Written by Louis DeNicola
Updated Sep 23 | 9 minute read
Finding out that a criminal is using your identity can be a traumatizing, costly and scary situation. However, some people are reluctant to share that they've been the victim of identity theft due to fear or embarrassment, and others may be unaware that their personal information has even been stolen.
For these reasons, finding precise statistics about identity theft is a challenge. According to the Federal Trade Commission's Consumer Sentinel Network Data Book 2024, there were 1.1 million identity theft reports in 2024, a 9.5% increase from the previous year. However, the Identity Theft Resource Center (ITRC) reported a 31% decrease in identity crimes in its 2025 Trends in Identity Report.
You can't always keep your personal information safe, but you can limit your risk, learn about warning signs and follow a recovery plan if needed.
Identity theft is when someone steals or uses your personal or private information, such as your name, date of birth, Social Security number (SSN), credit card information or health insurance account number.
Identity theft can have serious consequences, including:
People who steal personal information may use it themselves. But some identity thieves purchase previously stolen information to scam people and commit fraud.
Identity thieves can benefit or profit when they use your stolen information to:
Identity thieves can steal or purchase your information in various ways. Here are some of the most common sources and tactics.
Most people's personal information has already been leaked in one or more data breaches. One notable example is the Equifax data breach, which in 2017 exposed the personal information of about 147 million people, including their names, addresses, SSNs and dates of birth.
Criminals also often combine information from multiple data breaches into a new, single asset that they can distribute or sell. One of these, dubbed the Mother of all Breaches, contains more than 26 billion records from over 3,800 data breaches.
In addition to personal information, these types of data breaches may contain other sensitive information, such as usernames and passwords for online accounts.
Criminals can purchase stolen data from online marketplaces on the dark web and group chats on popular messaging apps and platforms. If they want to commit identity fraud, they might be able to get an identity theft kit with “fullz" (a full profile of a person's information, sometimes including their selfie and pictures of their driver's license) for less than $15.
Social engineering is a broad term for the manipulation that criminals often use to trick victims into sharing personal information or sending them money.
For example, an identity thief might pretend to be a representative from an online retailer or shipping company. They ask for your address and a small fee to “complete a delivery." In reality, they're stealing your name, address and credit card information.
Or you might receive an email warning that your account has been hacked and you need to reset your password. In reality, you're sent to a look-alike website that the identity thief created to collect login information.
Attacks involving social engineering sometimes have different names depending on the technique:
The names can also depend on the type of scheme or fraud, such as imposter scams, when the fraudster pretends to be someone else.
Malware, or malicious software, can infect your devices and allow other people to snoop on what you type, including your usernames and passwords. The person can then log in to your accounts and pretend to be you to scam your friends, family and connections. Or they might try to access your financial accounts and transfer money to themselves.
Mail theft has surged as criminals break into mailboxes or steal keys from USPS employees. They look for documents with personal information, like tax returns or medical records.
They also often look for checks to “wash" or “cook." This is when someone changes the check's amount and recipient before depositing it.
You won't necessarily be held responsible if someone steals and alters your check. But you could miss important bills, and getting the stolen funds back into your account quickly may be a challenge.
A card skimmer is a small device that's installed on top of or inside a card reader at a gas station, point-of-sale terminal or ATM. The device steals information from your credit or debit card, and a small camera nearby might record your PIN. Criminals can sell the stolen information or put it onto new cards that they then use to make purchases or withdraw cash. How To Recognize the Warning Signs of Identity Theft
There are several common warning signs that someone is using your personal information to commit identity theft.
Look for unexpected information or errors in your:
You can also check to see if your information was part of a data breach using free search tools on Have I Been Pwned and DataBreach.com.
Identity thieves may target children because they're unlikely to notice these warning signs on their own. You can look for similar signs that your child's identity was stolen and take some steps to keep their information secure.
Unfortunately, there's a good chance that some of your personal information has been leaked in a data breach. Even so, you can still take steps to help protect your other information and to keep an identity thief from using your information to commit fraud:
If you suspect or know that you're a victim of identity theft, your next steps may depend on the specific circumstances.
For example, if you know the person who is using your identity and exactly what's happened, you might want to start by calling your local police department to report the crime. However, if you suspect identity theft because you receive a welcome letter for a new credit card in the mail, you could start by calling the card issuer.
In general, some of the steps you may want to take include:
In late 2024, the FBI issued a warning about criminals using generative AI to commit financial fraud. The ITRC's 2025 trends report also highlights the use of AI by identity thieves as the top trend.
Identity thieves can use AI to:
Criminals can even create AI agents to run common scams nonstop or target people based on information from data breaches and public records.
If you're having trouble figuring out what to do, the ITRC offers free help from identity recovery experts via chat, phone call or text.
READ MORE: Keep Your Money Safe and Secure While Banking Online
Identity theft isn't going away; it's evolving. With criminals now leveraging AI to create more convincing scams and exploit data leaks at scale, the risks are higher than ever. While you can't eliminate the risk, you can lower your exposure by staying alert, protecting your personal data and acting quickly if something feels off.
READ MORE: How Identity Thieves Work: Protect Your Money
Louis DeNicola is a freelance writer who specializes in consumer credit, finances and fraud. He has several credit-related certifications and works with many lenders, publishers, credit bureaus, Fortune 500s and fintech startups. Outside of work, you can often find Louis at his local climbing gym or cooking up a storm in the kitchen.