Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Vectra AI Unveils Next-Gen Platform for Enterprise Security

February 2, 2026

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Synthetic Identities: A Financial Crisis in the Making
Cyber Updates

Synthetic Identities: A Financial Crisis in the Making

Staff WriterBy Staff WriterSeptember 19, 2025Updated:October 25, 2025No Comments6 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. Rising Synthetic Identity Fraud: Financial risk for U.S. lenders soared to $3.3 billion in 2024, with synthetic identities contributing to around 1% of transactions, especially in the automotive sector.

  2. Arms Race Against Cybercriminals: Credit agencies are engaged in a constant battle to leverage better data to outsmart increasingly sophisticated fraud schemes that utilize detailed personal information from breaches.

  3. Evolving Tactics of Fraudsters: Criminals are now "nurturing" synthetic identities to build favorable credit histories, allowing them to access larger amounts of credit over time.

  4. Need for Advanced Detection: Identifying fraudulent profiles remains challenging; ongoing monitoring, adaptive risk models, and innovative data strategies are vital for thwarting these evolving threats.

[gptAs a technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘Synthetic Identities Plague Finance & Lending Sector’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

Financial firms, especially those that service loans in the automotive industry, are facing increasing fraud based on synthetic identities, researchers are warning. Cybercriminals are increasingly constructing better profiles using their access to detailed data culled from numerous breaches.

The total financial risk for financial lenders in the United States rose to $3.3 billion in 2024, up from $1.9 billion in 2020, driven by a concentration of fraud leveled against lenders in the automotive sector, according to an analysis published by credit bureau TransUnion this week. Overall, synthetic identities are being used for upto 1% of transactions, depending on the type of financial product — credit cards or auto loans, for example, the company said.

Credit agencies serving lenders are in a race to make use of the best data to foil fraudsters’ schemes, says Brad Daughdrill, TransUnion’s vice president of data science and head of global fraud analytics.

“It is an arms race,” he says. “Better data and more data are not bad things, but — on the surface — it’s not going to be entirely sufficient. It’s how you use that data, both from an information service provider as well as ultimately the lenders in any of the industries, that allows you to stay ahead of them.”

Related:Chinese Hackers Allegedly Pose as US Lawmaker

The financial industry is the most-targeted for synthetic identity fraud, with cryptocurrency fraud accounting for nearly 10% of it, the lending industry taking the No. 2 spot at about 5%, followed by traditional banks, also near 5%, according to cybersecurity firm Entrust’s “2025 Identity Fraud Report.” More broadly though, synthetic identities are a growing threat for every industry sector. Software makers and the technology industry have had to contend with North Korean operatives posing as international IT workers, for instance, and deepfakes and synthetic identities often form the foundation of the schemes.

 

line chart showing rising synthetic identity fraud

The estimate impact of synthetic identity fraud on lenders has grown since the pandemic to $3.3 billion. Source: TransUnion

And fraudsters are not just stealing and creating individual identities, but also taking on the identities of businesses, says Jackie Wylie, spokeswoman for Middesk, a business identity platform.

“As more banking, payments, and credit processes move online, fraudsters have shifted towards more sophisticated, longer-play schemes,” she says. “Synthetic business identity fraud often means combining real or fabricated business details to form a business entity that doesn’t exist or is controlled by fraudsters … [or] ‘piggybacking’ on real but dormant companies.”

Cybercriminals Turn to the Long Con

Fraudsters are also gaining experience in how to extract the most value from the synthetic identities. Now, a common tactic involves fraudsters “nurturing” their synthetic accounts by making legitimate payments for a period of time to build a positive credit history, says TransUnion’s Daughdrill.

Related:SentinelOne Announces Plans to Acquire Observo AI

When institutions extend credit to customers with a credit history light on details, they are going to start small, he says.

“They might get access to $500 or something like that, and then the fraudsters have a decision make: ‘Do I want to weaponize on $500 or do I want to make minimum payments, get my credit score up and maybe get access over a period of time to tens of thousands of dollars?'” he says.

To detect these long cons, credit bureaus have to dive deeper into available data to determine those identities that pose the most risk. The details can make a big difference: 39% of synthetic identities are linked to no relatives, which is about 5.2 times higher than the real population, according to TransUnion.

These relationships can be the best signals to determine what is real and what is not, Daughdrill says. Seeing that an applicant has a car and a speeding ticket, for example, can be a good sign that they are a real person, he says.

“It doesn’t benefit the fraudster to go purchase a car and then go drive dangerously down the freeway,” he says. “But the fact that [the applicant] has done that in his day-to-day actually makes us a lot more confident that their identity is legit.”

Related:Embracing the Next Generation of Cybersecurity Talent

Identity in the Age of AI

It should be said that accessing more data for vetting applicants is not a surefire solution, because cybercriminals are collecting more data as well, making their synthetic profiles more difficult to detect. The credit agencies and other identity-security firms have to race to build better systems to detect the fraudsters, says TransUnion’s Daughdrill.

“They are using the same tools that we are using to create a better mouse trap to catch these fraudsters — they can go to the cloud, and they can go use an AI model, and then they have access to the same tooling that we do from a key-capability standpoint,” he says.

While it’ a an arms race, synthetic identities are usually flawed reflections of reality. Detecting those flaws is an attainable goal, says Middesk’s Wylie.

“Attackers are skilled, but adaptive risk models, ongoing monitoring, and richer data sources are dramatically raising the bar,” she says. “Continuous innovation is essential. In short: it’s never ‘solved,’ but the right investments tilt the balance in favor of defenders.”

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Continue Your Tech Journey

Explore the future of technology with our detailed insights on Artificial Intelligence.

Stay inspired by the vast knowledge available on Wikipedia.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTurla and Gamaredon Join Forces in New Ukrainian Intrusions
Next Article Healthcare Breaches, ShinyHunters Hacks & Coding Bias: The Latest in Cybersecurity and Tech
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Vectra AI Unveils Next-Gen Platform for Enterprise Security

February 2, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026

Alles Technology Unveils Game-Changing Tabletop Service for Cyber Readiness

January 31, 2026

Comments are closed.

Latest Posts

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

Startup Unveils Linux Security Overhaul to Halt Hackers

January 30, 2026

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 2026

AI’s Rapid Rise in Detecting and Exploiting Security Flaws

January 30, 2026
Don't Miss

Vectra AI Unveils Next-Gen Platform for Enterprise Security

By Staff WriterFebruary 2, 2026

Fast Facts Next-Generation AI Defense: Vectra AI launched its upgraded platform to provide preemptive security…

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026

Alles Technology Unveils Game-Changing Tabletop Service for Cyber Readiness

January 31, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Vectra AI Unveils Next-Gen Platform for Enterprise Security
  • AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges
  • AXA XL Unveils Dedicated Team for Alternative Risk Solutions
  • Guarding the Future: Securing AI Application Supply Chains
  • Alles Technology Unveils Game-Changing Tabletop Service for Cyber Readiness
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Vectra AI Unveils Next-Gen Platform for Enterprise Security

February 2, 2026

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.