← BACK TO SCENARIOS
Scenario #12

THE IDENTITY THEFT

Personal Data Compromise

SECURITY BREACH ALERT

The credit monitoring app notification stops you mid-sip of your morning coffee: "ALERT: New credit card opened in your name."


Minutes later, your bank calls about suspicious activity. By the time you finish that call, you've received an email from a crypto exchange you use: "Password reset successful."

IDENTITY STATUS: COMPROMISED

Over the next hour, the situation rapidly deteriorates. Your personal information has been thoroughly compromised. Someone has:

Your Situation

You frantically begin damage assessment:

Immediate Assessment

Security Challenge: Identity Firewall

  1. How have you separated your identity from your crypto access?
  2. What authentication methods remain secure when personal data is compromised?
  3. How compartmentalized are your financial systems from your identity?
  4. What security measures don't rely on personal identification?
  5. How quickly can you revoke and replace compromised credentials?

Complications

As you respond to the identity breach:

Your Mission

Protect your cryptocurrency holdings from an attacker who has comprehensive access to your personal identification information. You must prevent unauthorized access while establishing a new secure identity perimeter.


How effectively have you separated your true identity from your crypto security?

Your phone rings. It's another financial institution calling to verify a change request. "We received your call earlier asking to update your contact information and security questions," the representative explains. "I'm calling to confirm these changes."


You realize you made no such call.

ATTACK STATUS: Ongoing Identity Impersonation
How will your crypto security withstand an attacker who can convincingly claim to be you?