World News

Identity fraud losses hit $27.3 billion as data breach risks continue

NEWNow you can listen to Fox News articles!

Identity fraud is on the rise in the United States, but time doesn’t always keep pace with the violations behind it. Consumers will lose $27.3 billion to traditional identity fraud by 2025, according to Javelin Strategy & Research’s 2026 Identity Fraud Study. That followed a sharp 19% jump in 2024, when losses reached $27.2 billion.

FTC identity theft reports also increased in 2025. Reports for the first nine months of the year were already higher than the total for 2024. The FTC received more than 1.1 million identity theft reports by 2024, according to data from the Consumer Sentinel Agency.

The problem is that breach notifications are becoming a regular part of life, even though the risks can linger long after the notification arrives. The Identity Theft Resource Center has recorded 3,322 US data breaches by 2025. In a separate consumer survey, the ITRC found that 80% of consumers had received at least one breach notice in the past 12 months. Among those consumers, 88% experienced at least one negative outcome later, including account takeover attempts.

Sign up for my FREE CyberGuy report

  • Get my best tech tips, emergency security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by the millions who watch CyberGuy on TV every day.
  • Plus, you’ll get instant access to my Free Scam Survival Guide when you join.

5 THINGS ABOUT PHYSICS THAT PUT YOUR INFORMATION AT RISK

Data from old breaches can resurface months or even years later, giving criminals new ways to target consumers. (Kurt “CyberGuy” Knutsson)

Why old data breaches can turn into new fraud

Stolen identity records often take time to turn into fraud. After a major breach, data can move to criminal markets in stages. It can be sold to consumers, combined with information from previous leaks and resold to fraud rings that create complete identity profiles.

That means a stolen Social Security number in 2024 cannot be used to open a fraudulent line of credit or file a false tax return until 2026 or later. At that time, the free credit monitoring offered after the breach may expire. The breach itself may also be long overdue in the articles.

Major violations that may fuel future identity fraud

UnitedHealth has confirmed that by January 2025 there will be 190 million people affected by the disease Change health care violations. The incident exposed personal and health information, making it the largest known health data breach in US history. Affected consumers are being offered two years of free credit monitoring and identity theft protection. The registration deadline was August 26, 2025.

National Public Data, a background check vendor, is tied to a serious violation in 2024. It is reported that up to 2.9 billion records were exposed, although not all were unique or verified. The leaked information reportedly included Social Security numbers, addresses and contact details.

AT&T disclosed in July 2024 that hackers stole call and text records linked to the accounts of about 109 million customers. I stolen data include details of phone calls and texts, such as contact numbers and the time of those communications, but not the content of calls or text messages. The incident involved data stored in a third-party cloud and was part of a broader campaign linked to Snowflake that also affected other companies.

DIRECTION OF COMPLETE USE OF GUARANTEED PATIENTS

Illustration of a hacker typing on a keyboard with digital code in the background

The stolen personal information can be combined with other leaked records to create complete identity profiles. (Kury “CyberGuy” Knutsson)

What thieves do with stolen identity data

Stolen identity data can feed several types of fraud. Some of these scams take months or years to show up on a credit report, tax filing or insurance record.

Artificial identity fraud

Criminals combine a real Social Security number with a fake name and date of birth. They use that profile to open new lines of credit, build trust and close accounts later.

Tax refund fraud

Thieves use stolen Social Security numbers to file fraudulent taxes on behalf of another person. Victims often find out only when their original return is rejected.

Medical identity theft

Criminals use stolen personal or health insurance information to submit insurance claims in order to receive care that the victim never received. Some victims don’t notice until they get a bill, reach the insurance limit or see a collection notice.

New account fraud

Thieves open credit cards, car loans or utility accounts using stolen identities. Victims can only get it after checking their credit report.

Account takeover

Hackers use stolen usernames and passwords to break into your existing email, shopping, banking or financial accounts. They often use automated tools to check that login information across multiple websites.

WHY FREEZING DEBT IS THE END OF DEATH

A woman working on her laptop at a desk

Continuous monitoring can help catch suspicious activity after the end of free breach protection. (Kury “CyberGuy” Knutsson)

Why just one protection is not enough

After a breach, you are often told to freeze your credit, accept the offer of free monitoring and view your statements. Each step can help, but each has limitations. The free credit monitoring offered after a breach usually lasts for one or two years. That can expire when the stolen data starts showing up in new fraud attempts.

A credit freeze can prevent new accounts from being opened in your name. However, it will not prevent all types of fraud. It doesn’t stop someone from filing a fraudulent tax return with your Social Security number. It also does not prevent fraudulent medical bills or attempts to take money from your existing accounts.

One-time dark web scanners have limitations, too. They show where your data is coming from at once. They don’t tell you where it might appear next. Once a Social Security number is in the criminal market, it can continue to circulate.

Safeguards after a breach of the law

If your information has been exposed in a breach, these steps can help you reduce your risk and catch suspicious activity quickly.

1) Increase your credit

A credit freeze can help prevent criminals from opening new credit cards, loans or other accounts in your name. You need to set up limits with each of the three major credit bureaus: Equifax, Experian and TransUnion. You can temporarily top up the ice if you need to apply for credit.

2) Change reused passwords

If you’ve used the same password for more than one account, change it immediately. Hackers often check stolen usernames and passwords across multiple websites. A password manager can help you create strong, unique passwords for every account.

3) Turn on multifactor authentication

4) View your financial and medical accounts

Review bank statements, credit card charges, insurance claims and explanation of benefits statements. Check for accounts, charges, claims or services that you don’t recognize. Medical identity theft can be easy to miss until a bill or collections notice arrives.

5) Check your credit reports

Review your credit reports for new accounts or tough questions you don’t know about. You can check your reports for free at AnnualCreditReport.com. If you see something suspicious, report it immediately and follow the dispute process with the credit bureau.

All you have to do after the free monitoring expires

Paid identity theft protection services monitor your personal data continuously. The goal is to reduce the time between when stolen data is used and when you realize something is wrong.

Check out the service that monitors all three major credit bureaus, scans the dark web and alerts you to suspicious changes to your identity. Some services also monitor data merchant sites, identity verification activity, home title records and financial accounts.

Three-party credit alerts can help catch new account fraud. Dark web and data broker monitoring can help identify repackaged records. Account change alerts can help flag takeover attempts. No service can reverse an actual breach, but ongoing monitoring can give you a better chance of catching suspicious activity early.

See my tips and top picks for Best Identity Theft Protection at CyberGuy.com.

Kurt’s priority is taking

A breach notification can feel like yesterday’s problem when the headlines have faded and the free monitoring has ended. But stolen personal data does not expire. Criminals can hold on to it, mix it with other leaked records and use it long after you’ve stopped thinking about the original breach. This is why copyright protection must last longer than infringement notification. Setting up your credit, using strong passwords, turning on multi-factor authentication and viewing your accounts are all helpful. But identity fraud is often a long game. The sooner you notice suspicious activity, the sooner you can take action before the damage spreads.

Should companies provide you with privacy protection as long as stolen data can’t be used against you? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy report

CLICK HERE TO DOWNLOAD THE FOX NEWS PROGRAM

  • Get my best tech tips, emergency security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by the millions who watch CyberGuy on TV every day.
  • Plus, you’ll get instant access to my Free Scam Survival Guide when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button