The DOJ’s Cyber FCA Playbook Is Working as Enforcement Triples and Shows No Signs of Slowing

The DOJ’s Cyber FCA Playbook Is Working as Enforcement Triples and Shows No Signs of Slowing

ComplexDiscovery
ComplexDiscoveryApr 2, 2026

Key Takeaways

  • DOJ cyber FCA settlements tripled to $52M in FY2025.
  • Misrepresentations, not breaches, drive enforcement under False Claims Act.
  • CMMC 2.0 expands certification risk for all DoD contractors.
  • Whistleblowers filed over three times more cyber FCA cases.
  • Private equity sponsors now face FCA liability for cyber fraud.

Summary

The Department of Justice’s cyber fraud initiative has accelerated, with nine False Claims Act settlements in FY 2025 totaling more than $52 million—a three‑fold increase over the prior two years. Enforcement targets misrepresentations of cybersecurity compliance rather than actual data breaches, implicating contractors, grant recipients, and even private‑equity owners. High‑profile cases involving Health Net, Raytheon, Illumina and a subcontractor illustrate the expanding scope, while whistleblowers filed the majority of actions. The upcoming CMMC 2.0 rollout further raises the compliance bar, turning certification gaps into potential FCA liability.

Pulse Analysis

Since the launch of the Civil Cyber‑Fraud Initiative in late 2021, the Justice Department has turned cybersecurity compliance into a frontline fraud battleground. FY 2025 alone saw nine False Claims Act settlements that recovered more than $52 million, a volume that triples the pace of the previous two fiscal years. The agency’s strategy sidesteps the need to prove a breach; instead, it focuses on false certifications and misleading statements made to the government. This shift reflects a broader policy emphasis on protecting taxpayer dollars and national security information from deceptive practices.

The enforcement surge reverberates across the defense industrial base, health‑technology firms, and academic research entities. CMMC 2.0, which became effective in November 2025, now mandates verifiable security controls for every DoD contractor, turning self‑assessment scores into potential evidence of fraud. Private‑equity sponsors, illustrated by the $1.75 million Aero Turbine settlement, are being pulled into liability for inherited compliance gaps. Moreover, whistleblowers are driving the majority of cases, receiving 15‑30 percent of recoveries and prompting companies to strengthen internal reporting mechanisms.

For organizations, the practical response is clear: treat cybersecurity certifications as legal attestations, not marketing check‑boxes. Independent assessments, up‑to‑date system security plans, and rigorous data classification are essential to survive a DOJ subpoena. Legal teams should establish self‑disclosure protocols that can mitigate damages, while procurement officers must verify third‑party assessment results before award decisions. As the government expands its fraud‑enforcement infrastructure, firms that embed genuine cyber resilience into their operations will not only avoid costly FCA penalties but also gain a competitive edge in federal contracting.

The DOJ’s Cyber FCA Playbook Is Working as Enforcement Triples and Shows No Signs of Slowing

Comments

Want to join the conversation?