If you think someone is using your personal information to impersonate you and create fake social media profiles, we recommend that you act immediately by following our guidelines below, and then proceed to our ReportRecover and Reinforce sections for further assistance. Remember, stolen personal information can affect your finances, career, privacy, safety and reputation.

Some Immediate Action Steps to Take

  • Report the issue to the social networking site:
  • Set privacy features to limit who can see your posts, photos, and personal information.
  • If you believe anything posted on the fake profile is Illegal content such as death threats, violent threats, or hate crime threats, contact your local police department.
  • Download the ID Theft Help App from the Identity Theft Resource Center for free help with identity theft cases.


Reporting identity theft incidents to IdentityTheft.gov is very important! The more national reporting data that is collected, the better the chance law enforcement has to catch the criminals and decrease online crime. Although IdentityTheft.gov does not resolve individual complaints directly, they will make your report available to local, state and other law enforcement partners. Please read the IdentityTheft.gov privacy policy here. (If you believe that you’ve received a phishing email, please forward the email directly to reportphishing@apwg.org.)


These resources have been gathered, selected and vetted to help simplify the process of recovering after a cybercrime incident has taken place. You may need to contact organizations outside Fraudsupport.org. Results will vary depending on your circumstances.


Once you have notified the appropriate organizations and you are on the road to recovery, it is time to reinforce your cybersecurity using these resources and tools.

Implement Preventive Measures

  • Limit the personal information you share on social media. Avoid listing personal information like birthdate, hometown, address, high school or college graduation dates, and primary email address.
  • Create strong passwords. Learn how from ConnectSafely.org.
  • Always enable a two-step/factor verification – which requires an additional code to log in.
  • Regularly check and manage your privacy settings, only sharing private information with trusted friends and family members.
  • Be careful when sharing passwords.
  • Turn off geotagging – that allows social media to follow and share your location.
  • Only use trusted apps from reputable sources like Google Play or Apple App Store.
  • Download our Six Steps to Better Security PDF.