A fraudster who takes over the identity of another person often deals with the person over a longer period – research in social networks or uses Trojans or phishing emails to obtain comprehensive knowledge. Once he has gathered sufficient information about his victim, the actual fraud begins. The possibilities here are manifold and range from using existing customer accounts to opening new accounts in the victim’s name to applying for and using credit – which the victim then has to repay.
What happens when real identities are taken over by fraudsters?
Find out how you can protect your company and your customers from identity takeover:

Identity Takeover
Scroll to Top