A $900,000 FTC Settlement Started with a Fake Identity Website
In 2020, the FTC took action against operators running deceptive websites that harvested personal information under the guise of offering government services. Consumers thought they were applying for benefits or retrieving official documents. Instead, their Social Security numbers, dates of birth, and financial details were siphoned straight to threat actors. This wasn't sophisticated nation-state espionage. It was a fake identity website built for under $200 using off-the-shelf templates.
If you think this problem is isolated to consumers clicking bad links at home, you're wrong. Fake identity websites are now a core tool in targeted social engineering campaigns against businesses. They're used to harvest employee credentials, build synthetic identities for fraud, and establish trust before launching ransomware attacks. I've seen organizations lose six figures because a single employee interacted with one of these sites during a routine background check.
This post breaks down exactly how fake identity websites work, why they're exploding in 2021, and what practical steps your organization can take right now to defend against them.
What Exactly Is a Fake Identity Website?
A fake identity website is a fraudulent site designed to collect personally identifiable information (PII) by impersonating a legitimate service. These sites mimic government agencies, background check services, employment verification platforms, or financial institutions. Their sole purpose: harvesting real data to commit identity fraud, credential theft, or further social engineering attacks.
Some are built to sell fabricated identity documents — fake driver's licenses, Social Security cards, or passports. Others exist purely as data collection traps. The FBI's Internet Crime Complaint Center (IC3) reported over 791,000 complaints in 2020, with identity theft and personal data breaches ranking among the top categories. Many of these complaints traced back to deceptive websites. You can review the full report at FBI IC3's 2020 Internet Crime Report.
How Threat Actors Build and Weaponize These Sites
The Infrastructure Is Embarrassingly Cheap
I've investigated fake identity websites that cost less than a decent dinner to set up. Threat actors register a domain that looks close to a legitimate service — think "ssa-verifyonline.com" instead of "ssa.gov." They grab a website template, add a convincing logo, and deploy it behind a legitimate SSL certificate. That green padlock in the browser? It means the connection is encrypted. It says nothing about whether the site is trustworthy.
Hosting is typically on bulletproof providers that ignore takedown requests. Some rotate through dozens of domains weekly. By the time a domain gets flagged, they've already moved on.
Data Harvesting Through Trust
The most effective fake identity websites don't just sit there waiting for random visitors. They're actively promoted through phishing emails, social media ads, and even SEO manipulation. Here's a scenario I've personally encountered: an HR department received an email that appeared to come from a background check vendor. The email linked to a convincing portal requesting employee verification. Six employees entered their full PII before anyone flagged it.
That data was used within 48 hours to open fraudulent credit lines and attempt wire transfers. The initial data breach cost the company over $340,000 in direct losses and remediation.
Synthetic Identity Creation
Harvested data from these sites feeds a growing industry of synthetic identity fraud. Threat actors combine a real Social Security number with a fabricated name and date of birth to create entirely new identities. The Federal Reserve estimated synthetic identity fraud cost U.S. lenders $6 billion in 2016 alone, and the problem has only accelerated since. These synthetic identities are then used to apply for credit, launder money, or even gain employment at target organizations.
Why 2021 Is a Peak Year for Fake Identity Website Scams
Three converging factors are making this threat worse right now.
Remote work verification gaps. With millions still working remotely, organizations rely on digital onboarding and verification. HR teams are checking identities through web portals instead of in-person document reviews. Threat actors know this and are building fake verification sites specifically designed to intercept these workflows.
Pandemic-related government services. Unemployment benefits, stimulus payments, and vaccine registrations have created a massive increase in government service websites. CISA issued multiple alerts about fraudulent websites impersonating government agencies throughout 2020 and into 2021. You can track active alerts at CISA's Cybersecurity Advisories page.
Improved attacker tooling. Phishing kits now include fake identity website templates as standard features. These kits — sold on dark web marketplaces for as little as $50 — include pre-built pages that mimic the IRS, Social Security Administration, DMV portals, and major banks. No coding required.
The $4.88M Lesson Most Organizations Learn Too Late
According to IBM's 2020 Cost of a Data Breach Report, the average total cost of a data breach reached $3.86 million, with breaches involving stolen or compromised credentials averaging even higher at $4.77 million. Fake identity websites are a primary vector for credential theft — they're designed from the ground up to capture login information and PII that threat actors then use to access corporate systems.
The Verizon 2021 Data Breach Investigations Report found that 85% of breaches involved a human element, with phishing and social engineering leading the way. Fake identity websites sit at the intersection of these two attack types. They use social engineering to lure victims and phishing techniques to capture data. Read the full findings at the Verizon 2021 DBIR.
Your employees are the target. Your organization pays the price.
How to Spot a Fake Identity Website: A Practical Checklist
Train your team to look for these red flags before entering any information on a website claiming to offer identity services:
- Domain discrepancies. Official government sites use .gov domains. Financial institutions use their exact corporate domain. Any deviation — extra words, hyphens, misspellings — is a warning sign.
- Urgency language. "Verify your identity within 24 hours or your account will be suspended" is classic social engineering pressure. Legitimate services rarely impose artificial deadlines via email links.
- Excessive data requests. A legitimate verification service won't ask for your Social Security number, mother's maiden name, AND bank account details all on one page. If it feels like too much, it is.
- No verifiable contact information. Check for a physical address, phone number, and privacy policy. Fake identity websites often have none, or list generic information that doesn't check out.
- Check WHOIS data. Domains registered within the last 30-90 days that claim to be established services are almost certainly fraudulent.
- SSL certificate doesn't mean safe. Over 80% of phishing sites in 2020 used HTTPS. The padlock only means your data is encrypted in transit — not that the recipient is legitimate.
Defending Your Organization: Steps That Actually Work
Build a Human Firewall First
Technology alone won't stop an employee from typing their credentials into a convincing fake site. Your first line of defense is security awareness training that specifically covers fake identity websites and modern social engineering tactics. I recommend starting with a comprehensive cybersecurity awareness training program that covers the full threat landscape — not just generic "don't click suspicious links" advice.
Supplement that with regular phishing simulations that include fake identity website scenarios. A dedicated phishing awareness training program for organizations lets you test employees with realistic attacks and measure improvement over time. The organizations I've seen with the lowest incident rates run simulations monthly, not annually.
Implement Multi-Factor Authentication Everywhere
Even when credentials get stolen through a fake identity website, multi-factor authentication (MFA) stops most attackers cold. If your organization hasn't deployed MFA on every external-facing application and VPN, you're leaving the door wide open. This isn't optional in 2021 — it's baseline security hygiene.
Deploy DNS-Level Filtering
DNS filtering services can block known malicious domains before employees ever reach them. Many fake identity websites are flagged within hours of going live. Configure your DNS resolver to use threat intelligence feeds that specifically track phishing and fraud domains.
Adopt Zero Trust Principles
A zero trust architecture assumes no user, device, or network is inherently trusted. Every access request is verified. This means even if an employee's credentials are compromised via a fake identity website, the attacker can't move laterally through your network without passing additional verification checks. NIST published detailed zero trust architecture guidance in Special Publication 800-207 — it's worth reading and implementing.
Monitor for Brand Impersonation
If threat actors are building fake identity websites that impersonate your organization, you need to know about it fast. Domain monitoring tools can alert you when someone registers a domain similar to yours. Pair this with a takedown service that can rapidly remove fraudulent sites.
What Should You Do If an Employee Falls for a Fake Identity Website?
Speed matters. Here's the response sequence I walk organizations through:
- Isolate immediately. Remove the affected employee's device from the network. Disable their credentials across all systems.
- Assess the scope. Determine exactly what information was entered. Credentials only? Full PII? Financial data? Each scenario demands a different response.
- Reset and enforce MFA. Force password resets on all accounts associated with the compromised credentials. If MFA wasn't already enabled, deploy it now.
- Notify affected parties. If customer or third-party data was entered, you may have legal notification obligations under state breach notification laws.
- Report it. File a report with the FBI IC3 at ic3.gov and notify your cyber insurance carrier if applicable.
- Conduct a post-incident review. Identify why the employee was on that site, how the link arrived, and what controls failed. Use the findings to update your training program.
Fake Identity Websites Aren't Going Away — But You Can Get Ahead
Every week I see new fake identity website campaigns targeting organizations across every industry. The threat actors behind them are getting faster, more creative, and more convincing. The sites look professional. The social engineering is polished. The damage is real.
But here's what I also see: organizations that invest in continuous training, deploy MFA, and adopt zero trust principles dramatically reduce their exposure. The ones that treat security awareness as a one-time checkbox? They end up in the breach statistics.
Your employees interact with identity verification services, HR portals, and government websites regularly. Every one of those interactions is an opportunity for a threat actor to intercept. Make sure your team can tell the difference between a legitimate service and a well-crafted trap.
Start building that capability now. The cost of waiting is measured in stolen data, regulatory fines, and trust that takes years to rebuild.