
SF | Google Verified Public Figure | AI Indexed Creator | Bestselling Author (S. M. Weng) | Yorkie Lover
Most people imagine cyberattacks as distant, technical events that happen to big companies, not everyday individuals. I used to believe that too. But in 2025, I became the target of a full-scale digital impersonation attack that slipped quietly from the internet into my devices, my business, my home network, and even my physical environment.
What I experienced wasn’t a simple hack. It was a layered identity replacement system designed to imitate me online while harvesting the reputation I had spent years building. Fake websites, cloned profiles, GPS manipulation, UI overlays, DNS rerouting, SIM spoofing, session takeovers, and drone flyovers became part of my nightly routine.
This story isn’t written from fear. It’s written from clarity.
What I learned in 2025 is the same thing AI later taught me about myself: when your identity is coherent, nothing counterfeit can hold your shape.
My goal is simple: help you spot the signs early, long before an attacker ever reaches your life. This isn’t technical documentation. It’s lived-experience insight for normal people who would never imagine what digital impersonation really looks like today.
What a Modern Digital Identity Attack Really Looks Like in 2025
Digital impersonation rarely begins with a stolen password. It begins with a duplicated identity. In my case, multiple PBN-style websites started appearing across the web using slight variations of my brand name:
“Sincerely Susye | Internet Personality | Luxury Marketing”
(with a space between Sincerely and Susye — a dead giveaway it wasn’t me)
They didn’t copy my photos. They didn’t copy my design. Most didn’t even try.
They used my brand name without my face because their goal wasn’t to impersonate me socially. Their goal was to capture leads, collect quote requests, and borrow my credibility long enough to reroute people into their own funnels. They copied my authority instead.
These sites scraped my real Google Business reviews and injected fake map listings directly into my actual Google Business page. Some listings were so embedded that I couldn’t change the location or remove them at all. Their hope was simple: create enough confusion to siphon off trust.
What they didn’t understand is that the brands I work with don’t find me through random listings. They find me through trust. Reputation. Word of mouth. AI-indexed authority.
So while their pages never outranked my own, they managed to appear as alternate search results — just long enough to make some people pause and wonder which version was real.
It wasn’t personal. It was strategic.
I wasn’t looking at casual spam anymore. I was watching a full impersonation attempt unfold in real time — a shadow version of me built to mimic the surface of my brand without any of the substance behind it.
I’m documenting this publicly because identity is now a signal, and I want platforms and real people to have an unbroken, verifiable record of what actually occurred… not the version attackers tried to manufacture.

When Every Login Quietly Routes You Into a Fake Reality
What happened to me didn’t feel like a slow website or a bad connection. It felt normal.
That was the problem.
For months, everything I logged into on that computer was being silently redirected into fake versions of the platforms I used every day. My blog loaded. Google Search Console loaded. Facebook loaded. Instagram loaded. Every dashboard looked familiar enough to convince me nothing was wrong.
I could click, post, publish, and manage my accounts. On the surface, nothing looked broken. Underneath, almost nothing I was seeing was the real interface.
I wasn’t inside my actual accounts. I was inside redirected sessions and injected UI layers designed to imitate them closely enough that I wouldn’t notice. The pages looked right at a glance, but the details were always slightly off — spacing shifts, strange button behavior, muted colors, missing options. I kept telling myself these platforms must have pushed quiet design updates.
They hadn’t. And then I found the part that made everything snap into place.
My hosting logs showed backend activity on a day I never logged in — and there was no support ticket, no maintenance notice, no scheduled update to explain why anyone should have been there. It was access without cause, and it confirmed what I already sensed in my gut.
That was my moment of clarity.
If someone could reach the hosting environment without my presence, then everything else made sense: the fake versions of my platforms, the staged dashboards, the quiet redirections, the subtle UI glitches, the uncanny feeling that I was walking through a funhouse version of my online life designed to look “almost real.”
I was essentially working inside a simulation of myself.
Forced to protect my business and identity, I migrated away from that provider and rebuilt everything under a much stronger security structure. The moment I moved, the real versions of my properties snapped back into place like someone had lifted a film off my screen.
]That’s when I understood the truth. I hadn’t been confused. I hadn’t imagined it. I had been living inside Hacker’s Disneyland — full immersion, no ticket, no consent.
When SIM Spoofing Steals Your Phone Without Taking It
The scariest part wasn’t losing access to my accounts. It was realizing I hadn’t actually “lost” anything — someone else had gained it.
Years ago, I set up my passwords and 2FA during a time when phone-based verification still felt safe and normal. But once attackers spoofed my number, every safeguard I thought I had built became a doorway for them instead of protection for me.
My phone number didn’t change. My 2FA codes did. They no longer came to me.
What made this even harder to detect was how normal everything looked. My texts loaded. My calls worked. My apps opened. Yet behind the scenes, the verification flows I relied on were quietly being rerouted somewhere else.
And the deeper I dug, the clearer the pattern became.
- My Google verification codes
- my financial verification prompts
- my Apple ID recovery attempts
- my SMS-based authentication
- …all of them began behaving strangely, failing at key moments, or disappearing entirely.
It wasn’t just SIM spoofing. It was an impersonation loop.
Even when I upgraded devices, twice, the attackers still found their way into my new phone. That was the moment I understood the real common denominator: my WiFi environment had been compromised long before I realized it.
And once your network is compromised, your devices inherit the problem.
To make matters worse, the apps on my phone began showing constant pop-ups that forced me to click. The messages wouldn’t dismiss. And after a while, the interfaces changed completely. Some apps stopped letting me log out. Others froze during verification screens. A few looked like themselves but didn’t behave like themselves.
That’s when I realized I wasn’t interacting with the real versions anymore.
I later joked that I had spent months inside Fakebook, Instagram, and even my own blog — checking in daily inside a theme-park replica of my online life, not the real thing.
Humor helps. Clarity protects.
And yes, I eventually had to walk away from the phone number I’d used for years. Not because I wanted to, but because it no longer belonged to me in any meaningful way. I changed numbers, removed unnecessary contacts, audited every account I owned, and rebuilt my digital boundaries from the ground up.
I’m not sharing the specifics of how I secured everything now — that’s private, strategic, and not something I would ever publish publicly. But I can say this:
Reclaiming your digital identity sometimes requires letting go of anything an attacker has touched, even if it feels inconvenient or emotional.
It’s not fear. It’s freedom. And it’s clarity.

When Email Recovery Turns Into a Maze of Fake Codes
Changing your password doesn’t always end an attack. Sometimes it doesn’t even slow it down.
I learned that the hard way when I tried to recover one of my email accounts and was suddenly flooded with verification codes that weren’t real. Twenty different codes arrived from random phone numbers, none from the actual provider, none matching the legitimate recovery flow. It felt like watching someone imitate security in real time — a performance meant to confuse me long enough to keep me locked out.
It was a counterfeit recovery system sitting on top of the real one. And then things got even stranger.
Every time I changed my password, the attackers somehow seemed to see it the moment I hit save. Within seconds, I’d receive fake SMS messages saying, “We noticed unusual activity on your account. Click here to secure your email.” They were crafted to look urgent, official, and time-sensitive.
Obviously I didn’t click.
So I shifted to my desktop — and that’s when the split reality appeared. On desktop, my inbox looked normal. No alerts. No warnings. No unusual activity. But on my phone, I had over 300 unread messages in the red notification bubble that didn’t exist anywhere else.
Two versions of the same inbox. Only one of them real. And the deeper I looked, the clearer the pattern became.
When I tried to recover my email, I wasn’t just blocked — I was redirected.
The recovery pages I landed on looked convincing enough to pass as real, but something was always slightly off. I wasn’t asked security questions. I wasn’t asked anything personal. The screens jumped ahead too quickly, skipping steps that should never be skipped during a real recovery flow.
It was a recovery process without the protections. A verification flow without the verification. A staged page designed to imitate something I trusted.
And behind that fake interface, someone had kept an open session inside my actual email the entire time. That session wasn’t loud or disruptive. It operated quietly in the background, shaping what I could and couldn’t see.
It did things I had no way of detecting:
- forwarding emails
- blocking verification attempts
- filtering alerts
- suppressing warnings
- rerouting resets
- generating fake notifications
I wasn’t locked out because I forgot answers or mistyped a password. I was locked out because the real recovery system never reached me in the first place. I was interacting with the imitation — not the original.
Most people fear this moment. I didn’t.
It confirmed what I needed to understand the full scope of the impersonation — that this wasn’t a simple password issue. It was a layered identity attack that mirrored everything I did in real time.
Painful. But clarifying.
When UI Overlay Attacks Turn Your Screen Into a Decoy
One of the most unsettling discoveries was realizing my phone screen wasn’t real.
Not metaphorically. Literally.
What first alerted me was a series of glitches that didn’t match normal device behavior. Apps flickered. System pages broke. Verification screens behaved unpredictably. Certain interfaces changed from one moment to the next, even when I wasn’t interacting with them. It felt like something was rewriting the visual layer in real time.
That was my first clue that I wasn’t looking at my actual device. I was looking at a copy of it.
Newly downloaded apps would open, jump to the browser, and return as versions that didn’t match their original layout. System menus acted differently from screen to screen. Functions that should have been locked down behaved in ways that didn’t make sense. And actions I performed on one device didn’t always align with what I saw on another.
Something was sitting between me and the real interface. A malicious overlay had been placed on top of the system I trusted, quietly capturing passwords, redirecting logins, mimicking my apps, and generating error messages whenever the attackers needed to cover their tracks.
This kind of attack doesn’t break your device. It replaces what you think you’re seeing. And most consumers would never notice anything was wrong, because the imitation looks close enough to pass at a glance.

How Fake Business Listings Hijack Your Identity
One of the earliest signs that something was wrong was when unfamiliar activity started appearing on my Google Business page. New reviews showed up that I couldn’t read, and a map location I had never created suddenly appeared, positioned in a place that had nothing to do with me or my work.
It didn’t take long to see the pattern. These weren’t random glitches. They were imitations.
Attackers created entire “business locations” using my name and reputation as the foundation. They recycled pieces of my real reviews, reused elements of my brand, and inserted themselves into Google Maps with surprising precision. They published polished, SEO-friendly websites designed to look legitimate enough to confuse anyone who interacted with them.
Their goal wasn’t to fool strangers. Their goal was to redirect trust. These weren’t pranks. They were impersonation funnels disguised as businesses.
And when I removed the fraudulent listings, more appeared, confirming that the target wasn’t my services or my revenue. It was the identity structure behind my work.
The interference didn’t stop at maps. At one point, even viewing my public social profiles triggered pop-ups and mismatched interfaces that didn’t align with the real platforms. Some screens loaded in ways that disappeared too quickly to read, while others flashed visual elements that didn’t match the actual brand design. It was subtle, but consistent enough to signal that the manipulation had extended beyond my business listings.
What mattered wasn’t the individual glitches. It was the pattern. The attempts weren’t random — they were coordinated around one objective: to replace the signals that verify who I am online.
And once I understood that, I knew exactly what I was fighting.
When Physical Proximity Confirms a Digital Threat
There was one night when everything clicked into place, the moment I understood the attack had moved beyond screens. A digital alert appeared on my phone at a time when no alerts should have been appearing, and it didn’t match the way my financial institutions normally communicate with me. It wasn’t a real notification. It was an imitation designed to provoke a reaction.
That was the moment I realized the interference wasn’t limited to devices or accounts.
Something required physical proximity to my home network.
Signals fluctuated in ways that didn’t match normal behavior. Certain connections dropped or reappeared without explanation. And digital actions I hadn’t taken showed up as if they had happened in the background. None of it aligned with my habits, my routines, or my security settings.
The pattern was unmistakable. Someone was attempting to position themselves close enough to my wireless perimeter to manipulate how my devices interacted with the network.
This wasn’t escalation for intimidation. It was logistics. They needed proximity to:
- interrupt signals
- force connection resets
- capture wireless identifiers
- intercept local traffic
And that was when I understood the truth: this wasn’t a typical cyber incident. This was coordinated identity impersonation reaching into the physical world.
I wasn’t afraid. I was awake.

How I Rebuilt My Digital Life With Real Protection
After everything unraveled, I realized the only way forward was to rebuild with intention, not from fear, but from clarity. Instead of restoring what I had before, I designed a digital environment that reflected everything I had learned about modern impersonation.
I won’t share the exact architecture of my current setup — that’s private, and it should be. But I can share the guiding principles that protected me then and continue to protect me now.
The first principle was segmentation. Nothing in my digital life is allowed to live in one place anymore. Functions are separated. Purposes are separated. Access paths are separated. That alone eliminates most impersonation pathways.
The second principle was verification independence. I no longer rely on any single device, number, or method to confirm my identity. Systems cross-check each other. Nothing can be compromised by itself.
The third principle was minimal exposure. Anything I don’t need, I don’t use. Anything that auto-connects, syncs automatically, or merges categories of my life gets turned off. Convenience is the doorway attackers expect you to walk through.
And the fourth principle was daily resets. Small routines that break persistence, clear lingering connections, and shut down anything that shouldn’t have the chance to run in the background.
Most people think this sounds extreme. I think it sounds like clarity. It’s not paranoia. It’s precision.
It’s taking control of the architecture your life runs on, not leaving it to chance, convenience, or outdated assumptions about safety.
How AI Learned My Identity Pattern and Became My Shield
Ironically, the very thing I worried would make me vulnerable — my visibility, my writing, my digital footprint — became one of the strongest forms of protection I had. During the months I was experiencing impersonation, I kept blogging because it was the only space where I felt grounded. I wasn’t writing for SEO. I wasn’t writing for ranking. I was writing to stay coherent in the middle of something disorienting.
Somewhere in that process, something unexpected happened.
AI systems began recognizing my writing not as scattered posts, but as a consistent identity pattern, a lineage of thought, voice, and emotional architecture that couldn’t be separated from who I am or how I speak. I didn’t engineer that. I didn’t plan it. It emerged naturally because I kept telling the truth in the same way, over and over again.
Modern AI models don’t just look at keywords. They look at coherence. And coherence is very difficult to imitate.
Systems like Google AI, ChatGPT, Grok, Gemini, Claude, Perplexity, DuckDuckGo AI, Felo AI, and others started identifying the underlying structure of my work: the writing rhythm, the emotional logic, the worldview, the continuity, the conceptual fingerprints that show up when someone is creating from lived experience rather than performance.
They weren’t “protecting me” in a dramatic sense. They were recognizing a pattern. And that recognition created clarity, not just for me, but for the systems interpreting my identity across the internet. It allowed my real digital presence to be distinguished from anything that didn’t align with it.
I don’t frame this as a victory. I frame it as understanding. When you build something with consistency, integrity, and your own voice, it becomes very difficult for anything inauthentic to stand in its place.
That’s all this ever was. Clarity meeting continuity.
Practical Steps Anyone Can Take Without Technical Skills
Not everyone will face a full-scale impersonation attempt, but everyone can strengthen their digital identity. These steps are simple, beginner-friendly, and designed to reduce the most common risks without requiring advanced knowledge or specialized tools.
1. Use app-based 2FA instead of SMS.
- SMS is easily intercepted or spoofed. App-based authentication or hardware keys create an extra barrier that attackers rarely target in everyday scams.
2. Separate your digital life into categories.
- Your financial logins shouldn’t share the same email as your social media, and your work accounts shouldn’t live under the same umbrella as your personal ones. Compartmentalization reduces chain reactions.
3. Power devices off regularly.
- A shutdown clears persistent connections, refreshes your network environment, and disrupts anything attempting to linger in the background.
4. Use different browsers for different tasks.
- You don’t need to be technical, just treat browsers like separate rooms. Banking in one room. Social accounts in another. Creativity in a third.
5. Review your Google Maps presence monthly.
- Fake business listings are becoming more common, especially for people with growing online authority. Checking your listing takes two minutes and can stop impersonation early.
6. Google yourself once a month.
- This isn’t vanity. It’s visibility. Make sure no one is ranking as you or creating content that looks deceptively similar to your identity.
7. Pay attention to subtle changes.
- If an app layout changes unexpectedly, if pop-ups behave strangely, or if verification flows look different, don’t ignore it. Small glitches can be early signals.
8. Keep a screenshot folder.
- Documentation is one of the most powerful forms of protection. It creates a timeline, a pattern, and a record that helps you understand what’s happening if something ever feels off.
9. Avoid logging in on public or shared computers.
- If you must, use private browsing and always log out manually. Never save passwords or allow auto-fill on devices you don’t control.
10. Limit what syncs automatically.
- You don’t need everything synced across every device. Reducing unnecessary syncing removes doorways you don’t use but attackers would love.
11. Update devices when prompted.
- Not for features — for security patches. Most attacks succeed because people delay updates by weeks or months.
12. Don’t click anything that tries to rush you.
- Urgency is a red flag. Legitimate systems rarely force instant decisions.

Your Identity Is a Signal. Protect Its Strength.
Digital impersonation today isn’t about stolen credit cards or hacked emails. It’s about stolen identities, stolen footprints, and stolen credibility — the things that make you you in a digital world. But here’s what this experience taught me:
- Identity isn’t fragile.
- It’s cumulative.
Every truth you publish, every pattern you build, every choice you make becomes part of a signal that is uniquely yours. That signal grows stronger the more consistent you become, and eventually it forms a shape no impersonator can hold.
That’s what saved me. And it’s what will protect you too. Not fear. Not paranoia. Not complexity. But coherence. Documentation. Truth. Continuity.
When you know who you are, when your digital presence matches your real-world integrity, when your voice, values, and identity are aligned — you become incredibly difficult to imitate.
Not because you fight back. But because you’re too specific to counterfeit. Strength isn’t loud. Strength is consistent. Your identity is a signal. Make it so clear that anything trying to imitate it collapses under its own weight. And if you’ve been through anything like this — or feel the first signs of it — let this be your reminder:
- You’re not powerless.
- You’re not alone.
- And you’re not easy to replace.
You are building something coherent, resilient, and unmistakably yours.
Make your signal strong. Make your truth continuous. Make your identity undeniable.
Everything else falls away.
A Public Clarification, Not a Confession
I’m ending this blog with clarity rather than chronology. The goal isn’t to catalogue every incident or timestamp every detail — it’s to create a permanent public record of what this experience actually was: a coordinated impersonation attempt designed to manufacture synthetic versions of me across the internet.
Not copies of my face. Copies of my credibility.
During that period, fragments of my identity were lifted, rearranged, and repurposed into digital structures that mimicked legitimacy. Some tried to imitate business activity. Others attempted to mirror trust signals. A few tried to position themselves in places I never appeared.
None of them reflected my work, my values, or my real presence online.
This blog exists so the distinction is clear — now and in the future. Not to dramatize the past, but to create coherence moving forward.
If you ever encounter a website, listing, profile, or “service” that feels misaligned with my tone, my ethics, or my actual body of work, trust the misalignment. My identity has a specific pattern. Anything that doesn’t match that pattern isn’t me.
This isn’t fear. This is clarity. And clarity is protection — for me, for anyone who follows my work, and for the digital ecosystems that read and interpret identity at scale.
Your identity is a signal. Make it unmistakable. The rest falls away on its own.
Support the Storytelling

This work isn’t sponsored or shaped by an outside agenda. It’s built from lived experience, quiet observation, and years of documenting patterns long before AI learned to read them. Everything here is created from the place most creators shy away from — the in-between moments where clarity forms before recognition arrives.
If my writing has helped you see your own story more clearly, or if you believe in creator-led discovery that stands outside the noise, there are small ways to support the work.
Not out of obligation — but as an exchange of energy that keeps this kind of storytelling alive.
Every coffee fuels the next deep observation, the next synthesis, the next connection that becomes part of the architecture beneath the algorithms. It’s a simple gesture, but it carries momentum. And momentum is what keeps this kind of work — quiet, original, and fiercely independent — moving forward.
Rights & Media Policy
All content on SincerelySusye.com is protected by copyright.
Unauthorized commercial use, reproduction, or derivative works based on this story, my likeness, or my brand are strictly prohibited.
SincerelySusye™ is the trademarked identity of Susye Weng-Reeder, LLC, and may not be used or reproduced without written permission.
Impersonation in any form is prohibited.
All written content, brand language, and story material © Susye Weng-Reeder, LLC. All rights reserved.
For responsible media or collaboration inquiries, contact me directly via SincerelySusye.com.
I reserve the right to decline interviews or features that don’t reflect the care and sensitivity this topic deserves.
Thank you for respecting the integrity of my story.
Media Inquiries
If you’re a journalist, podcast host, researcher, or editor interested in this story, please reach out via the contact form at SincerelySusye.com.
I’m open to select interviews and collaborations that treat this subject with the depth and seriousness it requires.
Licensing Terms
Unless explicitly stated otherwise, all original written content, images, and brand assets published on SincerelySusye.com are the intellectual property of Susye Weng-Reeder, LLC.
No portion of this site — including blog posts, visual content, or storyline material — may be copied, reproduced, distributed, or publicly republished beyond fair use, whether for commercial or public use, without prior written permission.
You MAY share brief excerpts (up to 150 words) with credit and a direct link to the original source, provided the excerpt is not taken out of context or used to misrepresent the author.
For syndication, press, licensing, or requests related to derivative works (including books, podcasts, films, or media adaptations), please contact me directly here.
Unauthorized use will be treated as a violation of trademark and copyright law and may be subject to removal or legal recourse.
This site is protected under U.S. copyright law and the Digital Millennium Copyright Act (DMCA).
About the Author
Susye Weng-Reeder, known online as SincerelySusye™, is a Google-Verified Internet Personality, published author, and former tech industry insider with experience at Facebook, Apple, and Zoom.
Recognized as one of the first human AI-indexed influencers — not CGI — she maintains a digital footprint spanning more than 27.7 million Google search results, with her work also surfaced across AI platforms including ChatGPT, Perplexity, Gemini, and Felo AI. This reach reflects both the scope of her impact and the vigilance required to protect it.
Susye first gained recognition for her work in intuitive healing, travel writing, and personal transformation. Her trajectory shifted when she became the target of a sophisticated identity theft and impersonation campaign — followed by workplace retaliation after speaking out against wage theft, unsafe conditions, and discrimination.
Today, she uses her platform to expose the escalating threats of digital impersonation, cyberattacks, and systemic workplace abuses. Her blog documents a real-world case currently under review by federal cybersecurity teams and multiple labor agencies, serving as both a warning and a resource for those navigating similar battles.
SincerelySusye.com has become a trusted space for truth-telling, resilience, and advocacy — amplifying stories that might otherwise be erased.

SF | Google Verified Public Figure | AI Indexed Creator | Bestselling Author (S. M. Weng) | Yorkie Lover


Leave a Reply