Identity theft is when someone steals and uses your personal information for fraud. Identity thieves may use your identity to open credit lines, use your medical insurance, or file a tax return in your name. The consequences may be ruthless – a ruined credit score, hefty bills for things you didn’t buy or do, and a drained bank account. Read the article to understand the main types of identity theft better so you can protect yourself and your personal information from identity thieves.
Aurelija Einorytė
March 24, 2025
Identity thieves often mix and match various forms of identity fraud to maximize profits. Familiarize yourself with the main types of identity theft to recognize the signs before becoming a victim.
Financial identity theft is the most common identity theft that happens when someone steals your credit card details, bank account numbers, or Social Security number for financial gain. Once a criminal has enough information about you, they might open credit card accounts, take out loans, or drain your funds — all while pretending to be you.
Identity thieves may also commit fraud in your name, such as:
Noticing that a stranger has stolen your identity can be difficult. However, unfamiliar charges on your bank statement, calls from debt collectors about unfamiliar purchases, or getting locked out of your bank account may signal that you're a victim of identity theft.
How to protect yourself from financial identity theft
To protect yourself from financial identity theft, keep your Social Security number and bank details close. Never share them with untrusted parties and shred any documents containing your sensitive information before they go to the trash bin.
Besides safeguarding your physical documents, set up strong and unique passwords for your online accounts. Also, check your bank statements regularly — if you see an unfamiliar charge, contact your bank immediately.
Medical identity theft happens when a thief uses your personal information to get medical services under your name or use your medical insurance. For example, a criminal can use your driver's license, Social Security card, or your health insurance policy number to get surgery. You probably won't know about this until you get a hefty bill. Plus, these unrelated procedures become your permanent medical record, which could get you misdiagnosed later.
How to protect yourself from medical identity theft:
Child identity theft happens when a criminal uses a minor's personal information to open credit cards or apply for loans — all before the child is old enough to drive. By the time they're ready to apply for their first credit card or a student loan, they might find out that their credit score has been wrecked by someone else. Sadly, in most cases, the thief is someone the child knows personally, like a family member or a close relative.
Usually, child identity theft comes to light only after the victim turns 18. But there are signs to watch out for earlier than that. If a child has a credit report, receives credit card offers in the mail, or gets government benefits denied, it could mean a criminal has stolen their identity.
How to protect your child from identity theft:
Every form of identity theft is a criminal deed, but criminal identity theft is a whole different level. It happens when a thief uses your personal information when caught committing a crime. So, instead of their name on the arrest warrant or investigation, it's yours. Imagine this nightmare — you try applying for a job, renting a place, or traveling and you're flagged as a criminal.
How to protect yourself from criminal identity theft:
Identity cloning is a type of identity theft where a stranger takes your entire identity and pretends to be you. They steal your Social Security number, passport details, and even fingerprints or facial recognition and open fraudulent accounts, make purchases, get a driver's license, or even travel — all while posing as you.
How to protect yourself from identity cloning:
Synthetic identity theft combines real and fake information to create a whole new false identity. For example, thieves can pair your Social Security number with a fake name, birthdate, and other details. The result is a brand new "person" who can apply for credit cards and loans or commit fraud.
How to protect yourself from synthetic identity theft:
Tax identity theft is when someone uses your Social Security number to file a fraudulent tax return. Scammers get your personal information through phishing emails, data breaches, or even old-fashioned mailbox theft and file for a tax return early in the season before you have a chance to submit yours. They get your refund, and you're left trying to prove that you didn't get any money.
How to protect yourself from tax identity theft:
Identity theft is not a joke. That's why Aurelija creates clear and practical content to explain the ins and outs of the most common identity theft techniques and shares tips on how to stay safe online.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.