Technology
Hospice fraud uses stolen identities for fake patients
NEWYou can now listen to Fox News articles!
Earlier this month, the California Attorney General’s office filed charges against 21 people tied to a $267 million Medi-Cal hospice fraud ring.
The case, dubbed Operation Skip Trace, accuses the defendants of buying stolen personal information on the dark web, enrolling those identities in Medi-Cal through Covered California, and running 14 shell hospice companies that billed the state for end-of-life care that was never provided.
The patients were not dying. In many cases, they did not even live in California. They were names and Social Security numbers pulled from data breaches and turned into billing line items.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
DOCTOR DENIES KNOWING ABOUT RAMPANT LA-AREA MEDICARE FRAUD USING HIS PROVIDER NUMBER
Scammers used stolen identities to create fake hospice patients and bill for care that never happened. (Kury “CyberGuy” Knutsson)
How hospice fraud scams actually work
Scammers pay people to put hospice companies in their names, even though they do not run them. This hides the real operators and gives the group a licensed business it can use to submit bills. Behind the scenes, others buy stolen personal information from dark web marketplaces. This includes names, dates of birth, Social Security numbers and addresses.
They then use that information to enroll people in Medi-Cal through Covered California and list them as terminally ill hospice patients. Next, the companies submit claims for visits, prescriptions and daily care tied to those names. They never provide any services. Because hospice care pays a flat daily rate, the billing continues as long as the identity stays active.
Why Los Angeles is the epicenter of hospice fraud
Operation Skip Trace is the latest in a string of hospice fraud cases that federal and state officials have been tracking for years. The typical hospice in Los Angeles County bills Medicare roughly $29,000 per patient, more than double the national average. Of the roughly 1,800 hospices operating in LA County, more than 700 have triggered multiple fraud red flags, according to state auditors.
On March 23, 2026, the U.S. House Committee on Oversight and Government Reform sent a letter to California Governor Gavin Newsom requesting documents on the state’s oversight of federally funded hospice programs. Committee members cited a “well-documented history of fraud,” including agencies enrolling beneficiaries without their knowledge and overbilling Medicare.
The Centers for Medicare & Medicaid Services estimates that Los Angeles County alone accounts for roughly $3.5 billion in hospice fraud. Newsom’s office said California has revoked more than 280 hospice licenses, maintained a moratorium on new providers and has hundreds more operators under investigation.
GOOGLE SEARCH LED TO A COSTLY SCAM CALL
Many victims had no idea their names were enrolled in Medi-Cal or tied to hospice claims. (Kury “CyberGuy” Knutsson)
What hospice fraud means for your identity and coverage
Most identity theft stories focus on credit cards, tax returns or new loans. Those usually show up on your credit report. Hospice fraud works differently. Scammers can use your information inside a Medicare or Medi-Cal billing system without triggering a credit alert or hard inquiry. That means it can go unnoticed.
Watch for warning signs like Medicare Summary Notices listing services you never received, Medi-Cal enrollment letters in your name or explanation-of-benefits statements from providers you have never visited.
If you apply for coverage later, you could face a denial because records show you are already enrolled in another state. If your data was exposed in a breach, it may already be circulating on the dark web.
How to spot hospice fraud and report identity theft
The Centers for Medicare & Medicaid Services recommends reviewing your Medicare Summary Notice each quarter through MyMedicare.gov. If you are enrolled in Medi-Cal, check your Covered California account for unexpected activity and report anything suspicious to the California Department of Health Care Services through its Stop Medi-Cal Fraud line.
Suspected Medicare fraud can be reported to 1-800-MEDICARE or directly to the HHS Office of Inspector General at oig.hhs.gov/fraud. The Senior Medicare Patrol offers free help reviewing statements and filing reports in every state. If you notice unfamiliar charges or enrollment activity, place a fraud alert with Equifax, Experian and TransUnion. Medical identity theft often overlaps with other types of fraud.
How identity theft monitoring helps catch hospice fraud
Hospice fraud schemes like Operation Skip Trace often begin long before billing ever happens. The personal data used is typically traded on dark web marketplaces after large data breaches. Services like Aura monitor these marketplaces and data broker listings for exposed personal information, including Social Security numbers, driver’s licenses, and email addresses. They also track public record changes, such as address updates that may signal fraudulent enrollment, and monitor credit files across Equifax, Experian, and TransUnion.
If suspicious activity is detected, users receive support from fraud resolution specialists who help contact agencies, prepare documentation, and dispute unauthorized accounts. Plans may also include identity theft insurance for eligible recovery costs.
No service can prevent every misuse of a stolen identity. But when fraud happens inside systems you rarely check, like Medicare or Medi-Cal, early alerts can make a critical difference.
This type of fraud often goes unnoticed because it does not appear on your credit report or trigger alerts. (Annette Riedl/picture alliance)
How credit monitoring helps detect identity theft early
Credit monitoring services track activity across the major credit bureaus and alert you when something changes. That gives you a chance to act quickly by freezing your credit, disputing unfamiliar accounts or contacting the lender.
Many services monitor your credit across Equifax, Experian and TransUnion and send alerts soon after activity is reported, so you are not waiting for a daily update to spot a problem.
Some tools also let you lock your credit file with a single tap, which can help stop new applications before they are approved.
Beyond credit reports, certain services monitor other personal data that may be exposed in breaches or sold online. That can include email addresses, phone numbers, driver’s license details and even medical IDs, all of which can be used in identity theft schemes.
While no service can prevent every type of fraud, having real-time alerts and broader monitoring can help you catch suspicious activity earlier and limit the damage.
See my tips and best picks on Best Identity Theft Protection at CyberGuy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
This case shows how identity theft is evolving. It is no longer just about draining bank accounts or opening credit cards. Scammers are now turning people into invisible patients inside systems most of us never check. That shift makes this fraud harder to detect and slower to stop. The best defense is to know where your information can appear and to check systems you would not normally review.
If someone could use your identity for months without you knowing, would you ever catch it before the damage is done? Let us know by writing to us at CyberGuy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Microsoft is retiring Teams’ Together Mode
Microsoft launched Teams’ Together Mode during the pandemic to give the illusion of a bunch of people sitting in a conference room together, even if they were really sitting at home without pants on. But times have changed, and it’s now being retired in favor of a more simplified Teams experience. The feature used AI to cut your head and shoulds out, and place you in a virtual space with others in the meeting. It could definitely feel gimmicky — especially when you’d tap co-workers on the shoulder, or give virtual high fives — but it did limit visual distractions.
The changes are being rolled out gradually, but as they are, the Together Mode toggle will disappear from the view menu. And Together-specific features, such as scenes and seat assignments, will go along with it. Part of the reasoning, according to Microsoft, is to reduce fragmentation across various platforms. But it also cites a streamlined interface with fewer options, less clicking, and less confusion. It also says this will allow the company to focus on improving video quality, stability, and performance.
Technology
Your 401(k) is the new identity theft target
NEWYou can now listen to Fox News articles!
An impostor phoned Alight Solutions, the recordkeeper for Colgate-Palmolive’s 401(k) plan, and identified herself as a Colgate employee. She asked to update the contact information on an account. Months later, the entire $751,430 balance had been sent in a single lump sum to a Las Vegas address and bank account. The real account holder, Paula Disberry, was living in South Africa.
Disberry sued Alight, Colgate’s benefits committee and BNY Mellon, the plan’s custodian, to recover the money. The case was later settled on undisclosed terms. The court never ruled on whether Alight had to restore the funds.
In February 2026, the Government Accountability Office told the U.S. Department of Labor to issue new guidance on retirement plan participant data. The GAO cited eleven separate lawsuits filed between 2009 and 2024 under the Employee Retirement Income Security Act, the federal law governing private retirement plans.
When account takeover hits a 401(k), the consumer protections that govern credit card fraud do not apply.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS
A stolen 401(k) shows how one phone call, exposed personal details and weak account-change safeguards can drain retirement savings. (Kurt “CyberGuy” Knutsson)
How the 401(k) account was drained
The Disberry case began when an impostor called Alight’s Benefits Information Center. She gave Disberry’s name, the last four digits of her Social Security number, her date of birth and the mailing address Alight had on file. That was enough to clear the call center’s security check.
She then asked Alight to update the contact information on Disberry’s account. Alight did not send an alert to Disberry’s existing email address or phone number, both of which it had on file. Instead, the company issued a temporary password through the mail.
Disberry’s plan had a 14-day waiting period between an address change and any distribution. Her lawsuit alleged that Alight skipped it. Within weeks, the impostor logged in, requested a full payout, and BNY Mellon mailed a check to a Las Vegas address.
Why the 401(k) account takeover isn’t an isolated case
Heide Bartnett, a former Abbott Laboratories employee, sued Alight over a $245,000 401(k) distribution. She alleged that a hacker used the plan portal’s “forgot password” feature to reset her credentials and trigger the payout. Other retirement plan recordkeepers have faced similar cybertheft lawsuits.
The problem extends beyond 401(k) accounts. The FBI’s April 2026 Internet Crime Report found that Americans 60 and older lost $7.7 billion to internet crime in 2025, a 59% jump from the year before. Investment fraud accounted for $3.5 billion of those losses, making retirement-age savers a major target for online criminals.
INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU
Retirement account takeovers can start with leaked names, birth dates, partial Social Security numbers and reused passwords from past data breaches. (Kurt “CyberGuy” Knutsson)
How thieves take over retirement accounts
Account takeovers begin with information someone already has. Names, dates of birth, partial SSNs and email addresses appear in dark web breach dumps, often combined with leaked passwords from unrelated services. When the account holder reuses a password across accounts, hackers can test that breach data directly against the recordkeeper’s login portal.
Disberry’s takeover bypassed the login portal entirely. The impostor never logged in to Disberry’s account directly. She called Alight’s call center, used what she already knew about Disberry to clear identity verification and had the contact information changed. After that, the temporary password Alight mailed went somewhere only the impostor could intercept.
Some thieves skip the recordkeeper and go straight for the account holder. The New York Times documented the case of Barry Heitin, a 76-year-old retired lawyer, who lost $740,000 in 2024 after receiving a call from someone claiming to be a federal fraud investigator. The caller convinced Heitin that his retirement accounts were under attack and walked him through transferring the money out himself. He believed he was helping a federal investigation.
How to protect your 401(k) and retirement savings
Federal protections for retirement account theft are limited, but several account-level controls cost nothing and may make takeovers harder.
- Turn on multi-factor authentication on the recordkeeper portal. A stolen password is far less useful when a one-time code is required.
- Enable every account-change alert. Email and text alerts for password resets, contact information updates, address changes and bank account changes are the earliest signals that someone else has access to your account.
- Ask your plan administrator about distribution holds. Some plans impose a waiting period between an address change and any distribution. Get the policy in writing and confirm what triggers the hold.
- Review statements quarterly. A new bank account or a change in contact information shows up faster on a quarterly review than on an annual one.
- Get an IRS Identity Protection PIN. The six-digit PIN, available at irs.gov/ippin, blocks fraudulent tax returns filed using your SSN.
- Freeze your credit at all three bureaus. A freeze blocks new accounts from being opened in your name. Equifax, Experian and TransUnion have offered free freezes since September 2018.
HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET
Multi-factor authentication, account-change alerts, credit freezes and regular statement reviews can help protect your 401(k) before thieves strike. (Kurt “CyberGuy” Knutsson)
Where identity theft monitoring can help
Account-change alerts on the recordkeeper portal only work if the recordkeeper sends them. The Disberry case showed what can happen when those alerts go unsent.
A strong identity theft monitoring service can add another layer of protection by watching for suspicious activity beyond the retirement plan portal. Some services let you link bank, credit card and investment accounts so you can receive alerts when unfamiliar transactions appear. In a retirement account takeover, that could help flag suspicious money movement even if the recordkeeper misses the outgoing transfer.
Many identity theft monitoring services also watch for changes across your credit reports, scan the dark web for exposed personal information and search data broker or people-search sites for your details. Some plans also include fraud resolution support and identity theft insurance for eligible recovery costs.
How to check if your personal information was exposed
If you are unsure whether criminals have already exposed your information, take action now. Start with a free identity breach scan to see whether your data appears in known leaks. Early detection gives you more control and helps you respond before fraud spreads. You can also check whether your personal information is already being used for identity theft, fraud or appearing on the dark web.
See my tips and best picks on Best Identity Theft Protection at CyberGuy.com
Kurt’s key takeaways
Retirement accounts can feel separate from the everyday fraud risks we hear about with credit cards, email accounts and bank logins. But this case shows how quickly a 401(k) can become a target when someone has enough personal information to fool a call center or reset account access. The scary part is that a stolen retirement account may not come with the same consumer protections people expect from credit card fraud. That makes prevention and early warning signs even more important. Turn on multi-factor authentication, enable every account alert your plan offers and ask your employer or plan administrator what happens after an address, phone number or bank account change. No one should have to find out months later that their life savings disappeared. The earlier you spot suspicious activity, the better your chances of stopping the damage before it becomes a financial nightmare.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Should retirement plans be required to send stronger alerts before any major account change or distribution, especially when someone’s life savings are on the line? Let us know by writing to us at CyberGuy.comCyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Revamped Siri will reportedly offer auto-deleting chats
Apple is hoping that its record on privacy can be the differentiator on the AI front, and maybe even buy it a little slack as it continues to lag behind the competition. According to Bloomberg’s Mark Gurman, the more chatbot-like Siri set to debut in iOS 27 will include the option to autodelete chat histories. Users will be able to save conversations for 30 days, one year, or forever. That’s in stark contrast to the other major players in the space that generally only offer temporary incognito chats, if that.
It appears Apple is betting that people are willing to give up some convenience in the name of greater privacy, as anxiety around AI continues to increase. While the company is replacing many of its under-the-hood components with Google’s Gemini tech, it seems to be trying to turn some of Apple Intelligence’s perceived weaknesses into a selling point. As Gurman notes:
Most leading AI chatbots today rely heavily on histories and memory systems to personalize responses and improve future interactions. But Apple will place tighter limits around how memory works, including restrictions on what information can persist and how long i can be retained.
-
Utah6 minutes agoUtah’s fragile desert could feel like the Sahara if America’s biggest data center gets built
-
Vermont12 minutes agoVT Pride events mix protest, joy as LGBTQ groups see threat in new laws
-
Virginia18 minutes agoVirginia Lottery Pick 3 Night, Pick 3 Day results for May 17, 2026
-
Washington24 minutes ago
Washington Lottery Cash Pop, Pick 3 results for May 17, 2026
-
Wisconsin30 minutes ago
Wisconsin Lottery Pick 3, Pick 4 results for May 17, 2026
-
West Virginia36 minutes agoWVDNR reminds public to leave young wildlife alone
-
Wyoming42 minutes agoHeavy Mountain Snow Expected Through Monday, Freezing And Snow For Cheyenne And Laramie
-
Crypto48 minutes agoRaoul Pal: The US-China AI Race 2026 Is a War No One Can Win