SSA impersonation scams are getting more personal

5 hours ago 3

NEWYou tin present perceive to Fox News articles!

The Social Security Administration and its Office of Inspector General issued warnings during their March 2026 "Slam the Scam" campaign, citing the continued measurement of impersonation fraud tied to Social Security. Federal information shows these scams stay widespread; much than 330,000 authorities impersonation complaints were reported to the FTC successful 2025. That's a 25% summation from the twelvemonth before.

Losses tied to these scams scope into the hundreds of millions of dollars each year, placing them among the astir relentless forms of user fraud.

These scam messages often lucifer authoritative SSA communication, referencing issues with a Social Security fig oregon relationship records.

Sign up for my FREE CyberGuy Report 

Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. For simple, real-world ways to spot scams aboriginal and enactment protected, visit CyberGuy.com - trusted by millions who ticker CyberGuy connected TV daily. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.

TECH GIANTS UNITE TO FIGHT ONLINE SCAMS

A adjacent  up   of a Social Security card

Scammers plan messages to look similar authoritative Social Security alerts, often utilizing acquainted details to summation your trust.  (Kurt "CyberGuy" Knutsson)

How bash these SSA scams work?

Scammers are utilizing bits of accusation that consciousness familiar. A connection whitethorn see your name, portion of your SSN, oregon adjacent a notation to benefits. Caller IDs tin look to lucifer authorities offices, and emails oregon texts whitethorn travel the aforesaid format utilized successful authoritative SSA communication.

Much of this accusation comes from information that has already been portion of information breaches. When those details amusement up successful a message, the assertion sounds accordant with what you already cognize astir your ain records.

Earlier this year, determination were reports of scam emails that looked similar authoritative Social Security messages, asking radical to download their Social Security connection done links that led to fraudulent sites. These emails are not from the SSA and volition bargain your idiosyncratic accusation and apt hack your telephone oregon machine erstwhile you let access.

A connection that lines up with recognizable accusation is little apt to beryllium ignored. It moves the speech guardant faster and brings your defender down.

What scammers privation erstwhile they interaction you

At the constituent of contact, they are trying to get 1 of 2 things:

1) Your idiosyncratic identifiers

  • Full oregon partial SSN
  • Date of birth
  • Address, telephone number
  • Login credentials oregon verification codes

They inquire for this accusation nether the guise of verifying your individuality oregon resolving an contented with your account.

2) Your money

  • Direct payments (wire transfer, acquisition cards, crypto)
  • Access to slope oregon status accounts
  • Instructions to "move wealth to support it"

This usually comes aft they gain your spot oregon make urgency.

FAKE GOOGLE SECURITY PAGE CAN TURN YOUR BROWSER INTO A SPYING TOOL

A hacker holding someone's ID cards portion    typing

Once scammers person your information, they tin walk individuality checks and unfastened oregon entree fiscal accounts successful your name. (Kurt "CyberGuy" Knutsson)

What scammers bash with the information

Once scammers person your information, they determination rapidly to crook it into access, wealth and semipermanent individuality fraud.

They usage it to get past individuality checks

Your SSN, day of birth, and code are often capable to get done basal verification systems. That allows scammers to contiguous themselves arsenic you erstwhile applying for recognition oregon contacting fiscal institutions.

They unfastened oregon entree fiscal accounts

Once done those checks, they tin use for recognition successful your name, starring to caller accounts, hard inquiries, and balances showing up connected your recognition report. If login details oregon verification codes were shared, existing accounts tin besides beryllium accessed.

They spell aft benefit-related accounts

The aforesaid accusation tin beryllium utilized to entree oregon marque changes to Social Security-related records. This tin see attempts to redirect payments by updating nonstop deposit details.

They proceed utilizing the data

Any stolen accusation tin beryllium reused oregon combined with made-up details to make further identities, which tin past beryllium utilized to unfastened much accounts implicit time.

What the SSA volition not do

The SSA does not interaction individuals retired of the bluish to petition idiosyncratic information.

It does not inquire for afloat SSNs, slope details, oregon login credentials implicit telephone calls, substance messages, oregon email.

It besides does not request outgo to resoluteness issues tied to your SSN oregon benefits.

Requests to transportation money, acquisition acquisition cards, oregon determination funds to support your accounts harmless are not portion of immoderate SSA process.

Threats are different informing sign. The bureau does not suspend SSNs oregon contented apprehension warnings.

Legitimate connection from the SSA happens done mailed notices oregon done your My Social Security account. 

The bureau states it whitethorn nonstop emails successful constricted cases, specified arsenic relationship notifications, but these bash not inquire for idiosyncratic information.  

SSA emails volition nonstop you to log successful done SSA.gov alternatively than asking you to click connected links oregon download attachments.

PHISHING SCAM EXPLOITS APPLE MAIL 'TRUSTED SENDER' LABEL

A hacker typing connected  a computer

Stolen information tin besides beryllium utilized to people your Social Security benefits, including attempts to redirect payments. (Kurt "CyberGuy" Knutsson)

What to bash if you person oregon respond to 1 of these messages

If you get a connection claiming to beryllium from the SSA, don't respond and don't click immoderate links. Don't telephone the fig successful the message.

  • Instead, spell to SSA.gov oregon usage a verified telephone number to cheque if there's really an contented with your account.
  • If you person already shared information, halt interaction immediately and instrumentality enactment of what you shared. You tin study the scam to the SSA Office of Inspector General astatine oig.ssa.gov/report
  • You tin besides record a study astatine IdentityTheft.gov, which helps make a record.
  • To bounds further misuse, spot a fraud alert oregon credit freeze with Equifax, Experian, and TransUnion, and cheque your recognition reports for immoderate unfamiliar activity.

How to support yourself

Stolen accusation is not ever utilized close away. In galore cases, individuality theft similar this is not evident until it shows up connected a recognition study oregon a lender flags it. Monitoring tools tin way this benignant of enactment arsenic it happens. Alerts tied to changes successful your recognition record oregon exposed idiosyncratic information tin amusement you wherever your accusation is being used.

Many individuality extortion services show recognition crossed the 3 large bureaus and scan for exposed idiosyncratic data, including Social Security numbers. They tin alert you to caller inquiries oregon accounts and connection enactment if thing looks suspicious.

Some services besides scan acheronian web marketplaces and information leaks to spot if your accusation is being shared oregon sold. Starting with a escaped individuality breach scan tin assistance you recognize your hazard and instrumentality enactment early.

If individuality theft does happen, these services often supply fraud solution support. This tin see assistance to interaction creditors, placing fraud alerts, disputing unauthorized accounts and preparing documentation to retrieve your identity. Some plans besides see individuality theft security to assistance screen eligible betterment costs.

No work tin forestall each benignant of individuality theft. However, aboriginal alerts and guided enactment tin marque a large quality successful however rapidly you drawback and retrieve from fraud.

How to cheque if your idiosyncratic accusation was exposed

If you are unsure whether your accusation has already been exposed, instrumentality enactment now. Start with a escaped individuality breach scan to spot if your information appears successful known leaks. Catching it aboriginal gives you much power and helps bounds the harm earlier it spreads.

See my tips and champion picks connected Best Identity Theft Protection astatine Cyberguy.com

Kurt's cardinal takeaways

SSA impersonation scams are not new, but they are getting much convincing. When a connection includes details that lucifer your life, it feels legitimate. That is precisely what scammers are counting on. The cardinal is to dilatory down and verify everything done authoritative channels. The SSA is not going to substance you retired of the blue, request wealth oregon inquire for delicate details. If a connection pushes you to enactment quickly, that is your awesome to pause. Staying up of these scams comes down to consciousness and elemental habits. Verify first. Protect your data. And presume that immoderate unexpected connection astir your Social Security fig deserves a 2nd look.

Have you ever received a connection that looked similar it came from Social Security, and what made you spot it oregon question it? Let america cognize by penning to america astatine Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 

Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. For simple, real-world ways to spot scams aboriginal and enactment protected, visit CyberGuy.com -  trusted by millions who ticker CyberGuy connected TV daily. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.

Read Entire Article