Aetna has become aware of impostors who are calling people – often multiple times a day – and fraudulently claiming to be from Aetna. The calls may be from an automated service that repeatedly dials a number, or from a live person. Aetna is not placing these calls, or directing others to place them.
By falsely claiming to represent Aetna, one of our companies or any other reputable company, these scam artists want to trick you into
This form of fraud is called "phishing" and it is illegal.
Often, the people making these fake calls will talk about a new service that Aetna is providing. The service requires a health assessment. The person offers to send someone to your home to complete the assessment and send the results to your doctor.
The imposters have called cell phones as well as land lines. We cannot warn you about certain phone numbers to look for on caller ID. The phone numbers are always different. But they often have local area codes.
What to do with a suspicious call
If you have any suspicions about a call or caller –
Two suspicious telephone numbers that have come to our attention are 571-441-0062 and 970-999-7057. These numbers are not from Aetna or any vendor working for Aetna.
Spoofing Your Number
Aetna also has received reports that legitimate business owners have received calls from scam artists who say they represent Aetna. After that, the telephone number of that legitimate business starts cropping up on the caller IDs of other people who receive calls from these same scam artists. The technology to fake a caller ID is called "spoofing," and it is a way to disguise the source of the incoming call.
Aetna does not "spoof" the numbers of our customers or potential customers. If your number has been spoofed, report it to the local fraud unit of your telephone company and the Federal Trade Commission.
If You Think You've Been Scammed
If you believe you are a victim of a phishing scam, act quickly. Contact your bank or credit-card company immediately to report your suspicions. In many instances, you can ask them to impose password protection on your accounts. This prevents the unauthorized release of funds. If necessary, report any loss of funds to your bank, the police, and the Federal Trade Commission.
Legitimate Aetna Calls
Aetna complies with the law when making calls to our members and business associates. We may need more information about a claim, for example, or we may be reaching out as part of our care management programs. If you are suspicious of giving information to someone who says they are from Aetna, hang up and call the Member Services number on your ID card. Ask to have your call directed to the department that was asking for the information. That way, you can be sure you are giving the information to Aetna.
Microsoft recently announced the MS14-066 Schannel security flaw. Schannel is used by Windows client and server operating systems. Aetna has thoroughly assessed our systems. We do not believe that any of our systems or customer data has been compromised as a result.
We have patched all internal and external systems. We’ll continue to monitor our systems to protect our member, plan sponsor and provider data. We also have remediation plans in place, so we can quickly address any issues we find. Finally, we worked with all suppliers and vendors to assure that their systems are protected.
The recently announced “Heartbleed” vulnerability impacts a piece of software known as OpenSSL – a common software package used to assure the secure communication of data across the internet.
Like many organizations, Aetna has been working diligently to assess the impact of Heartbleed on our customers and information systems. To date we have determined that our core customer-serving and external facing systems are not impacted.
We have also instituted remediation plans to assure that we quickly address any vulnerable systems, should they be identified. We will take other precautions as necessary to protect customer data. In addition to assessing our own infrastructure, we are diligently evaluating third-party vendor appliances and applications that may be impacted. We will work closely with any impacted vendors to monitor remediation of the vulnerability.
We initiated these proactive steps following the announcement of this vulnerability on April 7.