AI-POWERED NEWS

30+ sources. Zero spin.

Cross-referenced, unbiased news. Both sides of every story.

← Back to headlines

A Single Phone Call Drained $751,430 from a Colgate-Palmolive Employee's 401(k) — Here's the Exact Attack Pattern

A Single Phone Call Drained $751,430 from a Colgate-Palmolive Employee's 401(k) — Here's the Exact Attack Pattern
Scammers have moved past credit cards and bank accounts. They're now targeting 401(k) plans — retirement savings most people barely check — using impersonation calls to plan recordkeepers. One victim lost $751,430 in a single transaction. The attack playbook is specific, repeatable, and your plan administrator may not be equipped to stop it.

The Heist Nobody Talks About

An impostor called Alight Solutions — the recordkeeper managing Colgate-Palmolive's employee 401(k) plan — and claimed to be a Colgate employee. The request was simple: update the contact information on the account. Routine stuff.

Months later, the entire $751,430 balance was wired in a single lump sum to a Las Vegas address and bank account, according to Fox News. The real account holder had no idea until the money was gone.

Why 401(k)s Are the New Target

Criminals follow the money, and retirement accounts are where the real money sits.

The average American doesn't log into their 401(k) weekly — or even monthly. That inattention gives fraudsters a massive window. A thief who redirects your contact information has weeks, sometimes months, before the real account holder notices anything is wrong.

Fox News has been tracking an escalating pattern of 401(k) account takeover fraud throughout 2025 and into 2026. The Colgate-Palmolive case is the sharpest example yet — but it's not an isolated incident.

IDShield, in coverage dated 2026, specifically flagged Americans over 50 as the primary target demographic. Larger balances. Less frequent account monitoring. More likely to respond to phone-based social engineering.

The Attack Pattern

Step one: The scammer already has your personal data. Name, employer, partial account info — purchased from data brokers or pulled from any one of dozens of corporate breaches over the last five years. That's why the Colgate impersonator sounded credible. She had real information.

Step two: Call the plan recordkeeper — not you. Recordkeepers like Alight Solutions handle millions of accounts. Their phone reps process contact-information updates constantly. There's no face-to-face verification. The bar to pass identity checks is often shockingly low.

Step three: Once contact information is redirected, the scammer owns the communication channel. Password reset emails and SMS verification codes go to them, not you.

Step four: Request a lump-sum distribution. Wire it out. Done.

What Mainstream Coverage Is Getting Wrong

Most financial media frames this as a "cybersecurity" problem — urging people to use stronger passwords and enable two-factor authentication on their own accounts. That advice misses the real vulnerability.

In the Colgate case, the breach didn't happen because the victim had a weak password. It happened because the recordkeeper's phone verification process failed. The victim did nothing wrong. Alight Solutions got socially engineered.

Principal Financial Group's chief information security officer Russ Ayres, in guidance published September 11, 2025, emphasized that users should "register online for account access" and use multi-factor authentication. The advice is sound — but it doesn't protect you if someone calls your recordkeeper and changes your phone number before you ever log in.

The critical question: What verification standard did Alight Solutions use before processing that contact-information change? That answer matters more than any password tip.

The Regulatory Gap

401(k) accounts don't have the same fraud protections as bank accounts.

If someone drains your checking account fraudulently, federal Regulation E gives you rights to dispute and recover losses. No equivalent federal regulation covers 401(k) account takeover fraud with the same clarity. Recovery depends on plan documents, recordkeeper policies, and litigation — none of which are fast or guaranteed.

The DOL has issued cybersecurity guidance for plan administrators, but it's guidance, not enforceable regulation. Plan sponsors and recordkeepers set their own verification bars. Some are rigorous. Many are not.

What You Can Actually Do Right Now

Log into your 401(k) account today. Register online if you haven't. This prevents a scammer from establishing account access before you do. A recordkeeper can't create a fake online profile if yours already exists.

Call your plan administrator and ask specifically: What verification is required before contact information can be changed on my account? If the answer is vague, escalate to your HR department and demand a written policy.

Set up multi-factor authentication using an authenticator app — not SMS. SIM swap attacks can redirect text messages to a criminal's phone in under an hour.

Put a freeze on your credit. It won't stop 401(k) fraud directly, but it limits what additional damage scammers can do with your stolen identity once they've cashed out.

Check your account on a fixed schedule. Monthly is the minimum. Quarterly is gambling.

The Bottom Line

You spent decades building that retirement account. The people responsible for protecting it — plan recordkeepers — are using phone verification processes that a determined criminal can defeat with a five-minute call and stolen data from a breach that happened years ago.

One Colgate-Palmolive employee lost $751,430 before she knew anything was wrong. Your recordkeeper's verification process is the real line of defense.

Sources

right Fox News Your 401(k) is the new identity theft target
right foxnews How to secure your 401(k) plan from identity fraud | Fox News
unknown idshield 401(k) Scams Targeting Americans Over 50 in 2026
unknown principal 10 tips to help protect your retirement accounts from getting hacked | Principal