Identity cloning remains one of the most pervasive threats consumers face today. In 2024 alone, Americans filed over 1.1 million identity theft reports with the Federal Trade Commission. Losses from identity fraud exceeded $47 billion that year. Identity theft comes in many forms – from credit card fraud to tax refund scams – but one particularly insidious variant is identity cloning. Let’s take a closer look at what identity cloning is, how it differs from what we commonly call identity theft, warning signs to watch for, the dangers it poses, and steps you can take to prevent falling victim to this serious crime.
Lukas Grigas
June 30, 2025
Identity cloning is a sophisticated subtype of identity theft in which someone fraudulently obtains another person’s personal information and then impersonates the victim in all aspects of life. In other words, the perpetrator tries to create a convincing replica of the victim’s identity – using their name, Social Security number, date of birth, and other details – as a false persona for themselves. The clone might take over the victim’s daily identity: using the victim’s information to get a job, rent or buy housing, receive medical care, or even commit crimes, all under the victim’s name. This goes beyond typical financial identity theft – it’s about living as the victim.
While identity cloning is a type of identity theft, it has unique characteristics that set it apart from more common identity theft fraud schemes. Some key differences include:
In short, all identity cloning is identity theft, but not all identity theft reaches the level of cloning.
Identity cloning works much like identity theft. It usually starts with a thief collecting bits of your personal data – your full name, Social Security number, birth date, maybe a copy of a driver’s license photo – pulled from data breach dumps, phishing emails, stolen mail, or discarded paperwork.
Next, the imposter knits those pieces into a credible profile, often creating a synthetic identity by attaching a real SSN (sometimes belonging to a child or a deceased person) to an invented name or address so routine database checks raise no red flags.
Armed with that profile, the perpetrator applies for legitimate documents – state IDs, a driver’s license, even a passport. Once all the documents are sorted out, many cloners move to a new city, reroute mail, and build everyday records — pay stubs, tax returns, utility bills — so every background check reinforces the stolen persona.
The scheme can persist for decades: According to an Associate Press report, Matthew David Keirans lived as “William Woods” for nearly thirty years, holding a hospital IT job and securing loans totaling more than $200,000 before DNA evidence exposed the cloned identity in 2024.
Detecting identity theft or cloning early is challenging because the whole point is to operate in your name without tipping you off. However, there are red flags and warning signs of stolen identity:
Having any form of your identity stolen is no picnic, but identity cloning is especially dangerous because of the scope of the harm it can cause. The personal toll of identity cloning can be devastating. Financially, a clone can ruin your credit and rack up huge debts in your name. They might empty your bank accounts, charge up credit cards, or take out loans and never repay them, leaving you with collections and a wrecked credit score.
Victims may spend countless hours cleaning up fraudulent debts and correcting their credit reports. But the damage isn’t just financial. Because an identity clone assumes every aspect of your identity, they can entangle you in legal and reputational troubles. You could be wrongly blamed for the imposter’s actions. A stark example is William Woods’s case, which we highlighted earlier: the real Woods was arrested and even confined to a mental institution when authorities mistook him for the identity thief who had stolen his name. Victims of identity theft or cloning may have to prove who they truly are to police or courts if the impersonator committed crimes or civil offenses. Clearing one’s name can be a long, stressful process.
Meanwhile, the emotional distress is significant: imagine the shock of finding out someone else has married, worked, or even been medically treated as you. Victims often feel violated and unsafe, knowing someone out there has their entire identity. The recovery process – contacting agencies, filing reports, monitoring accounts – can dominate a victim’s life for months or years.
And the ripple effects of identity theft or cloning don’t stop with individuals. In the U.S., many businesses, including lenders and retailers, have lost substantial sums to scammers using stolen or cloned identities to obtain credit and goods.
Employers can also be victims: a person hired under a false identity might commit theft, embezzlement, or fraud, leaving the business to deal with the financial and legal fallout. Some cases even involve imposters posing as licensed professionals – like doctors or pilots – exposing clients and companies to serious risk.
Businesses that unknowingly employ someone using stolen Social Security numbers or professional credentials can face compliance violations, insurance issues, or lawsuits.
Moreover, identity clones can bypass background checks, potentially hiding criminal histories. If high-level employees are impersonated, it can result in business email compromise or payroll fraud. When identity theft or cloning leads to data breaches, customers unsurprisingly lose trust, damaging a company’s reputation.
According to the Bureau of Justice Statistics, victims of identity theft lost more than $16.6 billion in direct financial losses in 2024.
While no one can eliminate the risk, there are many practical steps you can take to significantly reduce the chances of falling victim to identity cloning (and identity theft in general). Good security habits and proactive monitoring go a long way. Here are some effective measures to protect your identity:
If you discover that your identity has been cloned or stolen, it’s important to act fast. Identity theft recovery can be complex, but taking it step by step will help you regain control and limit the damage. Here are the key steps to take if you suspect or confirm that you’re a victim of identity cloning:
Lukas is a digital security and privacy enthusiast with a passion for playing around with language. As an in-house writer at Nord Security, Lukas focuses on making the complex subject of cybersecurity simple and easy to understand.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.