
What To Do If You Become The Victim Of Identity Theft
I study fraud and cybercrime for a living. Then I became a case study.
I've spent years as part of the fraud-fighting community, publishing academic research, sharing insights almost daily on LinkedIn, and speaking at conferences around the country. While much of my work to educate and raise awareness has been embraced, not everyone is a fan. In 2022, after I publicly reported on the alarming rise of check fraud in the U.S. and spoke with several major media outlets, I became a target.
The first text message arrived around 7 a.m. I initially dismissed it. But the second message was far more explicit and wasn't just a vague threat—it was personal. My full Social Security number, home address, and a direct warning: ' got your addy, know where all y'all live. stop looking into the check fraud or your credit going low.
Screenshots of first (left) and second threatening text messages received on my personal cell David Maimon
Concerned for my safety, my university immediately assigned a campus police officer to accompany me wherever I went. While this measure helped deflect any potential physical threats, something more insidious was already in motion. The same criminal actor who threatened me via text had posted my full identity—name, SSN, DOB, address, even my credit report—to one of the underground fraud forums my team had been monitoring.
While this exposure was deeply unsettling, it also presented a rare and valuable opportunity: for the first time, I could observe, up close and in real time, how quickly leaked identity data gets exploited by fraudsters.
Most leaked personal data, whether stolen from breaches, checks, phishing attacks or malware, circulates through opaque and decentralized criminal networks. The data is often sold or shared in encrypted Telegram groups, invite-only forums, or dark web marketplaces with no clear timestamps. Because of this, researchers rarely know when an identity was first listed for sale or accessed by bad actors. On the other end, when that identity is eventually used to commit fraud—say, to open a bank account or apply for credit—it might not be detected for weeks or even months, if at all.
Even if you know when an identity was leaked, matching it to a fraud attempt is nearly impossible. Institutions (financial firms, credit bureaus, government agencies, and public databases) operate in silos. There is no centralized system to link the moment of exposure to the moment of exploitation. Without visibility into the dark web and cross-platform monitoring, it's nearly impossible to draw a clear, causal line between when an identity is posted for sale and when it's exploited.
To complicate matters further, linking a fraud attempt to a specific leak often requires access to sensitive internal records—such as KYC data or transaction logs—that are protected by privacy laws and corporate policies. The result is a murky, delayed, and ethically constrained landscape, where timelines are incomplete and attribution is uncertain.
Unless the identity in question happens to be your own. A Front-Row Seat to Fraud: The First 96 Hours
At exactly 9:56 a.m. on March 29, 2022 — minutes after receiving the second threatening message — my personal information was leaked to a Telegram fraud group: full name, address, SSN, date of birth, and even a PDF of my credit report.
I began searching online fraud markets to see if my information had been posted. I found it almost immediately. I alerted my identity theft protection provider, then sat and waited. Within a couple of days alerts started arriving. These alerts suggested that by March 30 — less than 24 hours after the leak of my identity — fraudsters had used my identity to attempt to open accounts at multiple financial institutions, as well as pull my credit report. Working with a victim specialist, we carefully reviewed the suspicious activity and flagged each questionable inquiry. In total, 10 alerts arrived within that first day.
I also requested my ChexSystems report to track any new bank accounts opened in my name (ChexSystems is a consumer reporting agency that tracks deposit accounts across U.S. financial institutions). When that report arrived, it showed six fraudulent accounts had been opened within four days of the leak.
Screenshot of my personal identifiers as appeared on the First Telegram Group Which Shared it. David Maimon
One account in particular stood out: as if to make a point, the fraudsters had gone so far as to mail a debit card linked to one of the fraudulent accounts directly to my home address. The card bore my name and came with a phone number I was supposed to call to activate it.
ChecXsystem report of bank accounts created using my stolen identity David Maimon
Debit Card received in my residence as a result of fraudsters using my identity to create a new bank ... More account David Maimon After the Storm: Analyzing the Long Tail of Identity Exploitation
After that first month, things went quiet. The alerts stopped, and I assumed the worst was behind me. I was wrong.
Just a few weeks ago, a letter arrived from the Lifeline Support Center in New York. For context, Lifeline is a federal program that provides monthly subsidies for phone or internet services to low-income individuals. According to the letter, someone had used my identity to apply for these benefits, and I was now being asked to upload supporting documents to complete the application.
I had never applied for Lifeline. This was a clear signal: my stolen identity was still actively being used, this time to exploit a government assistance program.
Realizing I'd grown complacent, I decided to dig deeper—this time using more sophisticated tools and data sources to see what was happening in the background. With access to internal databases from SentiLink , a major identity verification and fraud detection company I work with, I searched for any records of identity theft attempts tied to my name and Social Security number. What I found was eye-opening.
In total, there were 5 incidents in March 2022, three in April, two in May, then one in August 2023, and another in April 2024.
Zooming out, several patterns in the fraudsters' behavior began to emerge. First, most of the applications used freshly-created email addresses, likely spun up for the express purpose of the fraud, and cycled through different contact details. Across the board, there was a consistent rotation of emails, phone numbers, and physical addresses, likely designed to evade identity verification systems. Interestingly, while some fraudsters used burner phones or untraceable contact information, others left behind real, personally identifiable phone numbers — even as they were in the act of identity theft.
Second, the fraud attempts showed how broad and adaptive the strategy had become. My identity had been used to apply for everything from consumer loans and property leases to telecom services, federal benefits, and even a tax-related service.
Third, the volume of activity slowed over time. By mid-2022, the pace had noticeably dropped — perhaps due to increased monitoring, the flagging of my data in fraud databases, or simply the reuse value of the leaked information.
But in August 2023, a new and unusual application surfaced — one that included a traceable phone number. For the first time, I was able to link the fraud back to a specific individual. The applicant, who appears to live in New Jersey, has a lengthy criminal record, including charges for breaking and entering, assault, and battery.
Then, in April 2024, my identity was used yet again, this time in connection with a tax-related service. Specifically, an account was created under my name with a tax preparation service, followed by an attempt to fraudulently file my taxes. Unlike the earlier flurry of activity, this attempt was targeted and seasonal, aligned with tax season, and likely designed to take advantage of high-volume government processing windows.
One final and important note from my analysis: it does not appear that any organized fraud ring was behind the continued misuse of my identity. Instead, the pattern suggests individual actors — likely monitoring Telegram fraud channels — picked up my information and incorporated it into their own schemes. My data had become part of a wider fraud supply chain, passed from one bad actor to the next, each adapting it to their own criminal playbook.
Most Recent Use of My Stolen Identity with the LifeLine Support Center in NY David Maimon What This Means for You
My experience underscores a sobering reality: once your identity is exposed, you're not a one-time victim. You're probably a long-term asset in a criminal system where your personal data can be recycled, traded, and exploited for years. The fraud may come in waves, or return over time in stealthier, more targeted forms.
If this happens to you, here's what I learned the hard way: Move quickly. File police reports, freeze your credit, and start monitoring, not just the three main credit bureaus (Equifax, Experian and TransUnion) but also the ones like ChexSystems that track checking and savings accounts.
Stay Vigilant. Just because the alerts stop doesn't mean the fraud is over. It tends to linger, waiting for the next opportunity to surface.
Use the right tools. Visibility matters. Strong identity monitoring tools can help you spot issues before they escalate.
Track everything. I have the advantage of working in the fraud space, but anyone can watch for suspicious patterns — look at emails, phone numbers, account applications. Free tools and a little online sleuthing can go a long way.
The initial incident is rarely the end. It's usually just the opening move. In this harsh reality, the most powerful protection isn't just a freeze or a lock — it's awareness and proactivity. Once your information is out there, you're not just guarding against fraud — you're managing an active threat that learns how to adapt. Staying on top of how your identity is being used isn't paranoia, it's a necessity.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CBS News
9 minutes ago
- CBS News
Knife-wielding man police shot inside Walker dollar store charged with assault
A man whom police shot inside a northern Minnesota dollar store on Friday made repeated threats before rushing the officer who fired at him, charges say. A criminal complaint states 21-year-old Dillon Kloehn entered the Dollar General in Walker around 6:45 p.m., wearing only his boxers and carrying a knife. Police previously said Kloehn was "acting erratically." A witness described him as "acting intoxicated." Kloehn frightened an employee, then retreated to the back of the store when Walker police officer Kent Cleveland entered the building, according to the complaint. For several minutes, Kloehn "was in the store throwing things around, charging Officer Cleveland and throwing things at Officer Cleveland," the complaint states. He also allegedly threatened to stab or cut Cleveland multiple times. Cleveland backed up out of the store, at which point Kloehn said, "I will kill you right f***ing now," before charging the officer, charges allege. Cleveland then shot Kloehn once. Police said his injury was not life-threatening. Two witnesses, surveillance video and body camera footage helped investigators confirm the account of the incident, according to the complaint. Kloehn is charged with first-degree assault, first-degree attempted aggravated robbery, fleeing a peace officer by a means other than a motor vehicle and two counts of second-degree assault. Cleveland was placed on standard administrative leave. The Minnesota Bureau of Criminal Apprehension is investigating the shooting. If you or someone you know is in emotional distress, get help from the Suicide and Crisis Lifeline by calling or texting 988. Trained crisis counselors are available 24 hours a day to talk about anything. In addition, help is available from the National Alliance on Mental Illness, or NAMI. Call the NAMI Helpline at 800-950-6264 or text "HelpLine" to 62640. There are more than 600 local NAMI organizations and affiliates across the country, many of which offer free support and education programs.


CBS News
9 minutes ago
- CBS News
Workers return to U.S. Steel Clairton plant one day after explosions kill 2, injure at least 10
As the sun rose over the U.S. Steel Clairton plant on Tuesday morning, sadness hung in the air on this first day back to work since multiple explosions killed two people and injured at least 10. For many, it's business as usual on a rather unusual day. Some workers wanted to keep to themselves, while others wanted to talk about their friends and coworkers they had lost. It's the first day since the loss of 39-year-old Timothy Quinn and one more yet-to-be-identified employee. Steelworker Steven Bacho said he saw Quinn at work often. "(Quinn was the) nicest guy you'd ever want to meet. If there was somebody nobody got along with, he would get along with them," Bacho said. "He was in the same locker room as me so a lot," said Bacho. Bacho added that Quinn even mentored him, as he had 15 years' worth of work experience at the coke factory; Bacho only had seven. "(Quinn) was just that kind of guy. He'd do anything for you, show you anything you needed," said Bacho. He was needed at work in his position as a heater. Bacho explained that role in part and said, "They work on the batteries and keep the gases going, keep the ovens at the right temperature so the coke cooks." Outside of work, Quinn was deeply needed by his three children. For many, including Bacho, it's hard to find the words for this sudden loss. "It's a job, you know? You come here to provide for your family," Bacho said. Blue-collar workers also know the risks of this job. "Pay attention. Everybody wants to go home, that's all, with all their fingers and toes. Unfortunately, Tim is not," Bacho said, fighting back tears. However, it doesn't take away the hurt and the heartbreak of losing two co-workers. "It's heart-wrenching because you know the guys hurt, but it's something you do every day. Gotta keep going, for them, too," said Bacho.
Yahoo
26 minutes ago
- Yahoo
Letitia James has gone after everybody she can on her 'political hit list,' says attorney
Federal defense attorney Ronald Chapman II discusses a DOJ grand jury probe into New York Attorney General Letitia James on 'Fox Report.' Solve the daily Crossword