Synthetic Identity Fraud and Account Opening Scams: Mechanisms, Execution, and Real-World Examples

Introduction

Synthetic identity fraud (SIF) and account opening scams are among the most sophisticated and fastest-growing financial crimes today. Unlike traditional identity theft, where a fraudster steals and uses a real person’s identity, synthetic identity fraud involves creating a fictitious identity by combining real and fabricated information. These synthetic identities are then used to open fraudulent accounts, apply for loans, and build credit before committing large-scale financial fraud.

Account opening scams, a subset of synthetic identity fraud, exploit weaknesses in financial institutions’ identity verification processes to establish seemingly legitimate accounts. Once these accounts are operational, criminals use them for money laundering, credit bust-outs, and other illicit activities.

This paper explores how synthetic identity fraud and account opening scams operate, the techniques fraudsters use, and a real-world example illustrating their devastating impact.


1. Understanding Synthetic Identity Fraud

1.1 Definition and Key Characteristics

Synthetic identity fraud involves creating a new, fictitious identity by blending real and fake personal information. Unlike traditional identity theft, where a victim’s entire identity is stolen, SIF constructs a new persona that does not correspond to any single real individual.

Key characteristics include:

  • Partial Use of Real Data: Fraudsters often use a real Social Security Number (SSN) (often belonging to minors, the elderly, or deceased individuals) combined with a fake name, address, and date of birth.

  • Credit Profile Manipulation: Criminals “build” credit for the synthetic identity over time to appear legitimate before executing large-scale fraud.

  • Long-Term Schemes: Unlike immediate fraud, SIF often takes months or years to maximize financial gain.

1.2 How Synthetic Identities Are Created

Fraudsters use several methods to create synthetic identities:

A. Data Harvesting

  • Dark Web Purchases: Stolen SSNs, names, and addresses are bought from data breaches.

  • Public Records: Fraudsters gather information from obituaries, social media, and government databases.

B. Combining Real and Fake Information

  • A real SSN (often unused, such as those of children) is paired with a fabricated name, phone number, and address.

  • The synthetic identity is then used to apply for credit.

C. Building Credit (“Credit Farming”)

  • Fraudsters apply for secured credit cards or small loans under the synthetic identity.

  • They make small, regular payments to establish a credit history.

  • Over time, the credit score improves, allowing larger loans or credit lines.

D. Bust-Out Fraud

  • Once the synthetic identity has strong credit, fraudsters max out credit lines and disappear without repayment.


2. Account Opening Scams: Exploiting Financial Systems

2.1 Definition and Process

Account opening scams involve using synthetic identities to open bank accounts, credit cards, or loans. Financial institutions may unknowingly approve these applications due to weak identity verification processes.

2.2 Techniques Used in Account Opening Scams

A. Exploiting Weak KYC (Know Your Customer) Processes

  • Many banks rely on automated identity verification, which can be fooled by synthetic identities.

  • Fraudsters use “clean” synthetic identities with no prior fraud history to bypass red flags.

B. Manipulating Address and Contact Information

  • Fraudsters use mail-forwarding services or virtual addresses to avoid detection.

  • Burner phones or VoIP numbers are used for verification calls.

C. Collusion with Insiders

  • Some fraudsters bribe bank employees to approve fraudulent applications.

D. Synthetic Identity Rings

  • Organized crime groups create hundreds of synthetic identities to open accounts at multiple institutions simultaneously.

2.3 Consequences of Account Opening Scams

  • Financial Losses: Banks suffer charge-offs when synthetic identities default on loans.

  • Money Laundering: Fraudsters use fake accounts to move illicit funds.

  • Credit System Damage: Synthetic fraud artificially inflates credit risk assessments.


3. Real-World Example: The “Bust-Out” Synthetic Fraud Ring (2019)

3.1 Case Overview

In 2019, the U.S. Department of Justice uncovered a massive synthetic identity fraud ring that stole over $200 million from financial institutions.

3.2 How the Scam Operated

  1. Identity Creation:

    • Fraudsters obtained real SSNs (often from children) and paired them with fake names.

    • They used these synthetic identities to apply for credit cards and small loans.

  2. Credit Building Phase:

    • Over 12-18 months, they made small purchases and timely payments to build credit scores.

  3. Bust-Out Phase:

    • Once credit limits increased, they maxed out cards and withdrew cash advances.

    • They abandoned the accounts, leaving banks with millions in losses.

  4. Money Laundering:

    • Proceeds were funneled through shell companies and cryptocurrency exchanges.

3.3 Impact and Arrests

  • 17 individuals were charged in the scheme.

  • Banks reported over $200 million in losses due to charge-offs.

  • The case highlighted vulnerabilities in automated credit approval systems.


4. Detection and Prevention Strategies

4.1 For Financial Institutions

  • Enhanced KYC Checks: Use biometric verification and document authentication.

  • Behavioral Analytics: Monitor for unusual credit-building patterns.

  • Cross-Institution Collaboration: Share fraud data to detect synthetic identities.

4.2 For Consumers

  • Freeze Minor Credit Reports: Prevent fraudsters from using children’s SSNs.

  • Monitor Credit Reports: Check for unfamiliar accounts.

  • Use Identity Theft Protection Services: Detect synthetic identity usage early.

4.3 Regulatory Measures

  • Stronger SSN Verification: Government databases should flag mismatched identities.

  • Mandatory Fraud Reporting: Require banks to report synthetic fraud patterns.


5. Conclusion

Synthetic identity fraud and account opening scams represent a growing threat to financial systems worldwide. By blending real and fake data, fraudsters exploit weaknesses in identity verification to commit large-scale financial crimes. The 2019 bust-out fraud case demonstrates how organized criminal networks leverage synthetic identities for massive financial gain.

To combat this threat, financial institutions must adopt AI-driven fraud detectionstronger identity verification, and cross-industry collaboration. Consumers must remain vigilant by monitoring credit reports and securing personal information.

As fraudsters evolve their tactics, continuous innovation in cybersecurity and regulatory enforcement will be essential in mitigating the risks posed by synthetic identity fraud.

Shubhleen Kaur