Services approve, confirm, and review all requests, either by calling and sending email notifications to the grant recipient’s primary point of contact for verification of the legitimacy of the request.

One of the key errors identified by HHS-OIG was a lack of effective controls for communicating fraudulent activity to stakeholders in a timely manner. For instance, in March 2023, the first fraudulent transfer occurred, a diverted grant payment of $643,733. The correct recipient of the grant funds reported the fraudulent activity on March 28, 2023; however, effective actions were not taken to address the issue, resulting in a further $7 million being fraudulently transferred over the following nine months.

HHS-OIG said internal controls had not been designed and implemented for escalating and disseminating information on fraudulent activity within the payment system to PSC leadership, grant awarding agencies, and grant recipients. The Payment Management Services Director did not inform PSC leadership about the fraudulent transfer in March 2023, or further fraudulent transfers between August 2023 and December 2023, until January 2024.

The Payment System Information System Security Officer (ISSO) acted on the March 28, 2023, report and, on April 5, 2023, determined that the fraudulent activity was not a cyber event; therefore, it did not fall within the ISSO’s responsibilities. The Payment Management Services Director then reported the incident to HHS-OIG, but failed to report the incident to PSC leadership, which only learned about the fraudulent activity nine months later, and even then, the notification did not come from Payment Management Services; it came from the grant awarding agency.

When the grant awarding agency notified PSC leadership of the fraudulent activity, login controls were updated.  Then, one year after the first fraudulent transfer, the PSC used the payment system to send a system-generated email to grant awarding agencies and grant recipients informing them about an “identity harvesting campaign” against grant recipients.

The emails failed to refer to any specific incidents, did not ask the grant recipients to check their account information to make sure the correct bank account information was in the system, or instruct them to contact Payment Management Services if any incorrect information was identified. HHS-OIG said that including that information would have made the communications more effective.

HHS-OIG found that PSC’s approach to risk management was siloed and failed to address the risk of bad actors gaining access to the payment system. PSC’s actions since the detection of fraud have reduced fraud risk, but PSC has not done enough to reduce risk, as its actions were not based on a comprehensive fraud risk management process. HHS-OIG also found that PSC took action in response to fraud but should have been proactively implementing strategies for fraud prevention, and that there is considerable scope for improving oversight, risk management, and mitigating controls.

HHS-OIG made six recommendations for improving PSC’s control of the grant payment system. They include implementing a control environment in accordance with the GAO: A Framework for Managing Fraud Risks in Federal Programs; implementing automated verification processes for bank account changes; conducting information system level risk assessments in accordance with NIST guidance; effectively implementing controls for conducting required IT system vulnerability scans, reviews, and approvals; and performing timely mitigation of payment system weaknesses.

HHS-OIG also recommended implementing standard operating procedures that specify how risks and vulnerabilities to the payment system will be assessed and tested, for payment system escalation and information dissemination in the event of fraud detection, and verification processes for all bank accounts. PSC concurred with all the recommendations and is working on implementing those recommendations.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist