In a disturbing new twist, cybercriminals are no longer just pretending to be banks, brands, or government agencies. They’re now impersonating you—using your real name, email address, or professional identity to scam others. This alarming tactic, known as reverse impersonation, doesn’t just harm the victims—it ruins reputations, careers, and trust.
🧠 What Is Reverse Impersonation?
Unlike traditional impersonation scams where you’re the target, reverse impersonation turns the tables. The scammer acts as you, and other people become the victims—making you appear to be the fraudster.
Common examples include:
- Sending phishing emails from your spoofed or hacked email
- Creating fake invoices using your name or business logo
- Using your identity on job hiring or romance scams
- Launching investment frauds or grant scams in your name
⚠️ Real-World Impacts
Victims often reach out angrily to you, thinking you scammed them.
Consequences may include:
- Loss of business credibility
- Social media backlash or reporting
- Legal complications if your name is tied to financial fraud
- Emotional stress and time spent proving your innocence
🚨 How Scammers Access Your Identity
- Data breaches expose your personal or professional details
- Social media scraping helps them replicate your tone, title, and brand
- Email spoofing lets them send from lookalike domains (e.g.,
john.smith@companny.com
) - Public records or resumes can provide enough info to create fake authority
🚩 Signs You’re Being Used in a Reverse Impersonation Scam
- Clients or friends receive strange emails “from you”
- Unknown people contact you angrily about “scams you ran”
- You’re locked out of your own accounts
- Your brand or name appears on scam alert websites
- Banks or platforms flag activity you didn’t initiate
🛡️ How to Protect Yourself
- Google your name and email regularly to check for abuse
- Use DMARC, SPF, and DKIM records to prevent email spoofing (especially for businesses)
- Enable two-factor authentication on all major accounts
- Limit the personal info you post publicly online
- Set up alerts on scam-reporting websites
- Contact victims immediately with proof that you’re not behind the scam