PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Credential Phishing Attack Reels In Blue Cross

By Tom Nawrocki
October 1, 2024
in Fraud & Security, News
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Beware: Dark Web Phishing Tools Exploit Two Factor Authentication (2FA)

Beware: Dark Web Phishing Tools Exploit Two Factor Authentication (2FA)

A phishing attack targeting Blue Cross/Blue Shield of Minnesota proved highly successful—until the FBI finally caught the criminals four years later. In July 2020, the health insurer made approximately 18 wire transfers totaling nearly $8 million to a pair of Nigerian scammers. The case was recently brought to light when the two were indicted in the scheme.

Blue Cross was swindled into sending money to accounts falsely represented as belonging to Minneapolis-based Fairview Health Services, according to the Minneapolis Star-Tribune. Fairview is a nonprofit that operates community hospitals, clinics, and senior facilities. Two other unidentified health insurers from the Twin Cities also wired Fairview $2.8 million and $1.5 million, respectively.

The scam was a classic credential phishing scheme, where the criminals created email accounts that mimicked those of Fairview’s CEO, general counsel, and a business analyst. Using these spoofed accounts, they sent emails to Fairview employees, tricking them into accessing a malicious link to steal usernames and passwords. Additionally, they set up a fake internet domain designed to resemble Fairview’s legitimate site.

With this information, the criminals obtained access to Fairview’s Optum Pay account, which collects payments from health insurers. They were then able to change vendor account details, redirecting funds intended for Fairview into unauthorized bank accounts.

Blue Cross reports that it was able to recover most of the funds lost in the scam.

A Growing Concern

Phishing has reached epidemic levels. According to Cofense’s 2024 Annual State of Email Security report, the number of malicious emails bypassing secure email gateways in the prior year more than doubled. Additionally, more than 90% of data breaches detected in 2023 were linked to credential phishing.

Few details have been released on the specific nature of phishing emails. However, security professionals caution users to always take their time when responding to emails from high-level executives—especially if it’s unusual for them to be reaching out directly.

Employees are often the weakest link in cyberattacks. As phishing campaigns become more sophisticated, employees may no longer be able to tell the difference between legitimate and fake emails.

“Organizations must regularly train their employees on sophisticated phishing tactics like this,” said Jennifer Pitt, Senior Analyst n Fraud and security at Javelin Strategy & Research. “Employees should be suspicious of any email they get asking them to click a link and provide more information. For this reason, it is best that organizations do not include links asking for information in legitimate company emails to avoid confusing employees.

Employees should NEVER give out their password, not even to someone claiming to be the CEO. Additionally, organizations should implement a two-person process for changing bank account or vendor information or approving large transfers/transactions. As fraudsters often prey on an employees’ sense of urgency, mandating that another person look at the email and approve changes or transactions will allow for more time to logically process the email and question its legitimacy. If employees at any level ever have questions about the legitimacy of an email or are unsure if what is being asked is the proper thing to do, they should be encouraged to contact the email sender — using the contact information already on file, not the contact information in the email.”

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: Blue Cross/Blue ShieldCyber FraudDigital FraudNigeriaPhishing Attacks

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    agentic payment

    PhotonPay Completes its First Live Agentic Payment Together with Mastercard

    May 15, 2026
    banking

    Inside Banking’s $10 Billion Inflection Point

    May 14, 2026
    fraud disputes

    The Hidden Cost of Fraud Disputes Is Hitting Banks Hard

    May 13, 2026
    crypto payments

    Crypto Payments Are Ready for the Mainstream

    May 12, 2026
    payments, payment operations

    Staying Afloat as Payment Operations Rapidly Evolve

    May 11, 2026
    first-party fraud

    Inside the Growth of First-Party Fraud

    May 8, 2026
    fraud passkey, passkeys

    The Passkey You Can’t Steal: Why Hardware Beats Software for High-Stakes Authentication 

    May 7, 2026
    automotive collections

    Reducing Friction in Automotive Collections

    May 6, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2026 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result