Know your adversary: exploring the 5 most widely employed tactics in identity theft crimes

Hacker
(Image credit: Pixabay)

To steal your identity, cybercriminals rely on catching you off guard. Even a momentary lapse of attention could result in you giving away the necessary information without realizing it.

Identity theft is a scam that thrives on taking advantage of people when they least expect it. Cybercriminals employ various tactics to steal your identity and access to your bank account. While the best identity theft protection can help, here are five of the most common identity theft techniques you should know.

1. Phishing

Phishing emails and text messages can trick you into revealing your personal information. Scammers create fake websites of banks, credit card companies, PayPal, and eBay by copying their logos and designs. They then send you an urgent and genuine-looking message asking you to fill in a form with your details. If you fall for it, you give away your data without realizing it.

To avoid phishing scams, be cautious of any message that asks for your personal information. Don't click on any links in emails or messages that claim to be from your bank, PayPal, or any other financial institution. Instead, open a new browser window and log in to your account to verify the details of the message. Be on the lookout for grammatical, spelling, and formatting issues, which are tell-tale signs of a phishing attempt.

Someone putting their card into an ATM.

(Image credit: Pixabay)

2. Skimming

Cybercriminals don't need to physically steal your credit card anymore. They use technology to clone its details. Once they get this information, they can use it to create a duplicate card or use it at the checkout of an online store.

But how is this possible? These days, criminals use lightweight machines that can fit in your palm to clone your card. They read the data from the black strip, which is then used to make a copy. This technique has even spread to ATMs and fuel station forecourts.

To prevent skimming, always keep your card in your hand and avoid handing it over to others. Whenever possible, use contactless payments. Finally, before using an ATM, make sure to check for false facias and skimmers.

3. Social media

Social media exposes you to cybercriminals as it leaks certain information about you. Facebook is a prime example of a platform where your hometown, family, job, and spending habits can be found.

Public profiles, posts, and tags leave you vulnerable to identity theft, as anyone can find out your personal information, including places you've been, your residence, your acquaintances, and your date of birth.

Facebook has recently taken measures to enhance user privacy, but, probably, you are not using these settings correctly. To check your privacy settings, review your last Facebook post. If there is a globe icon next to the date, it implies that your post is public.

To protect your social media accounts, secure your account settings, ensuring that all information, photos, and posts can be seen only by friends. Use the "Settings > Privacy" option for Facebook to make the necessary changes. Alternatively, you may consider reducing your friend list or deleting your account.

4. Shoulder surfing

Scammers can use traditional methods to steal your credit card details instead of relying on technology. One such method is "shoulder surfing," where they observe what PINs people enter into ATMs and stores. To do this, they need to get very close to the target or "mark." After all, they are looking over your shoulder!

The perpetrator must have keen eyesight to spot the digits used in your PIN. However, simply memorizing the PIN number is not enough for identity theft.

Understandably, shoulder surfing often leads to more advanced scams, such as skimming or even old-fashioned pickpocketing. Once criminals have both your card and PIN, they hold the advantage.

To prevent shoulder surfing, make sure you cover the keypad when entering your PIN at an ATM or cashier desk.

A skyline overlaid with numerous icons denoting the cloud, data, Wi-Fi, and other parts of daily digital life.

(Image credit: Shutterstock / metamorworks)

5. Unsecure networks

Despite the advancements in wireless security, unsecured networks still exist. For instance, if you are using an old router at home, it might not provide a secure WPA2 connection, and instead, you might be stuck with a vulnerable WEP connection. Similarly, your local coffee shop, library, shopping center, or even a football ground could be providing incorrectly configured Wi-Fi networks, thereby risking your online privacy. 

There are various risks associated with using unsecured Wi-Fi networks, such as unsecured routers with publicly accessible backdoors that allow your data to be intercepted and read. Additionally, scammers set up fake Wi-Fi networks to trick you into sending your data via their devices. 

To ensure your online privacy, it is essential to make networks secure. Upgrade your router to provide a secure connection if it's your network. If you're using a public Wi-Fi network, always use a VPN to protect your data from being intercepted.

Awareness is the key to combating identity theft 

It is possible that you have come across some of the methods used for identity theft. However, you might not have thought that you could be a victim of them. This is because you may believe that you do not have much money in your bank account. Unfortunately, the truth is that it is easier to steal from ordinary people than from celebrities, football players, or wealthy individuals. Therefore, it is essential to be aware of phishing, skimming, shoulder surfing, and the risks of using unsecured networks. Additionally, it is advisable to avoid sharing too much information on social media.

More from TechRadar Pro

Christian Cawley

Christian Cawley has extensive experience as a writer and editor in consumer electronics, IT and entertainment media. He has contributed to TechRadar since 2017 and has been published in Computer Weekly, Linux Format, ComputerActive, and other publications. Formerly the editor responsible for Linux, Security, Programming, and DIY at MakeUseOf.com, Christian previously worked as a desktop and software support specialist in the public and private sectors.

Read more
An illustration of a hooded hacker with an obscured face holding a large fingerprint against a red background.
ID theft – what happens when someone steals your identity
Hands typing on a keyboard surrounded by security icons
Outdated ID verification myths put businesses at risk
Cartoon illustration of multiple smartphones
Are you oversharing? These are the 10 pieces of information you don't want to give away – ranked
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
Paper craft illustration of a suspicious email that contains a snake
How to spot a phishing email
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Everything you need to know about phishing
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring