Sunday, May 24, 2026
Independent journalism on cooperative finance.
Vol. 1 · Issue 22·MAY 24 2026 EDITION·Support the work →
DOJ US · enforcement

DOJ Sentences Three in $2B Telemedicine Healthcare Fraud Scheme 2026

A telemedicine healthcare fraud scheme 2026 DOJ sentencing caps a five-year case; three members of a Moscow-based ring drew prison terms totaling 27-plus years.

By The Credit Union Wire ·

The telemedicine healthcare fraud scheme 2026 DOJ sentencing that concluded May 19 in Brooklyn federal court carries implications well beyond criminal justice. U.S. District Judge William F. Kuntz II sentenced Anthony Santamaria to 10 years in prison, the third member of a Moscow-based criminal organization to be sentenced this month in a conspiracy that submitted more than $1.97 billion in fraudulent prescriptions through a network of more than 75 pharmacies. Private insurers paid over $758 million on those submissions. For credit union compliance teams tracking healthcare-related payment flows through member accounts, the mechanics of the scheme illustrate exactly the kind of layered, remotely operated fraud that can generate suspicious transaction patterns in ordinary depository accounts. Separately, payment-infrastructure firms such as BILL Holdings, Inc. (NYSE: BILL) that process business disbursements sit adjacent to the pharmacy-billing corridors this network exploited.

How the $2 Billion Telemedicine Fraud Scheme Unfolded

According to court filings and proceedings cited in the U.S. Department of Justice Office of Public Affairs press release, the conspiracy ran from 2017 through 2022. Call centers, first in Utah and later in Russia, contacted beneficiaries enrolled with private health care benefit programs and offered medications at no cost without medical examinations. Whether or not beneficiaries agreed, the defendants generated fraudulent prescriptions in their names. Recruited physicians were told they were reviewing prescriptions following telemedicine visits; in most cases, those visits never occurred. The defendants used the physicians' names and National Provider Identifier numbers to execute the billing. Moscow-based teams of remote billers then inputted data and submitted electronic reimbursement requests through pharmacies the organization had acquired across the United States. Shell companies, straw owners, encrypted communications platforms, and aliases were used throughout to obscure the network's structure. Brian Sutton, identified as the organization's leader and a U.S. citizen, remains at large and is believed to be residing abroad. Three co-defendants, David Bishoff, Brycen Millett, and Joshua Alegria, are still awaiting sentencing.

Ghost Visits, Remote Billers, and SAR Obligations

For credit union fraud prevention teams, the architecture of this scheme maps directly onto transaction monitoring scenarios. Pharmacies controlled remotely by overseas operators collected reimbursements from private insurers and then moved funds through accounts that, at the depository level, can resemble ordinary small-business activity. FinCEN suspicious activity reporting requirements apply whenever a credit union knows, suspects, or has reason to suspect that a transaction involves funds derived from illegal activity. A remotely operated pharmacy with erratic reimbursement inflows, unusually low payroll relative to prescription volume, or repeated transfers to foreign accounts would, under standard Bank Secrecy Act thresholds, trigger a review obligation. The Department of Justice Healthcare Fraud Strike Force has consistently signaled in enforcement actions that pharmacy-side billing fraud generates ancillary money-movement that travels through federally insured depositories. Credit unions serving small independent pharmacy owners, healthcare staffing businesses, or telehealth billing companies should treat this case as a reference point for updating their member-business-account risk profiles. Community institutions with strong member relationships, like those profiled in the credit union member engagement work at Membersource Credit Union, are well-positioned to detect anomalies early precisely because account officers know their members.

What it means for credit unions monitoring healthcare payment risk

What it means for credit unions is that a $2 billion fraud ring does not require a large-bank counterparty to move money. The scheme used more than 75 pharmacies spread across New York, New Jersey, and elsewhere, many of them small enough to bank at community institutions. NCUA fraud risk guidance underscores that member business accounts in healthcare-adjacent sectors deserve enhanced due diligence, particularly where beneficial ownership is difficult to verify or where account activity diverges from stated business purpose. For credit unions in the under-$500 million asset range, dedicated fraud analysts may be shared across departments, which increases the importance of automated transaction monitoring rules calibrated to pharmacy reimbursement patterns. Medicare and Medicaid fraud enforcement has long focused on the billing side, but this case is a reminder that private-insurer fraud of comparable scale flows through the same depository infrastructure. Credit unions serving healthcare workers or operating in metro markets with large pharmacy footprints should review whether their BSA programs specifically address telemedicine-adjacent billing. Institutions that have recently sharpened their community focus, as explored in the member service and growth profile of Bay Shore Federal Credit Union, may find that deeper member knowledge provides a natural early-warning layer that supplements automated controls.

What we're watching

Sources cited