Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 511

Identity Theft

What is Identity Theft?

Identity TheftThe misuse of another person's personal information to impersonate them, open accounts, obtain credit, claim benefits, or commit other fraud.


Identity theft is the unauthorised use of personal data such as names, government IDs, dates of birth, addresses, or financial details to impersonate a victim. Source data typically comes from breaches, info-stealers, phishing, mail theft, or public records aggregation. With enough data, criminals open credit lines, apply for tax refunds, file false insurance or unemployment claims, or commit synthetic-identity fraud by combining real and fabricated attributes. Victims often face years of remediation. Mitigations include strong MFA, credit freezes and monitoring, careful data minimisation, secure document disposal, and prompt reporting to banks, credit bureaus, and authorities when suspicious activity appears.

Examples

  1. 01

    Using a stolen Social Security number to open new credit cards.

  2. 02

    Synthetic identity fraud: combining a real SSN with a fabricated name to obtain loans.

Frequently asked questions

What is Identity Theft?

The misuse of another person's personal information to impersonate them, open accounts, obtain credit, claim benefits, or commit other fraud. It belongs to the Attacks & Threats category of cybersecurity.

What does Identity Theft mean?

The misuse of another person's personal information to impersonate them, open accounts, obtain credit, claim benefits, or commit other fraud.

How does Identity Theft work?

Identity theft is the unauthorised use of personal data such as names, government IDs, dates of birth, addresses, or financial details to impersonate a victim. Source data typically comes from breaches, info-stealers, phishing, mail theft, or public records aggregation. With enough data, criminals open credit lines, apply for tax refunds, file false insurance or unemployment claims, or commit synthetic-identity fraud by combining real and fabricated attributes. Victims often face years of remediation. Mitigations include strong MFA, credit freezes and monitoring, careful data minimisation, secure document disposal, and prompt reporting to banks, credit bureaus, and authorities when suspicious activity appears.

How do you defend against Identity Theft?

Defences for Identity Theft typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Identity Theft?

Common alternative names include: Identity fraud, ID theft.

Related terms

See also