eCommerce Fraud Knowledge Guide

Synthetic Identity Theft

  1. Articles
  2. eCommerce Fraud
  3. Synthetic Identity Theft
  4. How to Identify Synthetic Identity Theft
Synthetic Identity Theft

Knowledge Guide Chapters

  1. What is Synthetic Identity Theft?
  2. Common Synthetic Identity Theft Tactics
  3. Synthetic Identity Theft Statistics
  4. Synthetic Identity Theft Examples
  5. How to Prevent Synthetic Identity Theft
  6. How to Identify Synthetic Identity Theft

How to Identify Synthetic Identity TheftSynthetic Identity Fraud Red Flags to Watch for

Craig McClure | August 4, 2025 | 2 min read
How to Identify Synthetic Identity Theft

How to Spot Synthetic Identity Theft Before It’s Too Late

There are more than a few tools and techniques merchants can use to uncover and block your typical fraudulent transaction. Synthetic identities, however, are an amalgam of real and fabricated data; standard rules-based verification procedures may fail to detect them prior to purchases.

That leaves the job to more sophisticated tools, like software that leverages AI and machine learning, for example. Or, manual reviews to weed out non-existent customers. A combination of both is ideal, where software flags suspicious buyers and your team follows up.

Synthetic Identity Fraud Red Flags

With or without specialized software, you need to be aware of some common warning signs that may signal synthetic identities:

Red Flag

New Accounts

New customers are great… as long as they’re actually customers and not fake identities. Pay attention to first-time buyers, especially any who are making large or unusual purchases in their first order.

Red Flag

Mismatched Specifics

A 45-year-old customer with a 5-year credit history seems unlikely, doesn’t it? Something fishy like that could point to a synthetic identity. A 20-year-old with a 10-year job history? Same thing. It’s not that these situations couldn’t exist, but it would smell a little iffy. Check to make sure the personal details make sense.

Red Flag

Limited Online Presence

Along the same lines, a synthetic identity’s alleged age often won’t match its digital footprint. On average, people in the US have six or seven social media accounts; nearly everyone has at least one. A limited or nonexistent online presence is worth checking. New accounts with few posts are also suspicious.

Defending yourself from any type of fraud requires experience and expertise.

We can help with that.

Request a Demo
The Original End-to-End Chargeback Management Platform
Red Flag

Several Accounts With Minor Variations

Once they’ve verified stolen information, fraudsters will milk it by opening multiple accounts with slight changes to some of the made-up details. Be leery of too many orders addressed to “almost” the same buyer, particularly if the orders are similar.

Red Flag

Shipping to Forwarding Agents

Fraudsters can’t have multiple orders from different cards shipping to the same physical address. It would raise too many eyebrows. Instead, they’ll frequently rely on freight forwarding services to hide their actual locations (which could even be outside the country).

Red Flag

Odd or Unusual Shopping Patterns

Customers — even synthetic ones — tend to establish patterns. For example, buyers who make consistent purchases of the same easy-to-resell merchandise may not be who they seem. Also be aware of transactions that deviate considerably from previous buying behavior.

Red Flag

Rapid Rise in Average Ticket Value

A sudden jump in the size and value of orders could be the tell-tale sign of an impending bust-out. This is where the fraudster maxes out all available credit resources, then ditches the persona. Beware if a customer suddenly makes an unexpected, atypical big-ticket purchase.

Red Flag

Using a Temporary Email Address

Pretty much anyone can obtain an anonymous, disposable email address, or create an account using a Voiceover Internet Protocol (VoIP) phone number. There’s little valid reason to use a temporary email address for an online purchase. So, if the buyer can’t be contacted directly, then watch out.

Important!

Overall, what you’re looking for is any personal information or account activity that seems odd or differs from established norms. It’s also important to make sure your staff is likewise trained to recognize red flags of synthetic identities, and be on the lookout as they go about their daily work.

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form