Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:22 PM
Connect Directly

ID Theft Victims Spending Less In Cleanup Aftermath

New Identity Theft Resource Center (ITRC) report shows victims spending less time, money to clear their names

Nearly one-third of all identity theft victims say they are unable to completely clear up damaged credit or criminal records in the aftermath of their identities being abused. But the good news is they're spending much less time and money cleaning up the fraud perpetrated against them in their names, according to a newly released report.

The Identity Theft Resource Center (ITRC)'s "Identity Theft: The Aftermath 2009" report found that ID theft victims spent about $527 dollars out of pocket for an existing account compromised by an attacker, down from $741 in 2008. They also spent less time repairing the damage from a compromised account -- an average of 68 hours versus 76 hours in 2008.

It takes more time to clean up a newly opened financial account or a case involving criminal or governmental issues -- 141 hours last year, which was an improvement over '08, when it took an average of 265 hours.

The ITRC report (PDF) surveyed 183 victims nationwide. Nearly 24 percent say they believed they knew their identity thief, who was either a relative, friend, roommate, ex-spouse, or ex-significant other. And 10 percent say their cases were traced to an employee at a business who had their identity information.

Most ID thieves (55 percent) used the stolen identities to open new lines of credit, followed by making purchases on stolen credit and debit cards, 34 percent. Check fraud increased last year over 2008; 42 percent of the victims say their checks were stolen and their signatures forged, up from 35 percent the previous year. Additionally, 65 percent said thieves used the stolen account information to create fake checks for their use, up from 25 percent in '08.

The ITRC says the bottom line is you can't completely prevent ID theft. "Despite proactive measures victims may take, there is always the possibility that the creative and innovative identify thief can get around any security measures a victim may implement. This is why the ITRC strongly believes you cannot prevent identity theft," says Karen Barney, communications coordinator for the ITRC.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-27
In Ericsson BSCS iX R18 Billing & Rating iX R18, MX is a web base module in BSCS iX that is vulnerable to stored XSS via an Alert Dashboard comment. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or e...
PUBLISHED: 2020-11-27
In Ericsson BSCS iX R18 Billing & Rating iX R18, ADMX is a web base module in BSCS iX that is vulnerable to stored XSS via the name or description field to a solutionUnitServlet?SuName=UserReferenceDataSU Access Rights Group. In most test cases, session hijacking was also possible by utilizing t...
PUBLISHED: 2020-11-27
In cPanel before 90.0.17, 2FA can be bypassed via a brute-force approach (SEC-575).
PUBLISHED: 2020-11-27
cPanel before 90.0.17 allows self-XSS via the WHM Transfer Tool interface (SEC-577).
PUBLISHED: 2020-11-27
cPanel before 90.0.17 has multiple instances of URL parameter injection (SEC-567).