The number of identity theft victims rose by 8 percent to 16.7 million U.S. consumers in 2017, according to a new report.

Javelin Strategy & Research’s “2018 Identity Fraud Study” revealed that identity thieves preyed upon 1.3 million more victims in 2017 than they did the previous year by adapting to changing technologies and regulations. This flexibility enabled bad actors to steal a total of $16.8 billion from unsuspecting U.S. consumers.

Emerging Identity Theft Trends

The study, which was sponsored by Identity Guard, synthesized the responses of 5,000 U.S. adults who participated in a survey during the first half of November 2017. It found that the surge in identity fraud, which affected 6.64 percent of U.S. consumers last year, is largely attributed to two key trends.

First, the number of cases of account takeover tripled over the past year and reached a four-year high, with losses climbing to $5.1 billion. Victims spent an average of 15 hours and $290 to resolve the fraud cases affecting them.

Second, malefactors responded to the rise of EuroPay, MasterCard and Visa (EMV) chip card technologies by committing card-not-present (CNP) fraud. In fact, CNP fraud was 81 percent more prevalent in 2017 than point-of-sale fraud.

A ‘Runaway Year’ for Identity Fraud

Identity fraud is unlikely to slow down anytime soon. Al Pascual, senior vice president, research director, and head of fraud and security at Javelin, called 2017 “a runaway year for fraudsters” in a press release.

“Fraudsters are growing more sophisticated in response to industry’s efforts to implement better security,” he said, adding that consumers can take advantage of a variety of digital solutions to stay abreast of activity related to their accounts.

Customers should enable two-factor authentication (2FA) on all web accounts that offer it. They should also sign up for account activity alerts, consider placing a security freeze on their credit reports with each of the main credit bureaus, and secure devices by avoiding public Wi-Fi, using a virtual private network (VPN) and encrypting data.

Organizations also have a responsibility to combat identity fraud. Financial associations in particular need to prevent bad actors from creating new accounts with stolen identities. As new fraud patterns emerge and evolve, it’s critical for security leaders to follow basic best practices and adapt their systems to the shifting cybercriminal landscape.

Read more about biometrics, authentication and the future of identity

More from

The Evolution of Antivirus Software to Face Modern Threats

Over the years, endpoint security has evolved from primitive antivirus software to more sophisticated next-generation platforms employing advanced technology and better endpoint detection and response.  Because of the increased threat that modern cyberattacks pose, experts are exploring more elegant ways of keeping data safe from threats.Signature-Based Antivirus SoftwareSignature-based detection is the use of footprints to identify malware. All programs, applications, software and files have a digital footprint. Buried within their code, these digital footprints or signatures are unique to the respective…

How Do Threat Hunters Keep Organizations Safe?

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though his client used sophisticated tools, its threat-hunting technology did not detect the attack because the transactions looked normal. But with Wyler’s expertise, he was able to realize that data was leaving the environment as well as entering the system. His efforts saved the company from suffering even more damage and…

The White House on Quantum Encryption and IoT Labels

A recent White House Fact Sheet outlined the current and future U.S. cybersecurity priorities. While most of the topics covered were in line with expectations, others drew more attention. The emphasis on critical infrastructure protection is clearly a top national priority. However, the plan is to create a labeling system for IoT devices, identifying the ones with the highest cybersecurity standards. Few expected that news. The topic of quantum-resistant encryption reveals that such concerns may become a reality sooner than…

Contain Breaches and Gain Visibility With Microsegmentation

Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have especially manifested in more significant security threats to expanding IT attack surfaces. Breach containment is essential, and zero trust security principles can be applied to curtail attacks across IT environments, minimizing business disruption proactively. Microsegmentation has emerged as a viable solution through its continuous visualization of workload and device communications…