Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

HHS’s Grant Payment System Lacked Effective Internal Controls To Prevent $7.8 Million in Fraud, and HHS Has Begun Taking Corrective Actions To Reduce Fraud Risk

Issued on  | Posted on  | Report number: A-18-24-03700

Why OIG Did This Audit

  • From March 2023 through January 2024, bad actors fraudulently diverted $7.8 million in grant funds from HHS’s Program Support Center (PSC) grant payment system.
  • Bad actors were able to gain access to the PSC grant payment system by masquerading as grant recipients and requesting account changes, including changes to grant recipients’ banking information.
  • This audit reviewed PSC’s internal controls, risk management, and cybersecurity controls over the PSC grant payment system to determine whether the system was properly protected.

March 2023  Bad actors divert $643,733  An affected grant recipient notifies key payment system staff or fraudulent activity.  Bad actors divert an additional $7 million over the course of 9 months  January 2024  A grant awarding agency notifies PSC leade

What OIG Found

  • At the time of the fraud, PSC did not have effective internal controls to communicate fraudulent activity to PSC leadership, grant awarding agencies, and grant recipients.
  • PSC’s approach to risk management was siloed and did not address the risk of bad actors gaining access to the payment system.
  • PSC did not implement some required cybersecurity controls, including mitigating weaknesses timely and conducting required IT system vulnerability scans, reviews, and approvals.

PSC has begun to take steps to mitigate the future risk of fraud.

What OIG Recommends

We made six recommendations to improve PSC’s controls over its grant payment system, including that it implement additional cybersecurity controls, finalize and implement bank account verification processes, and develop standard operating procedures.

PSC concurred with all six of our recommendations.

25-A-18-068.01 to OS - Open Unimplemented
Update expected on 12/02/2025
We recommend that the Program Support Center implement a control environment that includes fraud mitigation, in accordance with GAO's A Framework for Managing Fraud Risks in Federal Programs.

25-A-18-068.02 to OS - Open Unimplemented
Update expected on 12/02/2025
We recommend that the Program Support Center develop standard operating procedures (SOP) that: a. specify how risk and vulnerabilities to the Payment System will be regularly assessed and tested, b. include Payment System escalation and information dissemination protocols that should be followed when a fraud incident is identified, and c. specify verification processes for all bank accounts.

25-A-18-068.03 to OS - Open Unimplemented
Update expected on 12/02/2025
We recommend that the Program Support Center implement automated verification processes for bank account information changes.

25-A-18-068.04 to OS - Open Unimplemented
Update expected on 12/02/2025
We recommend that the Program Support Center finalize the bank account verification process with the Department of the Treasury for U.S. based bank accounts.

25-A-18-068.05 to OS - Open Unimplemented
Update expected on 12/02/2025
We recommend that the Program Support Center conduct information system level risk assessments that include integration of fraud risk in accordance with NIST guidance for all PSC financial management systems.

25-A-18-068.06 to OS - Open Unimplemented
Update expected on 12/02/2025
We recommend that the Program Support Center effectively implement controls for conducting required IT system vulnerability scans, reviews, and approvals; and performing timely mitigation of Payment System weaknesses.

View in Recommendation Tracker

-