NEWYou tin present perceive to Fox News articles!
Identity fraud is rising successful the United States, but the timing does not ever enactment up with the breach down it. Consumers mislaid $27.3 cardinal to accepted individuality fraud successful 2025, according to Javelin Strategy & Research's 2026 Identity Fraud Study. That followed a crisp 19% leap successful 2024, erstwhile losses reached $27.2 billion.
FTC individuality theft reports besides climbed successful 2025. Reports done the archetypal 9 months of the twelvemonth had already topped the full-year full for 2024. The FTC received much than 1.1 cardinal individuality theft reports successful 2024, according to the agency's Consumer Sentinel data.
The occupation is that breach notices are becoming a regular portion of life, adjacent though the risks tin past agelong aft the announcement arrives. The Identity Theft Resource Center logged a grounds 3,322 U.S. information compromises successful 2025. In a abstracted user survey, the ITRC recovered that 80% of consumers received astatine slightest 1 breach announcement successful the erstwhile 12 months. Among those consumers, 88% experienced astatine slightest 1 antagonistic effect afterward, including relationship takeover attempts.
Sign up for my FREE CyberGuy Report
- Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
- For simple, real-world ways to spot scams aboriginal and enactment protected, sojourn CyberGuy.com – trusted by millions who ticker CyberGuy connected TV daily.
- Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK

Data from aged breaches tin resurface months oregon adjacent years later, giving criminals caller ways to people consumers. (Kurt "CyberGuy" Knutsson)
Why aged breach information tin crook into caller fraud
Stolen individuality records often instrumentality clip to crook into fraud. After a large breach, the information tin determination done transgression markets successful stages. It whitethorn beryllium sold to brokers, combined with accusation from earlier leaks and resold to fraud rings that physique much implicit individuality profiles.
That means a Social Security fig stolen successful 2024 whitethorn not beryllium utilized to unfastened a fraudulent recognition enactment oregon record a fake taxation instrumentality until 2026 oregon later. By then, the escaped recognition monitoring offered aft the breach whitethorn person expired. The breach itself whitethorn besides beryllium agelong gone from the headlines.
Major breaches that could substance aboriginal individuality fraud
UnitedHealth confirmed successful January 2025 that astir 190 cardinal radical were affected by the Change Healthcare breach. The incidental exposed idiosyncratic and wellness information, making it the largest known healthcare information breach successful U.S. history. Affected consumers were offered 2 years of escaped recognition monitoring and individuality theft protection. The enrollment deadline was Aug. 26, 2025.
National Public Data, a background-check broker, was tied to a monolithic breach successful 2024. Up to 2.9 cardinal records were reportedly exposed, though not each were unsocial oregon verified. The exposed accusation reportedly included Social Security numbers, addresses and relatives' information.
AT&T disclosed successful July 2024 that hackers stole telephone and substance records tied to astir 109 cardinal lawsuit accounts. The stolen information included details astir calls and texts, specified arsenic the numbers contacted and the timing of those communications, but not the contented of the calls oregon messages. The incidental progressive information stored connected a third-party unreality level and was portion of a wider Snowflake-linked run that besides affected different companies.
HOSPICE FRAUD USES STOLEN IDENTITIES FOR FAKE PATIENTS

Stolen idiosyncratic accusation tin beryllium combined with different leaked records to make much implicit individuality profiles. (Kury "CyberGuy" Knutsson)
What thieves bash with stolen individuality data
Stolen individuality information tin provender respective types of fraud. Some of these scams instrumentality months oregon years to amusement up connected a recognition report, taxation filing oregon security record.
Synthetic individuality fraud
Criminals harvester a existent Social Security fig with a fake sanction and day of birth. They usage that illustration to unfastened caller recognition lines, physique spot and drain the accounts later.
Tax refund fraud
Thieves usage stolen Social Security numbers to record fake taxation returns successful idiosyncratic else's name. Victims often find retired lone erstwhile their existent instrumentality gets rejected.
Medical individuality theft
Criminals usage stolen idiosyncratic oregon wellness security accusation to taxable security claims for attraction the unfortunate ne'er received. Some victims bash not announcement until they get a bill, deed an security bounds oregon spot a collections notice.
New-account fraud
Thieves unfastened recognition cards, car loans oregon inferior accounts utilizing stolen identities. Victims whitethorn observe it lone aft checking their recognition report.
Account takeover
Criminals usage stolen usernames and passwords to interruption into your existing email, shopping, banking oregon fiscal accounts. They often usage automated tools to trial that aforesaid login accusation crossed aggregate websites.
WHY A CREDIT FREEZE ISN’T THE END OF IDENTITY THEFT

Ongoing monitoring tin assistance drawback suspicious enactment aft escaped breach extortion ends. (Kury "CyberGuy" Knutsson)
Why one-time extortion isn’t enough
After a breach, you are often told to frost your credit, judge the escaped monitoring connection and ticker your statements. Each measurement tin help, but each 1 has limits. Free recognition monitoring offered aft a breach usually lasts 1 oregon 2 years. That tin expire astir the clip stolen information starts to amusement up successful caller fraud attempts.
A recognition frost tin artifact caller accounts from being opened successful your name. However, it volition not halt each benignant of fraud. It does not forestall idiosyncratic from filing a fake taxation instrumentality with your Social Security number. It besides does not halt fraudulent aesculapian bills oregon takeover attempts connected your existing accounts.
One-time acheronian web scans person limits, too. They amusement wherever your information appears astatine 1 constituent successful time. They don't archer you wherever it whitethorn amusement up next. Once a Social Security fig is successful transgression markets, it tin support circulating.
Steps to support yourself aft a breach
If your accusation was exposed successful a breach, these steps tin assistance you little your hazard and drawback suspicious enactment sooner.
1) Freeze your credit
A recognition frost tin assistance halt criminals from opening caller recognition cards, loans oregon different accounts successful your name. You request to spot a frost with each of the 3 large recognition bureaus: Equifax, Experian and TransUnion. You tin temporarily assistance the frost erstwhile you request to use for credit.
2) Change reused passwords
If you utilized the aforesaid password connected much than 1 account, alteration it close away. Criminals often trial stolen usernames and passwords crossed galore websites. A password manager tin assistance you make strong, unsocial passwords for each account.
3) Turn connected multifactor authentication
4) Watch your fiscal and aesculapian accounts
Review slope statements, recognition paper charges, security claims and mentation of benefits statements. Look for accounts, charges, claims oregon services you bash not recognize. Medical individuality theft tin beryllium casual to miss until a measure oregon collections announcement arrives.
5) Check your recognition reports
Review your recognition reports for caller accounts oregon hard inquiries you bash not recognize. You tin cheque your reports for escaped astatine AnnualCreditReport.com. If you spot thing suspicious, study it rapidly and travel the quality process with the recognition bureau.
What to bash aft escaped monitoring expires
Paid individuality theft extortion services show your idiosyncratic information connected an ongoing basis. The extremity is to shorten the clip betwixt erstwhile stolen information gets utilized and erstwhile you announcement thing is wrong.
Look for a work that monitors each 3 large recognition bureaus, scans the acheronian web and alerts you to suspicious changes tied to your identity. Some services besides show information broker sites, individuality verification activity, location rubric records and fiscal accounts.
Three-bureau recognition alerts tin assistance drawback new-account fraud. Dark web and information broker monitoring tin assistance spot repackaged records. Account-change alerts tin assistance emblem takeover attempts. No work tin undo the archetypal breach, but ongoing monitoring tin springiness you a amended accidental of catching suspicious enactment early.
See my tips and champion picks connected Best Identity Theft Protection astatine CyberGuy.com.
Kurt's cardinal takeaways
A breach announcement tin consciousness similar yesterday's occupation erstwhile the headlines slice and the escaped monitoring runs out. But stolen idiosyncratic information does not expire. Criminals tin clasp onto it, premix it with different leaked records and usage it agelong aft you person stopped reasoning astir the archetypal breach. That is wherefore individuality extortion needs to past longer than the breach notice. Freezing your credit, utilizing beardown passwords, turning connected multifactor authentication and watching your accounts each help. But individuality fraud is often a agelong game. The sooner you spot suspicious activity, the faster you tin enactment earlier the harm spreads.
Should companies person to supply individuality extortion for arsenic agelong arsenic stolen information tin beryllium utilized against you? Let america cognize by penning to america astatine Cyberguy.com.
Sign up for my FREE CyberGuy Report
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
- Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
- For simple, real-world ways to spot scams aboriginal and enactment protected, sojourn CyberGuy.com – trusted by millions who ticker CyberGuy connected TV daily.
- Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.










English (CA) ·
English (US) ·
Spanish (MX) ·