Friday, February 21, 2025
HomeTechMy Identity was Stolen! Here’s How You Might Become a Target

My Identity was Stolen! Here’s How You Might Become a Target

Published on

SIEM as a Service

Follow Us on Google News

Impersonating someone is an activity as old as mankind and has been performed to a great comedic effect by comedians and clowns throughout the ages. Unfortunately, identity theft is not a laughing matter, as it could potentially have devastating effects on a person’s life.           

Keeping your identity safe used to be much simpler than it is today. Cyber security watchdogs have reported that during the period of the COVID-19 pandemic the global losses experienced due to identity theft have doubled from those reported in 2019.

These are not large organizations either. Many people fall into the traps set by threat actors. In this article, we’ll share the seven most common forms of identity theft taking place today.

Online Account Takeovers

The first form of identity theft is called Online Account Takeover. With Account Takeovers, also referred to as Account Hijacking, a threat actor gains the credentials of a victim’s online account to a platformer service. The threat actor proceeds to modify the victim’s account in such a way that the victim no longer has access to their account. This typically means that the account recovery email address and password are modified. 

This provides the threat actor with multitudinous opportunities to exercise this new identity to exploit others. In the case of social media, this violated identity would still be seen by others as a person they know and trust.            

Visit this page for more information on how to prevent Account Hijacking.

Social media account cloning 

Have you ever received a friend request on a social media platform from a family member or friend who you know is already a friend? This might be a case of Social Media Account cloning. This happens when a threat actor creates a social media account identical to your own.  

By impersonating the victim, the threat actor can easily persuade friends and family members to divulge sensitive information online, enabling the threat actor to cause serious damage to the victim’s reputation and livelihood. 

Social Security Number Identity Theft

Wherever you are, having a citizen’s government identifier compromised is extremely bad news. In the US, it is not that different either. Social security scams have left many Americans in terrible circumstances. In a typical Social Security Number scam, a threat actor would create a website that looks exactly like a trusted institution.     

Through social engineering on the threat actor’s part or a lack of cyber discipline on the victim’s part, a threat actor coerces a victim to an online platform where PII (Personally identifiable information) is required to perform a task. Sometimes along the line of: “confirm your information, or your account will be locked”. 

The unsuspecting victim enters their PII with their Social Security Number, giving the threat actor exactly what they need to create a completely fraudulent persona. This persona would have all of the legal abilities of a US citizen, such as taking out loans, applying for credit cards, etc.   

Online Shopping Fraud

This kind of fraud normally relies on an online victim who is desperate to purchase an item at a greatly reduced price. Threat actors set up a fictitious online store where they are “selling” expensive items at a low price. The user then registers on the online shop, and just like that, a treat actor has their credentials.   

The key here is that many online users utilize the same usernames and passwords for all of their online accounts (a big mistake, as you understand by now), and this is what the threat actor is banking on. 

In Conclusion

Having good cyber disciple is one of the best ways to avoid becoming a victim of this senseless flavor of cybercrime. Protecting your privacy comes down to a few very effective measures you can put into place. 

Cyber discipline can be summarized as follows:      

  • Having strong passwords that are unique for every online site you have subscriptions for. 
  • Keep a watchful, ever-skeptical eye out for social engineering tactics.  
  • Install strong anti-malware software on your devices.
  • Avoid using public Wi-Fi connections unless you have a VPN through which your device can connect to the internet. 
  • Never use your business email address to register for personal and social media accounts.
  • Be very stingy with all of your PII. 
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Stay One Step Ahead: Essential Tips to Safeguard Your Tech at Home

In today’s digital age, technology is at the heart of our daily lives, from...

Developing AI/ML Solutions for Real-World Business Challenges

AI’s arrival in the tech world has disrupted many industries, setting a new status...

Practical Ways to Secure Your Business Network

Protecting your business network has never been more important. Cyberattacks are on the rise,...