Synthetic Identity Fraud: The Ghost in the Machine
Jean-Vincent QUILICHINI
The Perfect Crime?
Imagine a criminal who doesn't steal your identity but creates a new one using parts of yours. Synthetic identity fraud involves combining real information (like a Social Security number) with fake details (name, address) to create a "Frankenstein" identity.
How It Works
- Creation: The fraudster pairs a stolen SSN (often from a child or deceased person) with a fake name.
- Cultivation: They apply for credit. The application is rejected, but it creates a credit file.
- Validation: They add the synthetic identity as an authorized user on a legitimate account (piggybacking) to build a credit score.
- Bust-Out: Once the credit limit is high, they max out cards and loans, then vanish.
Detection Challenges
Because the identity is partially real, traditional KYC (Know Your Customer) checks often fail. The "person" looks real on paper.
Fighting Back with Data
- Behavioral Biometrics: Analyzing how the user interacts with the form (typing speed, mouse movements).
- Email Risk Scoring: Synthetic identities often use new or disposable emails. Checking email reputation is a key defense.
- IP Geolocation: Does the applicant's IP address match their stated address? Our IP Scanner can verify location consistency.
Related Reading
Related articles
Apr 4, 2026SIM Swapping and Telecom Fraud: When Your Phone Number Is the Weakest FactorAttackers who control your mobile number can bypass SMS-based 2FA and reset passwords. Learn how SIM swap fraud works and how to reduce reliance on SMS one-time codes.
Feb 12, 2026IAM Best Practices: Securing Identity and AccessIdentity is the new perimeter. Discover specific best practices for Identity and Access Management (IAM) to prevent unauthorized access and privilege escalation.
Mar 29, 2026Identity Security in 2026: Passkeys, MFA, and Session HijackingPasswords are still everywhere, but phishing-resistant credentials and tight session controls are the real front line. Here is a practical identity roadmap.
Protect Your Infrastructure
Check any IP or domain against our threat intelligence database with 500M+ records.
Try the IP / Domain Checker