February 8, 2018 By David Bisson 2 min read

The number of identity theft victims rose by 8 percent to 16.7 million U.S. consumers in 2017, according to a new report.

Javelin Strategy & Research’s “2018 Identity Fraud Study” revealed that identity thieves preyed upon 1.3 million more victims in 2017 than they did the previous year by adapting to changing technologies and regulations. This flexibility enabled bad actors to steal a total of $16.8 billion from unsuspecting U.S. consumers.

Emerging Identity Theft Trends

The study, which was sponsored by Identity Guard, synthesized the responses of 5,000 U.S. adults who participated in a survey during the first half of November 2017. It found that the surge in identity fraud, which affected 6.64 percent of U.S. consumers last year, is largely attributed to two key trends.

First, the number of cases of account takeover tripled over the past year and reached a four-year high, with losses climbing to $5.1 billion. Victims spent an average of 15 hours and $290 to resolve the fraud cases affecting them.

Second, malefactors responded to the rise of EuroPay, MasterCard and Visa (EMV) chip card technologies by committing card-not-present (CNP) fraud. In fact, CNP fraud was 81 percent more prevalent in 2017 than point-of-sale fraud.

A ‘Runaway Year’ for Identity Fraud

Identity fraud is unlikely to slow down anytime soon. Al Pascual, senior vice president, research director, and head of fraud and security at Javelin, called 2017 “a runaway year for fraudsters” in a press release.

“Fraudsters are growing more sophisticated in response to industry’s efforts to implement better security,” he said, adding that consumers can take advantage of a variety of digital solutions to stay abreast of activity related to their accounts.

Customers should enable two-factor authentication (2FA) on all web accounts that offer it. They should also sign up for account activity alerts, consider placing a security freeze on their credit reports with each of the main credit bureaus, and secure devices by avoiding public Wi-Fi, using a virtual private network (VPN) and encrypting data.

Organizations also have a responsibility to combat identity fraud. Financial associations in particular need to prevent bad actors from creating new accounts with stolen identities. As new fraud patterns emerge and evolve, it’s critical for security leaders to follow basic best practices and adapt their systems to the shifting cybercriminal landscape.

Read more about biometrics, authentication and the future of identity

More from

CVE-2023-20078 technical analysis: Identifying and triggering a command injection vulnerability in Cisco IP phones

7 min read - CVE-2023-20078 catalogs an unauthenticated command injection vulnerability in the web-based management interface of Cisco 6800, 7800, and 8800 Series IP Phones with Multiplatform Firmware installed; however, limited technical analysis is publicly available. This article presents my findings while researching this vulnerability. In the end, the reader should be equipped with the information necessary to understand and trigger this vulnerability.Vulnerability detailsThe following Cisco Security Advisory (Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities - Cisco) details CVE-2023-20078 and…

X-Force data reveals top spam trends, campaigns and senior superlatives in 2023

10 min read - The 2024 IBM X-Force Threat Intelligence Index revealed attackers continued to pivot to evade detection to deliver their malware in 2023. The good news? Security improvements, such as Microsoft blocking macro execution by default starting in 2022 and OneNote embedded files with potentially dangerous extensions by mid-2023, have changed the threat landscape for the better. Improved endpoint detection also likely forced attackers to shift away from other techniques prominent in 2022, such as using disk image files (e.g. ISO) and…

The compelling need for cloud-native data protection

4 min read - Cloud environments were frequent targets for cyber attackers in 2023. Eighty-two percent of breaches that involved data stored in the cloud were in public, private or multi-cloud environments. Attackers gained the most access to multi-cloud environments, with 39% of breaches spanning multi-cloud environments because of the more complicated security issues. The cost of these cloud breaches totaled $4.75 million, higher than the average cost of $4.45 million for all data breaches.The reason for this high cost is not only the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today