Back to Glossary

Identity Theft

Learn about identity theft - its impact, methods, and how to protect against this growing global fraud threat.

Identity Theft
Table of contents

Statistics show that 95% of businesses experience identity theft fraud every year. 

Banks and fintech companies are the most vulnerable to identity theft. Most of them report repeated incidents of fraud:

Number of identity fraud incidents during 2022

These statistics make identity theft a global difficulty that requires increased attention.

What is identity theft?

Identity theft is the unauthorized appropriation of someone else's personal information for illegal purposes.

This information may include:

  • Name
  • National insurance number
  • Financial information
  • ID and other legal documents

Typically, stolen data is used by fraudsters for financial gain. For example, to illegally access funds or open accounts using the victim's identity without their knowledge or permission.

Methods of identity theft

Fraudsters can use various methods of identity theft:

Phishing The use of emails, messages, or websites that force people to reveal their identity.
Skimming Placing readers on ATMs and terminals that automatically gather card information while cards are being used.
Data leaks Disclosure of confidential information as a result of a cyberattack, hacking, malware installation, or human error.
Social engineering Manipulating people to take possession of their personal data by impersonating a trusted source. For example, a bank or customer service representative.
Physical theft Illegally taking physical copies of documents containing personal data. This could be the theft of a passport, bank statements, or accounts, etc.
Data interception The use of public Wi-Fi networks to intercept data transmitted by users.

It is worth considering that cybercriminals are constantly inventing new methods of stealing other people's personal data. This makes fraud prevention more difficult. 

Common types of identity fraud

Once they have someone else's data at their disposal, criminals move on to using it – that is, identity fraud. 

Here are the most well-known types of identity fraud:

1. Account Takeover (ATO). This is a particular form of fraud in which criminals use stolen credentials to take over other people's online accounts. 

In the context of lending, ATO can be used to gain illegal access to bank accounts, for example, it can be done by taking over an online banking account.

2. Document fraud. This type of criminal activity involves the creation, alteration, or use of forged documents for criminal purposes.

Fraudsters may approach financial organizations with such documents to illegally obtain credit.

3. Creating a synthetic identity. This is a type of fraud that involves creating a non-existent identity using real and fictitious information. 

Based on such fictitious customers, fraudsters can apply for credit, open accounts, etc. 

According to TransUnion, in 2023, U.S. banks' losses from this category of fraud will reach $3.1 billion. This is a 12% increase over the 2022 figure. 

4. Bust-out fraud. This is a variant of financial fraud in which criminals open a credit account and make several on-time payments to maximize the credit limit.

After a large amount of money is deposited into the account, the fraudsters withdraw all the funds and disappear. In this case, the creditor suffers huge losses. 

Often, stolen documents or a synthetic identity are relied upon to make such loans.

5. Loan stacking. This category of fraud occurs when a borrower simultaneously applies for various loans from different lenders. The same stolen identities are often used. 

This leads to unmanageable debt and defaults.

Protect against identity theft

with digital footprint analysis

What is the best identity theft protection? 

Digital footprint analysis is an effective way to combat identity theft. It involves an in-depth examination of all the data that remains on the web as a result of user activity. 

Digital footprint analysis surpasses traditional credit scoring by providing access to data that is harder to manipulate.

It is useful to analyze potential borrowers for identity verification:

1. Email. The lender should pay attention to the presence of online accounts registered to an email address. Important is the age of the email, facts of data leakage, and the presence of the subscriber in blacklists.

2. Phone number. It is significant to make certain that the number is active. The applicant's use of disposable phone numbers, burner phones, and virtual SIM cards will be suspicious.

3. IP address. This confidential identifier contains information about the borrower's real location, variety of connections, and Internet service provider. 

The lender can also detect the fact of hiding the real IP address by using an anonymizer (e.g. VPN, proxy, or TOR). 

Identity theft is a serious problem that causes huge losses to financial organizations every year. Therefore, lenders are paying more and more attention to fraud detection

For this purpose, it is effective to analyze the digital footprint of potential borrowers. It comes with a wide range of data and is virtually impossible to fake.

Related articles

Financial Fraud Prevention Using Digital Footprint Analysis

Combating Fraud With Digital Footprint Analysis

How to Advance Credit Scoring With Phone Number Lookup

Impact of Face Match Technique on Credit Risk Management

Alternative Data Available Through Digital Footprint Analysis

Identity Verification - Tree Advanced Borrowers' Checks

The Role of AI in Modern Credit Risk Management

How to assess credit risk with reverse email lookup

How Phone Number Lookup Transforms Credit Scoring

Ready to chat?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Schedule time with me