She was a victim of what's known as a Sim swap attack - where scammers trick a network operator into thinking they're the account holder to get a new Sim card for a mobile device.
They used it to take over almost all her online accounts through her phone. She said the experience was "horrible".
"The scammers took over my Gmail account and then locked me out of my bank accounts because they failed security checks," she said.
Sue also had a credit card opened in her name and the criminals purchased more than £3,000 in vouchers.
It took several trips to the branches of her bank and mobile phone provider to get her accounts back.
And the thieves weren't done.
"The criminals also did a sinister thing after breaking into my WhatsApp," she said. "They sent messages to horse riding groups I am in warning there were people on their way to stab the horses."
We searched hacker databases using online tools like haveibeenpwned.com and Constella Intelligence to see if Sue's details were previously compromised.
Her phone number, email address, date of birth and physical address were all exposed in data breaches at gambling platform PaddyPower in 2010 and email validation tool Verifications.io in 2019. Other compilations of hacked records also included her details.
Hannah Baumgaertner, from cyber firm Silobreaker, said attackers likely used the personal data leaked in previous breaches to conduct the Sim swap attack.
"Once they had access to Sue's phone number they were were able to intercept any security codes sent to verify her identity for her Gmail account," she said.
