Premium

Identity theft: How to protect yourself from impersonation

The Safe Side, our ongoing series aimed at helping you stay safe online, presents its 11th edition. A look at how identity theft scams work, how to recognise them, and, most importantly, what to do if you ever become a victim.

Identity theft is when cybercriminals steal personal information. (Express Image/FreePik)Identity theft is when cybercriminals steal personal information. (Express Image/FreePik)

It was only when recovery agents from a fintech company started chasing him that financial influencer Anupam Gupta realised someone had taken out a loan using his name and address. Gupta recalled—and regretted—ignoring a notification on his phone from CIBIL, informing him that a loan had been taken in his name.

In another case, a Mumbai-based homemaker found herself entangled in a legal battle with the Income Tax Appellate Tribunal (ITAT) after being accused of selling a property worth Rs 1.3 crore in 2010–11. Her PAN card details had been misused, and she was completely unaware of it.

These are just two examples of identity theft, a crime that is far from new. According to a 2015 Experian India report, identity theft accounted for 77 per cent of all fraud cases in the country in the first quarter of that year. Among various financial products, auto loans, mortgage loans, and credit cards were the most affected, constituting 85 per cent of detected identity theft-related fraud cases in Q1 2015.

By 2022, India had recorded the highest number of identity theft cases in the world, with an estimated 27.2 million victims. The United States ranked second with 13.5 million victims, while Japan came third with three million.

According to the UK-based Sumsub Identity Fraud Report 2023, India, along with Bangladesh and Pakistan, is among the top ten countries in the Asia-Pacific region most affected by identity fraud committed using deepfake technology.

What is identity theft?

Identity theft is when cybercriminals steal personal information—such as passwords, ID numbers, and financial details—from unassuming people and commit fraudulent activities posing as them. These stolen credentials can be misused for taking loans, making unauthorised online purchases, accessing sensitive medical and financial records, and committing crimes in the victim’s name.

“The history of identity theft dates back centuries, but the digital age has transformed cybercrime. From telephone deception to sophisticated synthetic identities, criminals are now almost untraceable. With deepfake technology and AI-driven scams, identity theft is becoming harder to detect,” said Sagar Vishnoi, co-founder of Future Shift Labs and an AI & cybersecurity expert.

Common types of identity theft

According to Vishnoi, identity theft scams take various forms:

Financial identity theft: Criminals steal bank details or credit card information to withdraw money, make purchases, or open accounts fraudulently.

Medical identity theft: Fraudsters use stolen personal information, like health insurance numbers, to obtain medical services or file fake claims.

Criminal identity theft: Scammers commit crimes using a victim’s identity, leading to wrongful arrests or legal troubles.

Synthetic identity theft: Criminals create fake identities using a combination of real and fabricated information. This can be tricky because the victim’s information might not be fully compromised, but the fraud is still happening under a ‘fake’ version of their identity.

Story continues below this ad

Child identity theft: Since children don’t use their identities for banking, fraud often remains undetected for years, until the child becomes an adult and tries to use their information for the first time, like applying for a bank account or student loan.

Online identity theft: Cybercriminals steal information from social media, emails, or websites to commit fraud.

Biometric, tax, and passport identity theft: Criminals steal unique physical traits (like fingerprints) used to verify identity. It can happen through hacks or malware. The problem is that once stolen, biometric data can’t be changed like passwords, making it a tough thing to recover from.

Tax identity theft is when someone uses personal info (PAN card details) to file a fake tax return and steal a refund. Passport identity theft happens when criminals steal or misuse passport details to pretend to be the victim, often for travel or illegal activity.

Phishing and imposter scams: Scammers trick people into sharing personal data through fake emails, calls, or messages, often impersonating banks or tech companies.

How do cybercriminals operate?

“Cybercriminals are using increasingly sophisticated tactics to steal personal data,” said Vishnoi. According to him, phishing remains one of the most common methods, where scammers send emails or messages that appear to be from legitimate sources, urging victims to share sensitive details like Aadhaar numbers or banking credentials.

Story continues below this ad

“Social media is also a major hotspot for identity theft. Cybercriminals frequently create fake profiles using stolen personal information and exploit these identities for financial fraud or blackmail,” he said.

Vishnoi also noted that in India, a common tactic involves fraudsters posing as bank employees, claiming an account needs Aadhar linking to avoid card blockage—tricking victims into revealing sensitive information. The dark web is increasingly used to steal personal data and fuel larger scams.

How can you spot identity theft scams?

Unexpected requests for personal info: If you get a call, email, or text asking for sensitive details like your bank info out of the blue, be cautious.

Suspicious links or attachments: If you see strange links or attachments in a message or an email, don’t click on them. They could be phishing attempts.

Story continues below this ad

Urgent or threatening messages: Scammers love to create panic, claiming your account will be locked or your card blocked unless you act fast. Double-check with the bank before responding.

Unusual activity on your accounts: If you spot unfamiliar charges or activity on your bank statements or credit reports, don’t ignore them. Report it right away.

Too-good-to-be-true offers: If someone offers you something that seems too good to be true (like a free vacation or big cash prize) but asks for personal details to claim it, it’s probably a scam.

Signs your identity may have been compromised:

  • Unauthorised transactions on bank accounts
  • Unfamiliar charges on credit cards
  • Receiving bills for services you didn’t use
  • Contacted by debt collectors for debts you don’t owe
  • Unexplained changes in your credit score
  • Notifications about accounts you didn’t open

Steps to take immediately:

Story continues below this ad
  • Contact your bank/financial institutions: Report potential fraud and freeze or close affected accounts.
  • Place a fraud alert with major credit bureaus (TransUnion CIBIL, Experian, Equifax, CRIF High Mark) to prevent further fraud.
  • File a First Information Report (FIR) with your local police for documentation and investigation.

Protecting yourself from identity theft: How to stay safe online

To safeguard your personal information, especially on social media, adjust privacy settings to restrict access and set profiles to private. Use strong, unique passwords for each account and consider a password manager for secure storage. Enable two-factor authentication (2FA) for added protection. Be cautious with friend requests and links from unknown sources, as they may be phishing attempts. Regularly monitor your bank statements and credit reports for suspicious activity. Limiting the personal details you share can also help reduce the risk of identity theft.

The Safe Side: As the world evolves, the digital landscape does too, bringing new opportunities—and new risks. Scammers are becoming more sophisticated, exploiting vulnerabilities to their advantage. In our special feature series, we delve into the latest cybercrime trends and provide practical tips to help you stay informed, secure, and vigilant online.

Ankita Deshkar is a Deputy Copy Editor and a dedicated fact-checker at The Indian Express. Based in Maharashtra, she specializes in bridging the gap between technical complexity and public understanding. With a deep focus on Cyber Law, Information Technology, and Public Safety, she leads "The Safe Side" series, where she deconstructs emerging digital threats and financial scams. Ankita is also a certified trainer for the Google News Initiative (GNI) India Training Network, specializing in online verification and the fight against misinformation. She is also an AI trainer with ADiRA (AI for Digital Readiness and Advancement) Professional Background & Expertise Role: Fact-checker & Deputy Copy Editor, The Indian Express Experience: Started working in 2016 Ankita brings a unique multidisciplinary background to her journalism, combining engineering logic with mass communication expertise. Her work often intersects regional governance, wildlife conservation, and digital rights, making her a leading voice on issues affecting Central India, particularly the Vidarbha region. Key focus areas include: Fact-Checking & Verification: As a GNI-certified trainer, she conducts workshops on debunking deepfakes, verifying viral claims, and using OSINT (Open Source Intelligence) tools. Cyber Law & IT: With postgraduate specialization in Cyber Law, she decodes the legalities of data privacy, digital fraud, and the evolving landscape of intellectual property rights. Public Safety & Health: Through her "The Safe Side" column, she provides actionable intelligence on avoiding "juice jacking," "e-SIM scams," and digital extortion. Regional Reporting: She provides on-ground coverage of high-stakes issues in Maharashtra, from Maoist surrenders in Gadchiroli to critical healthcare updates and wildlife-human conflict in Nagpur. Education & Credentials Ankita is currently pursuing her PhD in Mass Communication and Journalism, focusing on the non-verbal communication through Indian classical dance forms. Her academic foundation includes: MA in Mass Communication (RTM Nagpur University) Bachelors in Electrical Engineering (RTM Nagpur University) Post Graduate Diploma (PGTD) in Cyber Law and Information Technology Specialization in Intellectual Property Rights Recent Notable Coverage Ankita’s reportage is recognized for its investigative depth and emphasis on accountability: Cyber Security: "Lost money to a scam? Act within the 'golden hour' or risk losing it all" — A deep dive into the critical window for freezing fraudulent transactions. Public Health: "From deep coma to recovery: First fully recovered Coldrif patient discharged" — Investigating the aftermath of pharmaceutical toxins and the healthcare response. Governance & Conflict: "Gadchiroli now looks like any normal city: SP Neelotpal" — An analysis of the socio-political shift in Maoist-affected regions. Signature Beat Ankita is best known for her ability to translate "technical jargon into human stories." Whether she is explaining how AI tools like MahaCrimeOS assist the police or exposing the dire conditions of wildlife transit centres, her writing serves as a bridge between specialized knowledge and everyday safety. Contact & Follow X (Twitter): @ankita_deshkar Email: ankita.deshkar@indianexpress.com   ... Read More

 

Latest Comment
Post Comment
Read Comments
Advertisement
Loading Taboola...
Advertisement