Synthetic Identity TheftHow Can Merchants, Banks, & Consumers Detect & Combat It?

Zak Matthews
Zak Matthews | December 5, 2024 | 11 min read

What is synthetic identity theft

In a Nutshell

Synthetic identity theft is a sophisticated form of fraud that involves combining real and fake information to create new identities. Fraudsters use these synthetic identities to open fraudulent accounts, obtain credit, and make purchases. This type of identity theft is particularly challenging to detect because the information used is a combination of real and fabricated data. Businesses should implement robust identity verification measures and fraud detection systems to minimize the risk of synthetic identity theft and protect their customers' sensitive data.

Synthetic Identity Theft: What is Syn Fraud & How Can You Protect Yourself?

In the past few years, synthetic identity theft has become the most prominent form of identity fraud in the US. According to a recent report by FiVerity, estimated losses to synthetic fraud hovered around $20 billion in 2020, rising from around $6 billion annually just five years earlier.

You’re probably wondering: how does a $14 billion spike in losses affect your bottom line? We’re about to find out.

In this article, we’ll discuss what synthetic identity theft is and how it works. We’ll also explain why it matters and how both consumers and merchants can avoid it altogether.

What is Synthetic Identity Theft?

Synthetic Identity Fraud

[noun]/sin • THe • dik •ˌī • den •ˌtə •ˌdē •ˌfrôd/

Synthetic identity theft, also known as synthetic identity fraud, occurs when cybercriminals use compiled stolen data to create new identities (instead of stealing and using existing accounts). They can use these synthetic identities to carry out fraud attacks.

Synthetic identity theft is a subset of identity fraud. It happens when a scammer combines stolen personally identifiable information (PII) with fabricated data to create new fake identities. For example, a fraudster may concoct an artificial identity by pairing together real data like a stolen social security number together with a phony name, birthday, and mailing address.

The introduction of synthetic information makes this type of identity theft different from account takeover fraud or new account fraud. In these more traditional forms of third-party fraud, scammers hijack a person’s real identity to commit fraud, but do not inject fake information.

Regardless, synthetic and traditional identity thieves have much the same goals: both seek to co-opt a victim’s PII for their own financial gain. Synthetic fraudsters can use a real victim’s social security number to acquire credit, open up bank accounts, steal tax refunds or government benefits, or even frame their victim for crimes.

How Does Synthetic Identity Theft Work?

TL;DR

Fraudsters blend real and false information to generate new identities that are then used for opening accounts, securing loans, or perpetrating financial crimes. This can be done through identity manipulation, meaning the alteration of existing information to construct a false identity. Or, through identity compilation, which involves combining certain elements of real data with fictitious components to form a completely new persona.

All synthetic identities contain some real PII. Most often, scammers are after social security numbers, since they are unique and are tied to a single individual.

Scammers can get their hands on PII from data breaches, the dark web, social media, or public records, which are then combined with fabricated details to create synthetic identities. Fraudsters take out loans and apply for credit using their fake persona. They can then try to maximize their short-term gains and disappear quickly, or slowly build the fake person’s credit, then engage in bust-out fraud for a larger payout.

Broadly speaking, there are two sub-categories of synthetic identity theft. One involves the manipulation of existing records, while the other involves the fabrication of new records:

Identity Manipulation
Identity manipulation involves a single true identity. Here, fraudsters create new identities by altering key details in existing ones. For example, if a user’s real birthdate is May 15, 1980, scammers may use May 16, 1980 as a fake birthdate. Of the two forms of synthetic identity theft, identity manipulation is easier to detect, since elements of the altered identity may rhyme with the existing one.
Identity Compilation
Also known as “Frankenstein” fraud, this type of synthetic identity theft occurs when fraudsters cobble together sensitive information from multiple individuals to create a new false identity. In other words, the new identity as a whole is fictional, but each component of it is real.

A more recent (and difficult to detect) identity compilation tactic exists in the form of syn fraud. Here, the social security number is stolen from a real person, but other elements — like the new identity’s name, gender, date of birth, and so on — are entirely artificial.

Did You Know?

According to credit scoring firm FICO, it accounts for between 10% and 15% of banks’ unsecured bad debt.

Common Question What can scammers do with synthetic identities?

Scammers commonly use synthetic identities to open bank accounts and apply for loans and credit cards. But financial fraud is just the beginning. Fraudsters can also use synthetic identities to:

  • Commit healthcare fraud
  • Gain employment or residency
  • Engage in money laundering
  • Commit tax refund fraud
  • Rent apartments or lease property
  • Engage in romance scams or investment scams
  • Access government benefits, like unemployment, disability insurance, or food stamps
  • Frame identity theft victims for crimes

How Much of a Threat is Synthetic Fraud?

Synthetic fraud is a real and growing threat that affects both financial institutions and individuals. Reuters estimates that consumers and companies lose between $20 billion and $40 billion to synthetic identity fraud per year.

Worse, vulnerable populations are the most susceptible to synthetic fraud. KPMG and Carnegie Mellon University estimate that children’s social security numbers are 51 times more likely to be stolen by synthetic identity thieves. The elderly and homeless, populations who are less likely to monitor their credit profiles, are likewise more exposed to identity theft risks.

There are downstream consequences, too. Financial institutions and merchants, for example, must spend more on fraud detection and prevention tools and personnel than they would otherwise have to. Banks, credit unions, and other businesses that are unable to safeguard customer data may also suffer from reputational harm and lose the trust of their customers and the public.

Similarly, merchants who fail to comply with PCI-DSS regulations, a set of rules that govern how credit card information must be stored, processed, and transmitted, may face fines that can be as steep as $500,000 per incident.

Every day brings new fraud threats. Are you prepared to fight back? Click below and learn how much you could save with professional chargeback management.REQUEST A DEMO

How Can Merchants Detect & Prevent Synthetic Fraud?

Since synthetic identities are an amalgam of real and fabricated data, standard verification procedures that neglect to cross-check information using multiple databases often fail to detect this form of fraud. However, there are ways merchants and financial institutions can detect and prevent synthetic fraud.

Examples of commonly used synthetic fraud detection tactics include:

Cross-Referencing Account Holder Info

Cross-referencing data across multiple databases to identify inconsistencies or suspicious data elements. Artificial intelligence technology can be implemented to examine patterns and irregularities in data as well.

Flagging Suspicious Activity

Monitoring account activity for sudden changes or abnormal behavior. For example, reviewing customers’ credit profiles for aggressive credit-seeking behavior or credit limit increase requests.

Checking Social Media Profiles

Scammers are unlikely to establish social media profiles for synthetic identities. So, the absence of social media activity associated with a supposed user could be a red flag.

Liveness Detection

Using liveness detection tools to ensure that a real biometric source, like an iris, thumbprint, or human face, is being used to authenticate a profile. This is a still-developing, but promising technology.

“...the most noticeable difference between a synthetic ID and a real one is that real people tend to leave behind messier and more diverse data trails. For example, real people change addresses, phone numbers, and e-mail accounts every now and then; their social media feeds connect with family and other real people; they engage with public authorities through student loans, property records, traffic tickets, marriage licenses, motor vehicle records, and many other means. And as they age, the data trail of a real person tends to grow more consistent, so the same basic information shows up in different places. When compared with these broader data points, the information connected with synthetic identities tends to be either strangely inconsistent or way too consistent. That is, either the data doesn’t match up or it doesn’t change in the way it should if it were a real person with a real life history.”

- Thomson Reuters

On the other hand, merchants and financial institutions can take proactive steps to prevent synthetic identity fraud as well. Some best practices on this front include:

Training Staff

Merchants and financial institutions should educate staff on how to spot fraud risks. Know Your Customer (KYC) and anti-money laundering (AML) teams should be properly staffed with personnel who have sufficient expertise, and banks should conduct regular audits to identify procedural weaknesses and areas for improvement. All staff should be trained to refrain from publicly sharing PII and educated on how to store and dispose of sensitive information.

Monitoring Account Login & Transaction Activity

Merchants and financial institutions should regularly be on the lookout for suspicious logins, transactions, or account opening activity. Individuals, meanwhile, should regularly monitor their credit reports. At a minimum, consumers should opt into account opening or credit inquiry notifications. Freezing one’s credit profiles by default so that no inquiries can be made is arguably an even more robust data protection measure.

Using Multi-Factor Authentication

Merchants and financial institutions should use multi-factor authentication to verify an individual’s identity at login. Ideally, authentication app-based second factors should be used in favor of SMS-based second factors, which are plagued with security vulnerabilities.

Deploying Ongoing Fraud Detection Tools

Fraud risks are highest at account opening and similarly elevated when logins and purchases are attempted. Fraud risks, however, should be monitored constantly. Machine learning-based fraud detection tools like anomaly detection systems, transaction monitoring tools, and behavioral analytics can help merchants and banks monitor transaction, purchase, or credit application activity. Other tools, like geolocation services, can be deployed in tandem with other fraud detection tools to detect unusual login activities.

Strengthening Data Protection Practices

Given that fraudsters readily exploit data breaches for PII, merchants and financial institutions should work deliberately to prevent them. Businesses must ensure that sensitive customer data is encrypted and made available to a limited number of pre-screened staff. Access and retrieval activity must be monitored closely, and old data should be disposed of properly.

Synthetic Fraud: Just One Piece of the Puzzle.

If there is a bright side to any of this, it lies in the realization that criminal fraud—including synthetic fraud—accounts for a statistically small portion of credit card chargebacks. Most disputes are caused by either correctable human missteps or challengeable friendly fraud.

Chargebacks911® can help you eliminate revenue drains so you can concentrate on building stronger relationships with your honest, repeat customers. It’s the best possible solution: reduce fraud and increase profits.

Take a bite out of synthetic identity theft. Then take the next step to eliminate all chargeback sources. Let Chargebacks911 show you how.

FAQs

What are the warning signs of synthetic identity theft?

One telltale warning sign that you may have been a victim of synthetic identity theft is if you discover a loan or credit line you didn’t apply for listed on one or more of your credit reports. If you receive calls, texts, emails, or letters about bank accounts or credit cards you didn’t open, that’s also an alarming warning sign. For merchants and financial institutions, inconsistencies in data traits or a conspicuous lack of social media activity can be a warning sign of synthetic identity fraud.

What is a fabricated identity?

A fabricated identity combines real personally identifiable information (PII) from one or more identity theft victims with fake information, such as a name, date of birth, address, gender, ethnicity, or occupation. The result is a new, fake identity that scammers can use to commit financial, benefits, or tax refund fraud.

What are the red flags for synthetic identity theft?

A sudden change or drop in your credit score, the presence of loans or credit cards you don’t recognize, or letters or other correspondence regarding bank accounts you didn’t open are all red flags that suggest you may have fallen victim to synthetic identity theft.

How is identity theft detected?

Consumers can regularly monitor their credit reports for signs of identity theft. Meanwhile, merchants and financial institutions can cross check public and private databases, review credit reports, search for social media profiles, and perform liveness checks to detect possible identity theft.

How do you fight identity theft?

You can fight identity theft by filing a police report, submitting a report with the Federal Trade Commission (FTC) at www.identitytheft.gov, or by filing a complaint with the FBI's Internet Crime Complaint Center (IC3).

Zak Matthews

Author

Zak Matthews

Zak Matthews is the VP of Solutions Engineering and Partnerships at Chargebacks911. In his current position, Zak leads the design and implementation of technology solutions for our enterprise customers and technology partners. He brings many years of experience to the role, having worked with several fintech and software start-ups in the data analytics space. Zak graduated from the University of Wisconsin with a double major in Market Research & Supply Chain Operations Management with an emphasis in Quantitative Business Analytics.

Like What You're Reading? Join our newsletter and stay up to date on the latest in payments and eCommerce trends.
Newsletter Signup
We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form
Embed code has been copied to clipboard