{"id":37415,"date":"2020-09-30T12:12:11","date_gmt":"2020-09-30T12:12:11","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544518"},"modified":"2020-09-30T12:12:11","modified_gmt":"2020-09-30T12:12:11","slug":"identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/","title":{"rendered":"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis"},"content":{"rendered":"<p><img decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/identity-theft-word-cloud-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt loading=\"lazy\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/identity-theft-word-cloud-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/identity-theft-word-cloud-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/identity-theft-word-cloud-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/identity-theft-word-cloud-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/identity-theft-word-cloud-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/09\/identity-theft-word-cloud.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"> <\/p>\n<p>We\u2019ve all been spending more of our time online since the crisis hit. Whether it\u2019s ordering food for delivery, livestreaming concerts, holding virtual parties, or engaging in a little retail therapy, the <a href=\"https:\/\/www.weforum.org\/agenda\/2020\/05\/coronavirus-covid19-united-states-america-internet-online-generations\/\">digital interactions of many Americans are on the rise<\/a>. This means we\u2019re also sharing more of our personal and financial information online, with each other and the organizations we interact with. Unfortunately, as ever, there are bad guys around every digital corner looking for a piece of the action.<\/p>\n<p>The bottom line is that personally identifiable information (PII) is the currency of internet crime. And cyber-criminals will do whatever they can to get their hands on it. When they commit identity theft with this data, it can be a messy business, potentially taking months for banks and businesses to investigate before you get your money and credit rating back. At a time of extreme financial hardship, this is the last thing anyone needs.<\/p>\n<p>It therefore pays to be careful about how you use your data and how you protect it. Even more: it\u2019s time to get proactive and monitor it\u2014to try and spot early on if it has been stolen. Here\u2019s what you need to know to protect your identity data.<\/p>\n<p><strong>How identity theft works<\/strong><\/p>\n<p>First, some data on the scope of the problem. In the second quarter of 2020 alone 349,641 identity theft reports <a href=\"https:\/\/www.ktvq.com\/id-theft-crime-surges-during-pandemic#:~:text=In%20the%20second%20quarter%20alone,government%20documents%20or%20benefits%20fraud.&amp;text=The%20FTC%20can%20also%20help,the%20process%20on%20IdentityTheft.gov.\">were filed <\/a>with the FTC. To put that in perspective, it\u2019s over half of the number for the whole of 2019 (650,572), when consumers <a href=\"https:\/\/www.ftc.gov\/news-events\/press-releases\/2020\/01\/new-ftc-data-shows-ftc-received-nearly-17-million-fraud-reports\">reported losing<\/a> more than $1.9 billion to fraud. What\u2019s driving this huge industry? A cybercrime economy <a href=\"https:\/\/www.bromium.com\/wp-content\/uploads\/2018\/05\/Into-the-Web-of-Profit_Bromium.pdf\">estimated to be worth<\/a> as much as $1.5 trillion annually.<\/p>\n<p>Specialized online marketplaces and private forums provide a user-friendly way for cyber-criminals and fraudsters to easily buy and sell stolen identity data. Many are on the so-called dark web, which is hidden from search engines and requires a specialized anonymizing browser like Tor to access. However, plenty of this criminal activity also happens in plain sight, on social media sites and messaging platforms. This underground industry is an unstoppable force: as avenues are closed down by law enforcement or criminal in-fighting, other ones appear.<\/p>\n<p>At-risk personal data could be anything from email and account log-ins to medical info, SSNs, card and bank details, insurance details and much more. It all has a value on the cybercrime underground and the price fraudsters are prepared to pay will depend on supply and demand, just like in the \u2018real\u2019 world.<\/p>\n<p>There are various ways for attackers to get your data. The main ones are:<\/p>\n<table>\n<tbody readability=\"7.1654772524532\">\n<tr readability=\"14.330954504906\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>Phishing:<\/strong> usually aimed at stealing your log-ins or tricking you into downloading keylogging or other info-stealing malware. Phishing mainly happens via email but could also occur via web, text, or phone. Around $667m was lost in imposter scams last year, according to the <a href=\"https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/consumer-sentinel-network-data-book-2019\/consumer_sentinel_network_data_book_2019.pdf\">FTC<\/a>.<\/li>\n<li><strong>Malicious mobile apps<\/strong> disguised as legitimate software.<\/li>\n<li><strong>Eavesdropping on social media:<\/strong> If you overshare even innocuous personal data (pet names, birth dates, etc.,) it could be used by fraudsters to access your accounts.<\/li>\n<li><strong>Public Wi-Fi eavesdropping: <\/strong>If you\u2019re using it, the bad guys may be too.<\/li>\n<li><strong>Dumpster diving and shoulder surfing: <\/strong>Sometimes the old ways are still popular.<\/li>\n<li><strong>Stealing devices <\/strong>or finding lost\/misplaced devices in public places.<\/li>\n<li><strong>Attacking the organizations you interact with:<\/strong> Unfortunately this is out of your control somewhat, but it\u2019s no less serious. <a href=\"https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2020\/01\/01.28.2020_ITRC_2019-End-of-Year-Data-Breach-Report_FINAL_Highres-Appendix.pdf\">There were 1,473 reported<\/a> corporate breaches in 2019, up 17% year-on-year.<\/li>\n<li><strong>Harvesting card details<\/strong> covertly from the sites you shop with. Incidents involving this kind of \u201cweb skimming\u201d <a href=\"https:\/\/www.securitymagazine.com\/articles\/92197-malware-bytes-online-credit-card-skimming-increased-by-26-in-march-2020\">increased 26% in March<\/a> as more users flocked to e-commerce sites during lockdown.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>The COVID-19 challenge<\/strong><\/p>\n<p>As if this weren\u2019t enough, consumers are especially exposed to risk during the current pandemic. Hackers are using the <a href=\"https:\/\/internetsafety.trendmicro.com\/healthy-family-habits-to-fight-covid-19-harms-online-and-off?_ga=2.63568239.137787896.1599674652-1411208999.1591083718\">COVID-19 threat as a lure<\/a> to infect your PC or steal identity data via the phishing tactics described above. They often impersonate trustworthy institutions\/officials and emails may claim to include new information on outbreaks, or vaccines. Clicking through or divulging your personal info will land you in trouble. Other fraud attempts will try to sell counterfeit or non-existent medical or other products to help combat infection, harvesting your card details in the process. In March, <a href=\"https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2020\/Global-operation-sees-a-rise-in-fake-medical-products-related-to-COVID-19\">Interpol seized<\/a> 34,000 counterfeit COVID goods like surgical masks and $14m worth of potentially dangerous pharmaceuticals.<\/p>\n<p>Phone-based attacks are also on the rise, especially those impersonating government officials. The aim here is to steal your identity data and <a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/fbi-sees-spike-in-fraudulent-unemployment-insurance-claims-filed-using-stolen-identities\">apply for government emergency stimulus funds<\/a> in your name. Of the 349,641 identity theft reports filed with the FTC in Q2 2020, 77,684 were specific to government documents or benefits fraud.<\/p>\n<p><strong>What do cybercriminals do with my identity data?<\/strong><\/p>\n<p>Once your PII is stolen, it\u2019s typically sold on the dark web to those who use it for malicious purposes. It could be used to:<\/p>\n<table>\n<tbody readability=\"3.5607235142119\">\n<tr readability=\"7.1214470284238\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Crack open other accounts that share the same log-ins (via credential stuffing). There were <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/report-finds-increased-credential-stuffing-attacks-on-financial-sector#:~:text=Credential%20stuffing%20is%20a%20technique,online%20services%20using%20stolen%20credentials.\">30 billion such attempts in 2018.<\/a><\/li>\n<li>Log-in to your online bank accounts to drain it of funds.<\/li>\n<li>Open bank accounts\/credit lines in your name (this can affect your credit rating).<\/li>\n<li>Order phones in your name or port your SIM to a new device (this impacts <a href=\"https:\/\/www.verizon.com\/about\/news\/protecting-our-customers-identity-theft-and-fraud\">7,000 Verizon customers per month<\/a>).<\/li>\n<li>Purchase expensive items in your name, such as a new watch or television, for criminal resale. This is often done by hijacking your online accounts with e-tailers. E-commerce fraud <a href=\"https:\/\/www.pymnts.com\/news\/retail\/2020\/ecommerce-fraud-costs-prevention\/\">is said to be worth<\/a> around $12 billion per year.<\/li>\n<li>File fraudulent tax returns to collect refunds on your behalf.<\/li>\n<li>Claim medical care using your insurance details.<\/li>\n<li>Potentially crack work accounts to attack your employer.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>How do I protect my identity online?<\/strong><\/p>\n<p>The good news among all this bad is that if you remain skeptical about what you see online, are cautious about what you share, and follow some other simple rules, you\u2019ll stand a greater chance of keeping your PII under lock and key. Best practices include:<\/p>\n<table>\n<tbody readability=\"5\">\n<tr readability=\"10\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Using strong, long and unique passwords for all accounts, managed with a password manager.<\/li>\n<li>Enable two-factor authentication (2FA) if possible on all accounts.<\/li>\n<li>Don\u2019t overshare on social media.<\/li>\n<li>Freeze credit immediately if you suspect data has been misused.<\/li>\n<li>Remember that if something looks too good to be true online it usually is.<\/li>\n<li>Don\u2019t use public Wi-Fi when out-and-about, especially not for sensitive log-ins, without a VPN.<\/li>\n<li>Change your password immediately if a provider tells you your data may have been breached.<\/li>\n<li>Only visit\/enter payment details into HTTPS sites.<\/li>\n<li>Don\u2019t click on links or open attachments in unsolicited emails.<\/li>\n<li>Only download apps from official app stores.<\/li>\n<li>Invest in AV from a reputable vendor for all your desktop and mobile devices.<\/li>\n<li>Ensure all operating systems and applications are on the latest version (i.e., patch frequently).<\/li>\n<li>Keep an eye on your bank account\/credit card for any unusual spending activity.<\/li>\n<li>Consider investing in a service to monitor the dark web for your personal data.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>How Trend Micro can help<\/strong><\/p>\n<p>Trend Micro offers solutions that can help to protect your digital identity.<\/p>\n<p><a href=\"https:\/\/go2.trendmicro.com\/geoip\/id-security\"><strong>Trend Micro ID Security<\/strong><\/a> is the best way to get proactive about data protection. It works 24\/7 to monitor dark web sites for your PII and will sound the alarm immediately if it finds any sign your accounts or personal data have been stolen. It features<\/p>\n<table>\n<tbody readability=\"4.5\">\n<tr readability=\"9\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>Dark Web Personal Data Manager <\/strong>to scour underground sites and alert if it finds personal info like bank account numbers, driver\u2019s license numbers, SSNs and passport information.<\/li>\n<li><strong>Credit Card Checker <\/strong>will do the same as the above but for your credit card information.<\/li>\n<li><strong>Email Checker <\/strong>will alert you if any email accounts have been compromised and end up for sale on the dark web, allowing you to immediately change the password.<\/li>\n<li><strong>Password Checker <\/strong>will tell you if any passwords you\u2019re using have appeared for sale on the dark web, enabling you to improve password security.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"https:\/\/go2.trendmicro.com\/geoip\/password-manager\"><strong>Trend Micro Password Manager<\/strong><\/a> enables you to manage all your website and app log-ins from one secure location. Because Password Manager remembers and recalls your credentials on-demand, you can create long, strong and unique passwords for each account. As you\u2019re not sharing easy-to-remember passwords across multiple accounts, you\u2019ll be protected from popular credential stuffing and similar attacks.<\/p>\n<p>Finally, <a href=\"https:\/\/go2.trendmicro.com\/geoip\/pwp\"><strong>Trend Micro WiFi Protection<\/strong><\/a> will protect you if you\u2019re out and about connecting to WiFi hotspots. It automatically detects when a WiFi connection isn\u2019t secure and enables a VPN\u2014making your connection safer and helping keep your identity data private.<\/p>\n<p>In short, it\u2019s time to take an active part in protecting your personal identity data\u2014as if your digital life depended on it. In large part, it does.<\/p>\n<p>&nbsp;<!-- AddThis Advanced Settings above via filter on the_content --><!-- AddThis Advanced Settings below via filter on the_content --><!-- AddThis Button BEGIN --><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve all been spending more of our time online since the crisis hit. Whether it\u2019s ordering food for delivery, livestreaming concerts, holding virtual parties, or engaging in a little retail therapy, the digital interactions of many Americans are on the rise. This means we\u2019re also sharing more of our personal and financial information online, with&#8230;<br \/>\nThe post Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37416,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[390,8528,8956,8369,8228,307,5987,1325],"class_list":["post-37415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-consumer","tag-dark-web-monitoring","tag-id-security","tag-identity-security","tag-password-management","tag-security","tag-virtual-private-network","tag-vpn"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-30T12:12:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis\",\"datePublished\":\"2020-09-30T12:12:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/\"},\"wordCount\":1452,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg\",\"keywords\":[\"Consumer\",\"Dark Web Monitoring\",\"ID Security\",\"Identity Security\",\"Password Management\",\"Security\",\"virtual private network\",\"VPN\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/\",\"name\":\"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg\",\"datePublished\":\"2020-09-30T12:12:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consumer\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/consumer\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/","og_locale":"en_US","og_type":"article","og_title":"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-30T12:12:11+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis","datePublished":"2020-09-30T12:12:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/"},"wordCount":1452,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg","keywords":["Consumer","Dark Web Monitoring","ID Security","Identity Security","Password Management","Security","virtual private network","VPN"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/","url":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/","name":"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg","datePublished":"2020-09-30T12:12:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Consumer","item":"https:\/\/www.threatshub.org\/blog\/tag\/consumer\/"},{"@type":"ListItem","position":3,"name":"Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37415"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37415\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37416"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}