Many identity thieves have been using background check websites as their weapon of choice. They are pretty much able to buy large amounts of personal information on the sites, using the data as a foundation to open bank accounts in people’s names and decimate their character. Majority of these said schemes tend to lead to fraudulent loans being made across multiple financial organizations.
Getting their hands on enough personal information to take a target’s identity doesn’t really, require a lot of intellectualism, sophisticated hacking skills or the ability to navigate the Dark Web. Online identity thieves just use services that provide personal information for sales leads, real estate transactions, and credit reports to steal, gathering details about their victim’s lives from provincial, state, and local records that are being sold by brokers like BeenVerified, Instant Checkmate, and TruthFinder.
Although these websites don’t supply individuals social security numbers, they still offer plenty of pieces for example mother’s maiden name, childhood address, college, previous jobs, awards, directories and so forth. The worst part is they are willing to sell to just about anyone with a few bucks and access to the internet.
Remaining gaps in the individual’s information can be pieced together by “phishing” additional information from a victim. This could very well be accomplished by sending a phony-but-convincing-looking email.
Only a decade ago it would take extensive time and hard work to gather all of these disparate data points, it is now all consolidated online via website platforms and is perfectly legal for anyone to access. The only way to protect yourself from this is to go one-by-one and opt-out of the dozens of background sites or have our online content removal team do it for you.
What’s also noteworthy is that syndicates regularly use “web databases” to filter their targets who have large home equity lines of credit. Giving them access to sensitive personal data like Social Security numbers and birth dates, which the thieves can then compile with information from other online databases.